Addressing legal requirements in requirements engineering

PN Otto, AI Antón - 15th IEEE international requirements …, 2007 - ieeexplore.ieee.org
Legal texts, such as regulations and legislation, are playing an increasingly important role in
requirements engineering and system development. Monitoring systems for requirements …

Explainability as a non-functional requirement: challenges and recommendations

L Chazette, K Schneider - Requirements Engineering, 2020 - Springer
Software systems are becoming increasingly complex. Their ubiquitous presence makes
users more dependent on their correctness in many aspects of daily life. As a result, there is …

A brief account of runtime verification

M Leucker, C Schallhart - The journal of logic and algebraic programming, 2009 - Elsevier
In this paper, a brief account of the field of runtime verification is given. Starting with a
definition of runtime verification, a comparison to well-known verification techniques like …

Legal information retrieval systems: State-of-the-art and open issues

C Sansone, G Sperlí - Information Systems, 2022 - Elsevier
In the last years, the legal domain has been revolutionized by the use of Information and
Communication Technologies, producing large amount of digital information. Legal …

[PDF][PDF] Business process regulatory compliance management solution frameworks: A comparative evaluation

M El Kharbili - Proceedings of the Eighth Asia …, 2012 - crpit.scem.westernsydney.edu.au
Regulatory compliance management (RCM) is a problem gaining wide interest in the
business process management (BPM) community. However, research has not yet provided …

Security requirements engineering: A framework for representation and analysis

C Haley, R Laney, J Moffett… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
This paper presents a framework for security requirements elicitation and analysis. The
framework is based on constructing a context for the system, representing security …

Automated requirements identification from construction contract documents using natural language processing

F Hassan, T Le - Journal of Legal Affairs and Dispute Resolution in …, 2020 - ascelibrary.org
Contract documents are a critical legal component of a construction project that specify all
wishes and expectations of the owner toward the design, construction, and handover of a …

Bringing design to the privacy table: Broadening “design” in “privacy by design” through the lens of HCI

RY Wong, DK Mulligan - Proceedings of the 2019 CHI conference on …, 2019 - dl.acm.org
In calls for privacy by design (PBD), regulators and privacy scholars have investigated the
richness of the concept of" privacy." In contrast," design" in HCI is comprised of rich and …

Analyzing regulatory rules for privacy and security requirements

T Breaux, A Antón - IEEE transactions on software engineering, 2008 - ieeexplore.ieee.org
Information practices that use personal, financial and health-related information are
governed by US laws and regulations to prevent unauthorized use and disclosure. To …

Outlining traceability: A principle for operationalizing accountability in computing systems

JA Kroll - Proceedings of the 2021 ACM Conference on Fairness …, 2021 - dl.acm.org
Accountability is widely understood as a goal for well governed computer systems, and is a
sought-after value in many governance contexts. But how can it be achieved? Recent work …