{"id":"https://openalex.org/W2943136283","doi":"https://doi.org/10.1145/3297280.3297432","title":"Recommender-based privacy requirements elicitation - EPICUREAN","display_name":"Recommender-based privacy requirements elicitation - EPICUREAN","publication_year":2019,"publication_date":"2019-04-08","ids":{"openalex":"https://openalex.org/W2943136283","doi":"https://doi.org/10.1145/3297280.3297432","mag":"2943136283"},"language":"en","primary_location":{"id":"doi:10.1145/3297280.3297432","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3297280.3297432","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089733978","display_name":"Christoph Stach","orcid":"https://orcid.org/0000-0003-3795-7909"},"institutions":[{"id":"https://openalex.org/I100066346","display_name":"University of Stuttgart","ror":"https://ror.org/04vnq7t77","country_code":"DE","type":"education","lineage":["https://openalex.org/I100066346"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Christoph Stach","raw_affiliation_strings":["University of Stuttgart, IPVS / AS, Stuttgart, Germany"],"affiliations":[{"raw_affiliation_string":"University of Stuttgart, IPVS / AS, Stuttgart, Germany","institution_ids":["https://openalex.org/I100066346"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055282041","display_name":"Frank Steimle","orcid":"https://orcid.org/0000-0001-9769-988X"},"institutions":[{"id":"https://openalex.org/I100066346","display_name":"University of Stuttgart","ror":"https://ror.org/04vnq7t77","country_code":"DE","type":"education","lineage":["https://openalex.org/I100066346"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Frank Steimle","raw_affiliation_strings":["University of Stuttgart, IPVS / AS, Stuttgart, Germany"],"affiliations":[{"raw_affiliation_string":"University of Stuttgart, IPVS / AS, Stuttgart, Germany","institution_ids":["https://openalex.org/I100066346"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5089733978"],"corresponding_institution_ids":["https://openalex.org/I100066346"],"apc_list":null,"apc_paid":null,"fwci":9.1809,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.97487578,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1500","last_page":"1507"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7055618166923523},{"id":"https://openalex.org/keywords/recommender-system","display_name":"Recommender system","score":0.6036849617958069},{"id":"https://openalex.org/keywords/requirements-elicitation","display_name":"Requirements elicitation","score":0.5677383542060852},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5624839663505554},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5222055315971375},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.4641484022140503},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.4461202323436737},{"id":"https://openalex.org/keywords/epicureanism","display_name":"Epicureanism","score":0.4440034329891205},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.43211299180984497},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4205819368362427},{"id":"https://openalex.org/keywords/general-data-protection-regulation","display_name":"General Data Protection Regulation","score":0.4204234480857849},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4185035824775696},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.4134591221809387},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.32676029205322266},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.28684476017951965},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1486406922340393},{"id":"https://openalex.org/keywords/requirements-engineering","display_name":"Requirements engineering","score":0.13582515716552734}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7055618166923523},{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.6036849617958069},{"id":"https://openalex.org/C45384764","wikidata":"https://www.wikidata.org/wiki/Q838667","display_name":"Requirements elicitation","level":4,"score":0.5677383542060852},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5624839663505554},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5222055315971375},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.4641484022140503},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.4461202323436737},{"id":"https://openalex.org/C179455192","wikidata":"https://www.wikidata.org/wiki/Q179541","display_name":"Epicureanism","level":2,"score":0.4440034329891205},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.43211299180984497},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4205819368362427},{"id":"https://openalex.org/C3090818","wikidata":"https://www.wikidata.org/wiki/Q1172506","display_name":"General Data Protection Regulation","level":3,"score":0.4204234480857849},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4185035824775696},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.4134591221809387},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.32676029205322266},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.28684476017951965},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1486406922340393},{"id":"https://openalex.org/C6604083","wikidata":"https://www.wikidata.org/wiki/Q376937","display_name":"Requirements engineering","level":3,"score":0.13582515716552734},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3297280.3297432","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3297280.3297432","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W12003480","https://openalex.org/W1918352420","https://openalex.org/W1977789176","https://openalex.org/W1981787430","https://openalex.org/W1990124706","https://openalex.org/W2004429690","https://openalex.org/W2021124779","https://openalex.org/W2033811191","https://openalex.org/W2044350602","https://openalex.org/W2046194920","https://openalex.org/W2058084995","https://openalex.org/W2069287718","https://openalex.org/W2080990241","https://openalex.org/W2090420215","https://openalex.org/W2095848001","https://openalex.org/W2107643854","https://openalex.org/W2116560806","https://openalex.org/W2119744858","https://openalex.org/W2124472003","https://openalex.org/W2128026023","https://openalex.org/W2128232860","https://openalex.org/W2136649349","https://openalex.org/W2168240305","https://openalex.org/W2295801397","https://openalex.org/W2317052057","https://openalex.org/W2336558231","https://openalex.org/W2340052393","https://openalex.org/W2492039822","https://openalex.org/W2537892028","https://openalex.org/W2613315625","https://openalex.org/W2734975025","https://openalex.org/W2772425748","https://openalex.org/W2790901371","https://openalex.org/W2791958299","https://openalex.org/W2809658909","https://openalex.org/W2885851688","https://openalex.org/W2896020322","https://openalex.org/W2951152347","https://openalex.org/W4247085822"],"related_works":["https://openalex.org/W2101582069","https://openalex.org/W2127814706","https://openalex.org/W2994243660","https://openalex.org/W1622013556","https://openalex.org/W2719120829","https://openalex.org/W3157284269","https://openalex.org/W2118333568","https://openalex.org/W3014243650","https://openalex.org/W4286432608","https://openalex.org/W2982500526"],"abstract_inverted_index":{"Due":[0],"to":[1,42,153,160],"the":[2,54,60,78,102,116,131,161],"Internet":[3],"of":[4,22,62,65,104],"Things":[5],"(IoT),":[6],"a":[7,11,63,85,94,108,140],"giant":[8],"leap":[9],"towards":[10],"quantified":[12],"self":[13],"is":[14,59,90,107,118,126,165],"made,":[15],"i.":[16],"e.,":[17],"more":[18,20],"and":[19,29,49,149,155],"aspects":[21],"our":[23],"lives":[24],"are":[25],"being":[26],"captured,":[27],"processed,":[28],"analyzed.":[30],"This":[31],"has":[32],"many":[33,122],"positive":[34],"implications,":[35],"e.":[36],"g.,":[37],"Smart":[38,71],"Health":[39,72],"services":[40,58,73],"help":[41],"relieve":[43],"patients":[44],"as":[45,47],"well":[46],"physicians":[48],"reduce":[50],"treatment":[51],"costs.":[52],"However,":[53,101],"price":[55],"for":[56],"such":[57,93],"disclosure":[61],"lot":[64],"private":[66,178],"data.":[67,100,179],"For":[68,134],"this":[69,135],"reason,":[70,136],"were":[74],"particularly":[75],"considered":[76],"by":[77,120],"European":[79],"General":[80],"Data":[81],"Protection":[82],"Regulation":[83],"(GDPR):":[84],"data":[86,150],"subject's":[87],"explicit":[88],"consent":[89],"required":[91],"when":[92],"service":[95],"processes":[96],"his":[97,175],"or":[98,124,176],"her":[99,177],"elicitation":[103,144],"privacy":[105,113,142,158],"requirements":[106,143],"shortcoming":[109],"in":[110,130,171],"most":[111],"IoT":[112],"systems.":[114],"Either":[115],"user":[117,164],"overwhelmed":[119],"too":[121],"options":[123],"s/he":[125],"not":[127],"sufficiently":[128],"involved":[129],"decision":[132],"process.":[133],"we":[137],"introduce":[138],"EPICUREAN,":[139],"recommender-based":[141],"approach.":[145],"EPICUREAN":[146],"uses":[147],"modeling":[148],"mining":[151],"techniques":[152],"determine":[154],"recommend":[156],"appropriate":[157],"settings":[159],"user.":[162],"The":[163],"thus":[166],"considerably":[167],"supported":[168],"but":[169],"remains":[170],"full":[172],"control":[173],"over":[174]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
