Crowd intelligence in requirements engineering: Current status and future directions

JA Khan, L Liu, L Wen, R Ali - … , REFSQ 2019, Essen, Germany, March 18 …, 2019 - Springer
Software systems are the joint creative products of multiple stakeholders, including both
designers and users, based on their perception, knowledge and personal preferences of the …

A survey of the use of crowdsourcing in software engineering

K Mao, L Capra, M Harman, Y Jia - Journal of Systems and Software, 2017 - Elsevier
The term 'crowdsourcing'was initially introduced in 2006 to describe an emerging distributed
problem-solving model by online workers. Since then it has been widely studied and …

The creation and analysis of a website privacy policy corpus

S Wilson, F Schaub, AA Dara, F Liu… - Proceedings of the …, 2016 - aclanthology.org
Website privacy policies are often ignored by Internet users, because these documents tend
to be long and difficult to understand. However, the significance of privacy policies greatly …

Toward a framework for detecting privacy policy violations in android application code

R Slavin, X Wang, MB Hosseini, J Hester… - Proceedings of the 38th …, 2016 - dl.acm.org
Mobile applications frequently access sensitive personal information to meet user or
business requirements. Because such information is sensitive in general, regulators …

PrivOnto: A semantic framework for the analysis of privacy policies

A Oltramari, D Piraviperumal, F Schaub… - Semantic …, 2018 - content.iospress.com
Privacy policies are intended to inform users about the collection and use of their data by
websites, mobile apps and other services or appliances they interact with. This also includes …

Guileak: Tracing privacy policy claims on user input data for android applications

X Wang, X Qin, MB Hosseini, R Slavin… - Proceedings of the 40th …, 2018 - dl.acm.org
The Android mobile platform supports billions of devices across more than 190 countries
around the world. This popularity coupled with user data collection by Android apps has …

Empirical evaluation of tools for hairy requirements engineering tasks

DM Berry - Empirical Software Engineering, 2021 - Springer
Context A hairy requirements engineering (RE) task involving natural language (NL)
documents is (1) a non-algorithmic task to find all relevant answers in a set of documents …

Ambiguity in privacy policies and the impact of regulation

JR Reidenberg, J Bhatia, TD Breaux… - The Journal of Legal …, 2016 - journals.uchicago.edu
Website privacy policies often contain ambiguous language that undermines the purpose
and value of privacy notices for site users. This paper compares the impact of different …

A theory of vagueness and privacy risk perception

J Bhatia, TD Breaux, JR Reidenberg… - 2016 IEEE 24th …, 2016 - ieeexplore.ieee.org
Ambiguity arises in requirements when a statement is unintentionally or otherwise
incomplete, missing information, or when a word or phrase has more than one possible …

On the ridiculousness of notice and consent: Contradictions in app privacy policies

E Okoyomon, N Samarin… - … (ConPro 2019), in …, 2019 - dspace.networks.imdea.org
The dominant privacy framework of the information age relies on notions of “notice and
consent.” That is, service providers will disclose, often through privacy policies, their data …