{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T06:34:16Z","timestamp":1725690856989},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,5]]},"DOI":"10.1145\/3555228.3555262","type":"proceedings-article","created":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T22:34:54Z","timestamp":1663713294000},"page":"419-424","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Framework for the development of computational solutions for the support of requirements engineering with a focus on data protection"],"prefix":"10.1145","author":[{"given":"Paulo Henrique","family":"Da Silva","sequence":"first","affiliation":[{"name":"Universidade Federal de Santa Catarina, Brazil"}]},{"given":"Fabiane","family":"Benitti","sequence":"additional","affiliation":[{"name":"Universidade Federal de Santa Catarina, Brazil"}]},{"given":"Michelle","family":"Wangham","sequence":"additional","affiliation":[{"name":"Universidade do Vale do Itaja\u00ed, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2022,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-05476-z"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2018.00023"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2019.1583296"},{"volume-title":"DE 14 DE AGOSTO DE 2018.http:\/\/www.planalto.gov.br\/ccivil_03\/_ato2015-2018\/2018\/lei\/L13709","year":"2018","key":"e_1_3_2_1_4_1","unstructured":"Brasil. 2018 . LEI N\u00ba 13.709 , DE 14 DE AGOSTO DE 2018.http:\/\/www.planalto.gov.br\/ccivil_03\/_ato2015-2018\/2018\/lei\/L13709 .htm Brasil. 2018. LEI N\u00ba 13.709, DE 14 DE AGOSTO DE 2018.http:\/\/www.planalto.gov.br\/ccivil_03\/_ato2015-2018\/2018\/lei\/L13709.htm"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.23"},{"volume-title":"Computer Security, Sokratis Katsikas and et\u00a0al. (Eds.)","author":"Diamantopoulou Vasiliki","key":"e_1_3_2_1_6_1","unstructured":"Vasiliki Diamantopoulou , Aggeliki Tsohou , and Maria Karyda . 2020. From ISO\/IEC 27002:2013 Information Security Controls to Personal Data Protection Controls : Guidelines for GDPR Compliance . In Computer Security, Sokratis Katsikas and et\u00a0al. (Eds.) . Springer International Publishing , Cham , 238\u2013257. Vasiliki Diamantopoulou, Aggeliki Tsohou, and Maria Karyda. 2020. From ISO\/IEC 27002:2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security, Sokratis Katsikas and et\u00a0al. (Eds.). Springer International Publishing, Cham, 238\u2013257."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66172-4_10"},{"key":"e_1_3_2_1_8_1","unstructured":"Gustavo\u00a0Gil Gasiola. 2019. Cria\u00e7\u00e3o e desenvolvimento da prote\u00e7\u00e3o de dados na Alemanha. https:\/\/www.jota.info\/opiniao-e-analise\/artigos\/criacao-e-desenvolvimento-da-protecao-de-dados-na-alemanha-29052019 Gustavo\u00a0Gil Gasiola. 2019. Cria\u00e7\u00e3o e desenvolvimento da prote\u00e7\u00e3o de dados na Alemanha. https:\/\/www.jota.info\/opiniao-e-analise\/artigos\/criacao-e-desenvolvimento-da-protecao-de-dados-na-alemanha-29052019"},{"key":"e_1_3_2_1_9_1","volume-title":"International Conference on Web Engineering. Springer","author":"Gjermundrod H.","year":"2016","unstructured":"H. Gjermundrod , I. Dionysiou , and K. Costa . 2016. A privacy- by-design gdpr-compliant framework with verifiable data traceability controls . International Conference on Web Engineering. Springer ( 2016 ), 3\u201315. H. Gjermundrod, I. Dionysiou, and K. Costa. 2016. A privacy- by-design gdpr-compliant framework with verifiable data traceability controls. International Conference on Web Engineering. Springer (2016), 3\u201315."},{"key":"e_1_3_2_1_10_1","unstructured":"globo.com. 2018. Entenda o esc\u00e2ndalo de uso pol\u00edtico de dados que derrubou valor do Facebook e o colocou na mira de autoridades. https:\/\/g1.globo.com\/economia\/tecnologia\/noticia\/entenda-o-escandalo-de-uso-politico-de-dados-que-derrubou-valor-do-facebook-e-o-colocou-na-mira-de-autoridades.ghtml globo.com. 2018. Entenda o esc\u00e2ndalo de uso pol\u00edtico de dados que derrubou valor do Facebook e o colocou na mira de autoridades. https:\/\/g1.globo.com\/economia\/tecnologia\/noticia\/entenda-o-escandalo-de-uso-politico-de-dados-que-derrubou-valor-do-facebook-e-o-colocou-na-mira-de-autoridades.ghtml"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9517-1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5220\/0008873902570264"},{"key":"e_1_3_2_1_13_1","unstructured":"kpmg. 2020. Global Customer Experience Excellence report. https:\/\/home.kpmg\/xx\/en\/home\/insights\/2020\/01\/home.html kpmg. 2020. Global Customer Experience Excellence report. https:\/\/home.kpmg\/xx\/en\/home\/insights\/2020\/01\/home.html"},{"key":"e_1_3_2_1_14_1","unstructured":"National\u00a0Institute of Standards and Tecnology. 2018. Cybersecurity Framework. https:\/\/www.nist.gov\/cyberframework\/getting-started National\u00a0Institute of Standards and Tecnology. 2018. Cybersecurity Framework. https:\/\/www.nist.gov\/cyberframework\/getting-started"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555619.1555629"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"P. Poncelet M. Teisseire and F. Masseglia. 2008. Data Mining Patterns: New Methods and Applications.Information science reference. P. Poncelet M. Teisseire and F. Masseglia. 2008. Data Mining Patterns: New Methods and Applications.Information science reference.","DOI":"10.4018\/978-1-59904-162-9"},{"key":"e_1_3_2_1_17_1","volume-title":"Issue","author":"Qaiser Shahzad","year":"2018","unstructured":"Shahzad Qaiser and Ramsha Ali . 2018 . Text Mining: Use of TF-IDF to Examine the Relevance of Words to Documents. 181, 1 (2018) . Issue July, 2018. Shahzad Qaiser and Ramsha Ali. 2018. Text Mining: Use of TF-IDF to Examine the Relevance of Words to Documents. 181, 1 (2018). Issue July, 2018."},{"key":"e_1_3_2_1_18_1","unstructured":"Sans. 2021. Controles CIS v8. https:\/\/www.sans.org\/blog\/cis-controls-v8\/ Sans. 2021. Controles CIS v8. https:\/\/www.sans.org\/blog\/cis-controls-v8\/"},{"key":"e_1_3_2_1_19_1","volume-title":"Fabiane Barreto\u00a0Vavassori Benitti, and Michelle\u00a0Silva Wangham","author":"Silva Paulo\u00a0Henrique","year":"2022","unstructured":"Paulo\u00a0Henrique Silva , Fabiane Barreto\u00a0Vavassori Benitti, and Michelle\u00a0Silva Wangham . 2022 . Como a Engenharia de Requisitos apoia a prote\u00e7\u00e3o de dados pessoais?Proceedings 48 Confer\u00eancia Latinoamericana de Inform\u00e1tica - CLEI ( 2022). Paulo\u00a0Henrique Silva, Fabiane Barreto\u00a0Vavassori Benitti, and Michelle\u00a0Silva Wangham. 2022. Como a Engenharia de Requisitos apoia a prote\u00e7\u00e3o de dados pessoais?Proceedings 48 Confer\u00eancia Latinoamericana de Inform\u00e1tica - CLEI (2022)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5220\/0008960604730480"}],"event":{"name":"SBES 2022: XXXVI Brazilian Symposium on Software Engineering","acronym":"SBES 2022","location":"Virtual Event Brazil"},"container-title":["Proceedings of the XXXVI Brazilian Symposium on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3555228.3555262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T01:58:17Z","timestamp":1701395897000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555228.3555262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,5]]},"references-count":20,"alternative-id":["10.1145\/3555228.3555262","10.1145\/3555228"],"URL":"https:\/\/doi.org\/10.1145\/3555228.3555262","relation":{},"subject":[],"published":{"date-parts":[[2022,10,5]]},"assertion":[{"value":"2022-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}