Natural language processing for requirements engineering: A systematic mapping study

L Zhao, W Alhoshan, A Ferrari, KJ Letsholo… - ACM Computing …, 2021 - dl.acm.org
Natural Language Processing for Requirements Engineering (NLP4RE) is an area of
research and development that seeks to apply natural language processing (NLP) …

Privacy in mobile technology for personal healthcare

S Avancha, A Baxi, D Kotz - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Information technology can improve the quality, efficiency, and cost of healthcare. In this
survey, we examine the privacy requirements of mobile computing technologies that have …

A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements

M Deng, K Wuyts, R Scandariato, B Preneel… - Requirements …, 2011 - Springer
Ready or not, the digitalization of information has come, and privacy is standing out there,
possibly at stake. Although digital privacy is an identified priority in our society, few …

Privee: An architecture for automatically analyzing web privacy policies

S Zimmeck, SM Bellovin - 23rd USENIX Security Symposium (USENIX …, 2014 - usenix.org
Privacy policies on websites are based on the notice-and-choice principle. They notify Web
users of their privacy choices. However, many users do not read privacy policies or have …

Automated information transformation for automated regulatory compliance checking in construction

J Zhang, NM El-Gohary - Journal of Computing in Civil Engineering, 2015 - ascelibrary.org
To fully automate regulatory compliance checking of construction projects, regulatory
requirements need to be automatically extracted from various construction regulatory …

Accountability as a way forward for privacy protection in the cloud

S Pearson, A Charlesworth - … 2009, Beijing, China, December 1-4, 2009 …, 2009 - Springer
The issue of how to provide appropriate privacy protection for cloud computing is important,
and as yet unresolved. In this paper we propose an approach in which procedural and …

Extracting and classifying requirements from software engineering contracts

A Sainani, PR Anish, V Joshi… - 2020 IEEE 28th …, 2020 - ieeexplore.ieee.org
In this paper, we present our work on extracting and classifying requirements from large
software engineering contracts. Typically, the process of requirements elicitation begins after …

A machine learning approach for tracing regulatory codes to product specific requirements

J Cleland-Huang, A Czauderna, M Gibiec… - Proceedings of the …, 2010 - dl.acm.org
Regulatory standards, designed to protect the safety, security, and privacy of the public,
govern numerous areas of software intensive systems. Project personnel must therefore …

[HTML][HTML] Assessing frameworks for eliciting privacy & security requirements from laws and regulations

O Olukoya - Computers & Security, 2022 - Elsevier
The processing of personal data has become a prominent concern for stakeholders when
selecting software or service providers to serve their needs. Different laws and legislation …

PrivOnto: A semantic framework for the analysis of privacy policies

A Oltramari, D Piraviperumal, F Schaub… - Semantic …, 2018 - content.iospress.com
Privacy policies are intended to inform users about the collection and use of their data by
websites, mobile apps and other services or appliances they interact with. This also includes …