From legal contracts to formal specifications: A systematic literature review

M Soavi, N Zeni, J Mylopoulos, L Mich - SN Computer Science, 2022 - Springer
The opportunity to automate and monitor the execution of legal contracts is gaining
increasing interest in Business and Academia, thanks to the advent of smart contracts …

A critical analysis of legal requirements engineering from the perspective of legal practice

G Boella, L Humphreys, R Muthuri… - 2014 IEEE 7th …, 2014 - ieeexplore.ieee.org
This paper reviews existing approaches to representing legal knowledge for legal
requirements engineering. Legal requirement methodologies are rarely developed together …

Empirical evaluation of tools for hairy requirements engineering tasks

DM Berry - Empirical Software Engineering, 2021 - Springer
Context A hairy requirements engineering (RE) task involving natural language (NL)
documents is (1) a non-algorithmic task to find all relevant answers in a set of documents …

Legal accountability as software quality: A us data processing perspective

TD Breaux, T Norton - 2022 IEEE 30th International …, 2022 - ieeexplore.ieee.org
Software and hardware innovation has led to new consumer products and services with
significant benefits to consumers and society. These advances, however, can come with …

Mind the gap: assessing the conformance of software traceability to relevant guidelines

P Rempel, P Mäder, T Kuschke… - Proceedings of the 36th …, 2014 - dl.acm.org
Many guidelines for safety-critical industries such as aeronautics, medical devices, and
railway communications, specify that traceability must be used to demonstrate that a …

Large-scale and drift-free surface reconstruction using online subvolume registration

N Fioraio, J Taylor, A Fitzgibbon… - Proceedings of the …, 2015 - openaccess.thecvf.com
Depth cameras have helped commoditize 3D digitization of the real-world. It is now feasible
to use a single Kinect-like camera to scan in an entire building or other large-scale scenes …

A taxonomy for mining and classifying privacy requirements in issue reports

P Sangaroonsilp, HK Dam, M Choetkiertikul… - Information and …, 2023 - Elsevier
Context: Digital and physical trails of user activities are collected over the use of software
applications and systems. As software becomes ubiquitous, protecting user privacy has …

Foundations for an expert system in domain-specific traceability

J Guo, J Cleland-Huang… - 2013 21st IEEE …, 2013 - ieeexplore.ieee.org
Attempts to utilize information retrieval techniques to fully automate the creation of
traceability links have been hindered by terminology mismatches between source and target …

Invalidating policies using structural information

F Kammüller, CW Probst - 2013 IEEE Security and Privacy …, 2013 - ieeexplore.ieee.org
Insider threats are a major threat to many organisations. Even worse, insider attacks are
usually hard to detect, especially if an attack is based on actions that the attacker has the …

Automated recommendation of templates for legal requirements

A Sleimi, M Ceci, M Sabetzadeh… - 2020 IEEE 28th …, 2020 - ieeexplore.ieee.org
Context: In legal requirements elicitation, requirements analysts need to extract obligations
from legal texts. However, legal texts often express obligations only indirectly, for example …