메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Why eliciting and managing legal requirements is hard

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION TECHNOLOGY; REQUIREMENTS ENGINEERING;

EID: 64849091656     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RELAW.2008.10     Document Type: Conference Paper
Times cited : (29)

References (21)
  • 1
    • 8744306752 scopus 로고    scopus 로고
    • Treaty establishing the European community
    • Available at
    • Treaty establishing the European Community. Official Journal of the European Union, (C325):33-184, 2002. Available at http://eur-lex.europa.eu/.
    • (2002) Official Journal of the European Union , Issue.C325 , pp. 33-184
  • 2
    • 1642352973 scopus 로고    scopus 로고
    • The implications of users' multimedia privacy perceptions on communication and information privacy policies
    • A. Adams. The Implications of Users' Multimedia Privacy Perceptions on Communication and Information Privacy Policies. In Proc. of Telecommunications Policy Research Conference, 1999.
    • (1999) Proc. of Telecommunications Policy Research Conference
    • Adams, A.1
  • 3
    • 70450177208 scopus 로고    scopus 로고
    • XmLegesEditor: An OpenSource visual XML editor for supporting legal national standards
    • European Press Academic Publishing
    • T. Agnoloni, E. Francesconi, and P. Spinosa. XmLegesEditor: an OpenSource Visual XML Editor for supporting Legal National Standards. In Proc. of V Legislative XML Workshop. European Press Academic Publishing, 2007.
    • (2007) Proc. of V Legislative XML Workshop
    • Agnoloni, T.1    Francesconi, E.2    Spinosa, P.3
  • 5
    • 0032715650 scopus 로고    scopus 로고
    • On the analysis of regulations using defeasible rules
    • IEEE Press
    • G. Antoniou, D. Billington, and M. J. Maher. On the Analysis of Regulations using Defeasible Rules. In Proc. of HICSS'99, volume 6, page 6033. IEEE Press, 1999.
    • (1999) Proc. of HICSS'99 , vol.6 , pp. 6033
    • Antoniou, G.1    Billington, D.2    Maher, M.J.3
  • 6
    • 84858962439 scopus 로고    scopus 로고
    • Privacy mechanisms supporting the building of trust in e-commerce
    • IEEE Press
    • I. Araujo. Privacy mechanisms supporting the building of trust in e-commerce. In Proc. of PDM'05, page 1193. IEEE Press, 2005.
    • (2005) Proc. of PDM'05 , pp. 1193
    • Araujo, I.1
  • 8
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing regulatory rules for privacy and security requirements
    • T. D. Breaux and A. I. Antón. Analyzing regulatory rules for privacy and security requirements. TSE, 34(1):5-20, 2008.
    • (2008) TSE , vol.34 , Issue.1 , pp. 5-20
    • Breaux, T.D.1    Antón, A.I.2
  • 9
    • 40449121404 scopus 로고    scopus 로고
    • Towards regulatory compliance: Extracting rights and obligations to align requirements with regulations
    • IEEE Press
    • T. D. Breaux, M. W. Vail, and A. I. Antón. Towards regulatory compliance: Extracting rights and obligations to align requirements with regulations. In Proc. of RE'06, pages 46-55. IEEE Press, 2006.
    • (2006) Proc. of RE'06 , pp. 46-55
    • Breaux, T.D.1    Vail, M.W.2    Antón, A.I.3
  • 10
    • 33847010583 scopus 로고    scopus 로고
    • Breaching the security of the kaiser permanente internet patient portal: The organizational foundations of information security
    • J. R. Collmann and T. Cooper. Breaching the Security of the Kaiser Permanente Internet patient Portal: the Organizational Foundations of Information Security. JAMIA, 14(2):239-243, 2007.
    • (2007) JAMIA , vol.14 , Issue.2 , pp. 239-243
    • Collmann, J.R.1    Cooper, T.2
  • 15
    • 20444484185 scopus 로고    scopus 로고
    • Treaties as laws: A defense of the last in time rule for treaties and federal statutes
    • J. Ku. Treaties as laws: A defense of the last in time rule for treaties and federal statutes. Indiana Law Journal, 80:319-391, 2005.
    • (2005) Indiana Law Journal , vol.80 , pp. 319-391
    • Ku, J.1
  • 16
    • 33947620690 scopus 로고    scopus 로고
    • Privacy APIs: Access control techniques to analyze and verify legal privacy policies
    • IEEE Press
    • M. J. May, C. A. Gunter, and I. Lee. Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies. In Proc. of CSFW'06, pages 85-97. IEEE Press, 2006.
    • (2006) Proc. of CSFW'06 , pp. 85-97
    • May, M.J.1    Gunter, C.A.2    Lee, I.3
  • 17
    • 0023247055 scopus 로고
    • Defeasible reasoning
    • IEEE Press
    • D. Nute. Defeasible reasoning. In Proc. of HICSS'87, pages 470-477. IEEE Press, 1987.
    • (1987) Proc. of HICSS'87 , pp. 470-477
    • Nute, D.1
  • 18
    • 18744413116 scopus 로고    scopus 로고
    • Norma-system: A legal document system for managing consolidated acts
    • M. Palmirani and R. Brighi. Norma-System: A Legal Document System for Managing Consolidated Acts. In Proc. of DEXA'02, pages 295-314, 2002.
    • (2002) Proc. of DEXA'02 , pp. 295-314
    • Palmirani, M.1    Brighi, R.2
  • 20
    • 0035107781 scopus 로고    scopus 로고
    • Toward reference models for requirements traceability
    • B. Ramesh and M. Jarke. Toward reference models for requirements traceability. TSE, 27(1):58-93, 2001.
    • (2001) TSE , vol.27 , Issue.1 , pp. 58-93
    • Ramesh, B.1    Jarke, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.