A survey and classification of controlled natural languages

T Kuhn - Computational linguistics, 2014 - direct.mit.edu
What is here called controlled natural language (CNL) has traditionally been given many
different names. Especially during the last four decades, a wide variety of such languages …

Supporting process model validation through natural language generation

H Leopold, J Mendling… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The design and development of process-aware information systems is often supported by
specifying requirements as business process models. Although this approach is generally …

[PDF][PDF] The usable privacy policy project

N Sadeh, A Acquisti, TD Breaux… - … , CMU-ISR-13 …, 2013 - reports-archive.adm.cs.cmu.edu
Natural language privacy policies have become a de facto standard to address expectations
of “notice and choice” on the Web [FTC10]. Yet, there is ample evidence that users generally …

Automating the extraction of rights and obligations for regulatory compliance

N Kiyavitskaya, N Zeni, TD Breaux, AI Antón… - … Modeling-ER 2008 …, 2008 - Springer
Government regulations are increasingly affecting the security, privacy and governance of
information systems in the United States, Europe and elsewhere. Consequently, companies …

Ml-based compliance verification of data processing agreements against gdpr

O Amaral, S Abualhaija, L Briand - 2023 IEEE 31st international …, 2023 - ieeexplore.ieee.org
Most current software systems involve processing personal data, an activity that is regulated
in Europe by the general data protection regulation (GDPR) through data processing …

Scaling requirements extraction to the crowd: Experiments with privacy policies

TD Breaux, F Schaub - 2014 IEEE 22nd International …, 2014 - ieeexplore.ieee.org
Natural language text sources have increasingly been used to develop new methods and
tools for extracting and analyzing requirements. To validate these new approaches …

Mining privacy goals from privacy policies using hybridized task recomposition

J Bhatia, TD Breaux, F Schaub - ACM Transactions on Software …, 2016 - dl.acm.org
Privacy policies describe high-level goals for corporate data practices; regulators require
industries to make available conspicuous, accurate privacy policies to their customers …

[图书][B] Legal requirements acquisition for the specification of legally compliant information systems

TD Breaux - 2009 - search.proquest.com
US federal and state regulations impose mandatory and discretionary requirements on
industry-wide business practices to achieve non-functional, societal goals such as improved …

Developing production rule models to aid in acquiring requirements from legal texts

JC Maxwell, AI Antón - 2009 17th IEEE International …, 2009 - ieeexplore.ieee.org
Regulatory compliance is an important consideration for requirements engineering because
recent regulations impose costly penalties for noncompliance. This paper details how …

Software licenses in context: The challenge of heterogeneously-licensed systems

TA Alspaugh, W Scacchi… - Journal of the Association …, 2010 - aisel.aisnet.org
The prevailing approach to free/open source software and licenses has been that each
system is developed, distributed, and used under the terms of a single license. But it is …