Calikli, G., Law, M., Bandara, A. K., Russo, A., Dickens,
L., Price, B. A., Stuart, A., Levine, M., and Nuseibeh,
B. (2016). Privacy dynamics: Learning privacy norms
for social software. In 2016 IEEE/ACM 11th Interna-
tional Symposium on Software Engineering for Adap-
tive and Self-Managing Systems (SEAMS), pages 47–
56. IEEE.
Curumsing, M. K., Fernando, N., Abdelrazek, M., Vasa, R.,
Mouzakis, K., and Grundy, J. (2019). Understand-
ing the impact of emotions on software: A case study
in requirements gathering and evaluation. Journal of
Systems and Software, 147:215–229.
Doyle, T. (2011). Helen nissenbaum, privacy in context:
technology, policy, and the integrity of social life.
Dritsas, S., Gymnopoulos, L., Karyda, M., Balopoulos, T.,
Kokolakis, S., Lambrinoudakis, C., and Katsikas, S.
(2006). A knowledge-based approach to security re-
quirements for e-health applications. Electronic Jour-
nal for E-Commerce Tools and Applications, pages 1–
24.
Friedewald, M., Finn, R. L., Wright, D., Gutwirth, S.,
Lenes, R., Hart, P., and Poullet, Y. (2013). Seven
types of privacy. European Data Protection: Coming
of Age, pages 3–32.
Gambo, I., Oluwagbemi, O., and Achimugu, P. (2011).
Lack of interoperable health information systems in
developing countries: an impact analysis. Journal of
Health Informatics in Developing Countries, 5(1).
Gambo, I., Soriyan, A., and Ikono, R. (2014). Framework
for enhancing requirements engineering processes: a
conceptual view of health information system. Inter-
national Journal of Computer Applications, 93(2).
Gambo, I. and Taveter, K. (2021). A pragmatic view on
resolving conflicts in goal-oriented requirements engi-
neering for socio-technical systems. In Proceedings of
the 16th International Conference on Software Tech-
nologies, ICSOFT 2021, pages 333–341.
Gambo, I. and Taveter, K. (2022). Stakeholder-Centric
Clustering Methods for Conflict Resolution in the Re-
quirements Engineering Process, volume 1556 CCIS
of Communications in Computer and Information Sci-
ence.
Gambo, I. P. and Soriyan, A. H. (2017). Ict implementa-
tion in the nigerian healthcare system. IT Professional,
19(2):12–15.
Gharib, M., Giorgini, P., and Mylopoulos, J. (2021). Copri
v. 2—a core ontology for privacy requirements. Data
& Knowledge Engineering, 133:101888.
Harmon, R. R., Castro-Leon, E. G., and Bhide, S. (2015).
Smart cities and the internet of things. In 2015 Port-
land International Conference on Management of En-
gineering and Technology (PICMET), pages 485–494.
IEEE.
Ismagilova, E., Hughes, L., Rana, N. P., and Dwivedi, Y. K.
(2020). Security, privacy and risks within smart cities:
Literature review and development of a smart city in-
teraction framework. Information Systems Frontiers,
pages 1–22.
Langheinrich, M. (2002). A privacy awareness system for
ubiquitous computing environments. In international
conference on Ubiquitous Computing, pages 237–245.
Springer.
Mart
´
ınez-Ballest
´
e, A., P
´
erez-Mart
´
ınez, P. A., and Solanas,
A. (2013). The pursuit of citizens’ privacy: a privacy-
aware smart city is possible. IEEE Communications
Magazine, 51(6):136–141.
McNeill, A., Briggs, P., Pywell, J., and Coventry, L. (2017).
Functional privacy concerns of older adults about per-
vasive health-monitoring systems. In Proceedings of
the 10th international conference on pervasive tech-
nologies related to assistive environments, pages 96–
102.
Miller, T., Pedell, S., Sterling, L., Vetere, F., and Howard,
S. (2012). Understanding socially oriented roles and
goals through motivational modelling. Journal of Sys-
tems and Software, 85(9):2160–2170.
Omoronyia, I., Cavallaro, L., Salehie, M., Pasquale, L., and
Nuseibeh, B. (2013). Engineering adaptive privacy:
on the role of privacy awareness requirements. In
2013 35th International Conference on Software En-
gineering (ICSE), pages 632–641. IEEE.
Peters, F., Hanvey, S., Veluru, S., Mady, A. E.-d.,
Boubekeur, M., and Nuseibeh, B. (2018). Generat-
ing privacy zones in smart cities. In 2018 IEEE Inter-
national Smart Cities Conference (ISC2), pages 1–8.
IEEE.
Runeson, P., H
¨
ost, M., Rainer, A., and Regnell, B.
(2012). Case study research in software engineering-
guidelines and examples wiley.
Schaub, F., K
¨
onings, B., Weber, M., and Kargl, F. (2012).
Towards context adaptive privacy decisions in ubiq-
uitous computing. In 2012 IEEE International Con-
ference on Pervasive Computing and Communications
Workshops, pages 407–410. IEEE.
Solove, D. J. (2005). A taxonomy of privacy. U. Pa. L. Rev.,
154:477.
Taveter, K., Sterling, L., Pedell, S., Burrows, R., and
Taveter, E. M. (2019). A method for eliciting and
representing emotional requirements: Two case stud-
ies in e-healthcare. In 2019 IEEE 27th Interna-
tional Requirements Engineering Conference Work-
shops (REW), pages 100–105.
Thielke, S., Harniss, M., Thompson, H., Patel, S., Demiris,
G., and Johnson, K. (2012). Maslow’s hierarchy
of human needs and the adoption of health-related
technologies for older adults. Ageing international,
37(4):470–488.
Thomas, K., Bandara, A. K., Price, B. A., and Nuseibeh,
B. (2014). Distilling privacy requirements for mobile
applications. In Proceedings of the 36th international
conference on software engineering, pages 871–882.
Van Zoonen, L. (2016). Privacy concerns in smart cities.
Government Information Quarterly, 33(3):472–480.
Westin, A. F. (1968). Privacy and freedom. Washington and
Lee Law Review, 25(1):166.
Incorporating Privacy Requirements in Smart Communities for Older Adults: A Research Vision
249