OA Cejas, MI Azeem, S Abualhaija… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
When the entity processing personal data (the processor) differs from the one collecting personal data (the controller), processing personal data is regulated in Europe by the …
Government regulations are increasingly affecting the security, privacy and governance of information systems in the United States, Europe and elsewhere. Consequently, companies …
Nowadays, the industry is undergoing the Fourth Industrial Revolution, and techniques and algorithms for automated compliance checking (ACC) are continually being improved …
US federal and state regulations impose mandatory and discretionary requirements on industry-wide business practices to achieve non-functional, societal goals such as improved …
A large number of cross-references to various bodies of text are used in legal texts, each serving a different purpose. It is often necessary for authorities and companies to look into …
N Kumar, KR Lang, Q Peng - Proceedings of the 38th Annual …, 2005 - ieeexplore.ieee.org
This paper explores search behavior of online shoppers. Information economics literature suggests that search cost in electronic markets has essentially been reduced to zero as …
Extracting and formalising legal norms from legal documents is a time-consuming and complex procedure. Therefore, the automatic methods that can accelerate this process are …
TD Breaux, AI Antón, K Boucher… - 2008 16th IEEE …, 2008 - ieeexplore.ieee.org
US laws and regulations are designed to support broad societal goals, such as accessibility, privacy and safety. To demonstrate that a product complies with these goals, businesses …
A Albakri, E Boiten, R De Lemos - … and Policy: 7th Annual Privacy Forum …, 2019 - Springer
Abstract Sharing Cyber Threat Intelligence (CTI) is a key strategy for improving cyber defense, but there are risks of breaching regulations and laws regarding privacy. With …