Understanding the GDPR from a requirements engineering perspective—a systematic mapping study on regulatory data protection requirements

C Negri-Ribalta, M Lombard-Platet… - Requirements Engineering, 2024 - Springer
Data protection compliance is critical from a requirements engineering (RE) perspective,
both from a software development lifecycle (SDLC) perspective and regulatory compliance …

Nlp-based automated compliance checking of data processing agreements against gdpr

OA Cejas, MI Azeem, S Abualhaija… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
When the entity processing personal data (the processor) differs from the one collecting
personal data (the controller), processing personal data is regulated in Europe by the …

Automating the extraction of rights and obligations for regulatory compliance

N Kiyavitskaya, N Zeni, TD Breaux, AI Antón… - … Modeling-ER 2008 …, 2008 - Springer
Government regulations are increasingly affecting the security, privacy and governance of
information systems in the United States, Europe and elsewhere. Consequently, companies …

Automated compliance checking in the context of Industry 4.0: from a systematic review to an empirical fuzzy multi-criteria approach

VHC Cunha, RGG Caiado, ET Corseuil, HF Neves… - Soft Computing, 2021 - Springer
Nowadays, the industry is undergoing the Fourth Industrial Revolution, and techniques and
algorithms for automated compliance checking (ACC) are continually being improved …

[图书][B] Legal requirements acquisition for the specification of legally compliant information systems

TD Breaux - 2009 - search.proquest.com
US federal and state regulations impose mandatory and discretionary requirements on
industry-wide business practices to achieve non-functional, societal goals such as improved …

Automatic semantic edge labeling over legal citation graphs

A Sadeghian, L Sundaram, DZ Wang… - Artificial Intelligence and …, 2018 - Springer
A large number of cross-references to various bodies of text are used in legal texts, each
serving a different purpose. It is often necessary for authorities and companies to look into …

Consumer search behavior in online shopping environments

N Kumar, KR Lang, Q Peng - Proceedings of the 38th Annual …, 2005 - ieeexplore.ieee.org
This paper explores search behavior of online shoppers. Information economics literature
suggests that search cost in electronic markets has essentially been reduced to zero as …

Automatic extraction of legal norms: Evaluation of natural language processing tools

G Ferraro, HP Lam, SC Tosatto, F Olivieri… - New Frontiers in Artificial …, 2020 - Springer
Extracting and formalising legal norms from legal documents is a time-consuming and
complex procedure. Therefore, the automatic methods that can accelerate this process are …

Legal requirements, compliance and practice: an industry case study in accessibility

TD Breaux, AI Antón, K Boucher… - 2008 16th IEEE …, 2008 - ieeexplore.ieee.org
US laws and regulations are designed to support broad societal goals, such as accessibility,
privacy and safety. To demonstrate that a product complies with these goals, businesses …

Sharing cyber threat intelligence under the general data protection regulation

A Albakri, E Boiten, R De Lemos - … and Policy: 7th Annual Privacy Forum …, 2019 - Springer
Abstract Sharing Cyber Threat Intelligence (CTI) is a key strategy for improving cyber
defense, but there are risks of breaching regulations and laws regarding privacy. With …