On the risks and safeguards for requirements engineering in global software development: Systematic literature review and quantitative assessment

J Nicolás, JMC De Gea, B Nicolas… - IEEE …, 2018 - ieeexplore.ieee.org
Requirements engineering (RE) is a critical process in software development which faces
important risks when performed in a global software development (GSD) setting. Some of …

A critical analysis of privacy design strategies

M Colesky, JH Hoepman… - 2016 IEEE security and …, 2016 - ieeexplore.ieee.org
The upcoming General Data Protection Regulation is quickly becoming of great concern to
organizations which process personal data of European citizens. It is however nontrivial to …

A systematic review of goal-oriented requirements management frameworks for business process compliance

S Ghanavati, D Amyot, L Peyton - 2011 Fourth International …, 2011 - ieeexplore.ieee.org
Legal compliance has been an active topic in Software Engineering and Information
Systems for many years. However, business analysts and others recently started exploiting …

Analyzing regulatory rules for privacy and security requirements

T Breaux, A Antón - IEEE transactions on software engineering, 2008 - ieeexplore.ieee.org
Information practices that use personal, financial and health-related information are
governed by US laws and regulations to prevent unauthorized use and disclosure. To …

The grace period has ended: An approach to operationalize GDPR requirements

V Ayala-Rivera, L Pasquale - 2018 IEEE 26th International …, 2018 - ieeexplore.ieee.org
The General Data Protection Regulation (GDPR) aims to protect personal data of EU
residents and can impose severe sanctions for non-compliance. Organizations are currently …

GaiusT: supporting the extraction of rights and obligations for regulatory compliance

N Zeni, N Kiyavitskaya, L Mich, JR Cordy… - Requirements …, 2015 - Springer
Ensuring compliance of software systems with government regulations, policies, and laws is
a complex problem. Generally speaking, solutions to the problem first identify rights and …

Mind the gap: assessing the conformance of software traceability to relevant guidelines

P Rempel, P Mäder, T Kuschke… - Proceedings of the 36th …, 2014 - dl.acm.org
Many guidelines for safety-critical industries such as aeronautics, medical devices, and
railway communications, specify that traceability must be used to demonstrate that a …

Compliance analysis based on a goal-oriented requirement language evaluation methodology

S Ghanavati, D Amyot, L Peyton - 2009 17th IEEE International …, 2009 - ieeexplore.ieee.org
In recent years, many governmental regulations have been introduced to protect the privacy
of personal information. As a result, organizations must take a systematic approach to …

[图书][B] Legal requirements acquisition for the specification of legally compliant information systems

TD Breaux - 2009 - search.proquest.com
US federal and state regulations impose mandatory and discretionary requirements on
industry-wide business practices to achieve non-functional, societal goals such as improved …

Analyzing privacy policies through syntax-driven semantic analysis of information types

MB Hosseini, TD Breaux, R Slavin, J Niu… - Information and Software …, 2021 - Elsevier
Context: Several government laws and app markets, such as Google Play, require the
disclosure of app data practices to users. These data practices constitute critical privacy …