human intelligent (crowdsourcing) with automated methods to produce improved security and privacy requirements incorporating knowledge from post-deployment artifacts such as breach reports.
We propose and evaluate an information extraction and analysis framework that combines human intelligent (crowdsourcing) with automated methods to produce improved security and privacy requirements incorporating knowledge from post-deployment artifacts such as breach reports.