메뉴 건너뛰기




Volumn 30, Issue 4, 2011, Pages 178-193

Legally "reasonable" security requirements: A 10-year FTC retrospective

Author keywords

Case study; Legal compliance; Reasonability; Requirements; Security

Indexed keywords

CASE STUDY; LEGAL COMPLIANCE; REASONABILITY; REQUIREMENTS; SECURITY;

EID: 79955475331     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2010.11.003     Document Type: Article
Times cited : (27)

References (47)
  • 1
    • 17744389340 scopus 로고    scopus 로고
    • A requirements taxonomy for reducing Web site privacy vulnerabilities
    • A.I. Antón, and J.B. Earp A requirements taxonomy for reducing web site privacy vulnerabilities Requirements Engineering Journal 9 3 Spring 2004 169 185 (Pubitemid 39168556)
    • (2004) REQUIREMENTS ENGINEERING , vol.9 , Issue.3 , pp. 169-185
    • Anton, A.I.1    Earp, J.B.2
  • 3
    • 3042736362 scopus 로고    scopus 로고
    • Internet privacy law: A comparison between the United states and the European Union
    • David L. Baumer, Julie B. Earp, and J.C. Poindexter Internet privacy law: a comparison between the United states and the European Union Computers and Security 23 5 2004 400 412
    • (2004) Computers and Security , vol.23 , Issue.5 , pp. 400-412
    • Baumer, D.L.1    Earp, J.B.2    Poindexter, J.C.3
  • 4
    • 84889708715 scopus 로고    scopus 로고
    • To serve and protect: Do businesses have a legal duty to protect collections of personal information?
    • D.A. Bishop To serve and protect: do businesses have a legal duty to protect collections of personal information? Shidler Journal of Law, Commerce and Technology 3 2006 7
    • (2006) Shidler Journal of Law, Commerce and Technology , vol.3 , pp. 7
    • Bishop, D.A.1
  • 5
    • 79955478956 scopus 로고    scopus 로고
    • The HIPAA final security standards and ISO/IEC 17799
    • SANS Institute
    • S. Borkin The HIPAA final security standards and ISO/IEC 17799 In collect. information security reading room July 2003 SANS Institute
    • (2003) Collect. Information Security Reading Room
    • Borkin, S.1
  • 9
    • 40449096076 scopus 로고    scopus 로고
    • Analyzing regulatory rules for privacy and security requirements
    • T.D. Breaux, and A.I. Antón Analyzing regulatory rules for privacy and security requirements IEEE Transactions on Software Engineering 34 1 January/February 2008 5 20 Special Issue on Software Engineering for Secure Systems
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.1 , pp. 5-20
    • Breaux, T.D.1    Antón, A.I.2
  • 14
    • 57849159727 scopus 로고    scopus 로고
    • A distributed requirements management framework for compliance and accountability
    • T.D. Breaux, A.I. Antón, and E.H. Spafford A distributed requirements management framework for compliance and accountability Computers and Security 28 1-2 2009 8 17
    • (2009) Computers and Security , vol.28 , Issue.12 , pp. 8-17
    • Breaux, T.D.1    Antón, A.I.2    Spafford, E.H.3
  • 16
    • 33847309878 scopus 로고    scopus 로고
    • E-commerce and information privacy: Privacy policies as personal information protectors
    • C.A. Ciocchetti E-commerce and information privacy: privacy policies as personal information protectors American Business Law Journal 44 Spring, 2007 55
    • (2007) American Business Law Journal , vol.44 , pp. 55
    • Ciocchetti, C.A.1
  • 18
    • 79955480036 scopus 로고    scopus 로고
    • 2007 eCrime watch survey
    • ®, and Microsoft Corp
    • ®, and Microsoft Corp 2007 eCrime watch survey CSO Magazine Sep. 2007
    • (2007) CSO Magazine
  • 21
    • 0003706051 scopus 로고    scopus 로고
    • 8th ed ThompsonWest St. Paul, Minnesota
    • B.A. Garner Blacks law dictionary 8th ed 2004 ThompsonWest St. Paul, Minnesota
    • (2004) Blacks Law Dictionary
    • Garner, B.A.1
  • 24
    • 40449096402 scopus 로고    scopus 로고
    • Security requirements engineering: A framework for representation and analysis
    • DOI 10.1109/TSE.2007.70754
    • C.B. Haley, R.C. Laney, J.D. Moffett, and B. Nuseibeh Security requirements engineering: a framework for representation and analysis IEEE Transactions on Software Engineering 34 1 2008 133 153 (Pubitemid 351343906)
    • (2008) IEEE Transactions on Software Engineering , vol.34 , Issue.1 , pp. 133-153
    • Haley, C.B.1    Laney, R.2    Moffett, J.D.3    Nuseibeh, B.4
  • 25
    • 79955479555 scopus 로고    scopus 로고
    • Liability for consumer information security breaches: Deconstructing FTC complaints against businesses victimized by consumer information security breaches
    • J.B. Hanson Liability for consumer information security breaches: deconstructing FTC complaints against businesses victimized by consumer information security breaches Shidler Journal of Law, Commerce and Technology 4 2008 11
    • (2008) Shidler Journal of Law, Commerce and Technology , vol.4 , pp. 11
    • Hanson, J.B.1
  • 26
    • 79955481881 scopus 로고    scopus 로고
    • Control objectives for information and related technology (COBIT)
    • Information Technology Governance Institute
    • Information Technology Governance Institute, Control objectives for information and related technology (COBIT), Version 4.1; 2007.
    • (2007) Version 4.1
  • 30
    • 47949130986 scopus 로고    scopus 로고
    • Business process-based regulatory compliance: The case of the Sarbanes-Oxley act
    • Karagiannis D, Mylopoulos J, Schwab M. Business process-based regulatory compliance: the case of the Sarbanes-Oxley act, In: IEEE Int'l Req'ts Engr. Conf.; 2007. p. 315-21.
    • (2007) IEEE Int'l req'Ts Engr. Conf. , pp. 315-321
    • Karagiannis, D.1    Mylopoulos, J.2    Schwab, M.3
  • 31
    • 84870321814 scopus 로고    scopus 로고
    • 2008 Identity fraud survey report: Identity fraud continues to decline, but criminals more effective at using all channels
    • R. Kim 2008 Identity fraud survey report: identity fraud continues to decline, but criminals more effective at using all channels Javelin Strategy and Research Feb. 2008
    • (2008) Javelin Strategy and Research
    • Kim, R.1
  • 32
  • 34
    • 34548563765 scopus 로고    scopus 로고
    • Computer-aided support for secure tropos
    • DOI 10.1007/s10515-007-0013-5
    • F. Massacci, J. Mylopoulos, and N. Zannone Computer-aided support for Secure Tropos Automated Software Engineering 14 3 Sep. 2007 341 364 (Pubitemid 47397543)
    • (2007) Automated Software Engineering , vol.14 , Issue.3 , pp. 341-364
    • Massacci, F.1    Mylopoulos, J.2    Zannone, N.3
  • 35
    • 85088409477 scopus 로고    scopus 로고
    • Security quality requirements engineering (SQUARE) methodology, Proc. Software Engineering for Secure Systems (SESS) - Building trustworthy applications
    • N.R. Mead, and T. Stehney Security quality requirements engineering (SQUARE) methodology, Proc. Software Engineering for Secure Systems (SESS) - building trustworthy applications ACM Software Engineering Notes 30 4 2005 1 7
    • (2005) ACM Software Engineering Notes , vol.30 , Issue.4 , pp. 1-7
    • Mead, N.R.1    Stehney, T.2
  • 36
    • 4243139489 scopus 로고    scopus 로고
    • The HIPAA-potamus in health care data security
    • Rebecca T. Mercuri The HIPAA-potamus in health care data security Communications of the ACM 47 7 2004 25 28
    • (2004) Communications of the ACM , vol.47 , Issue.7 , pp. 25-28
    • Mercuri, R.T.1
  • 37
    • 77954707932 scopus 로고    scopus 로고
    • Reasonableness meets requirements: Regulating security and privacy in software
    • P.N. Otto Reasonableness meets requirements: regulating security and privacy in software Duke Law Journal 2009
    • (2009) Duke Law Journal
    • Otto, P.N.1
  • 38
    • 79955483804 scopus 로고    scopus 로고
    • Protecting the most valuable corporate asset: Electronic data, identity theft, personal information and the role of data security in the information age
    • K.M. Siegel Protecting the most valuable corporate asset: electronic data, identity theft, personal information and the role of data security in the information age Pennsylvania State Law Review 111 Winter 2007 779
    • (2007) Pennsylvania State Law Review , vol.111 , pp. 779
    • Siegel, K.M.1
  • 39
    • 13644252644 scopus 로고    scopus 로고
    • Eliciting security requirements with misuse cases
    • G. Sindre, and A.L. Opdahl Eliciting security requirements with misuse cases Requirements Engineering Journal 10 1 Jan. 2005 34 44
    • (2005) Requirements Engineering Journal , vol.10 , Issue.1 , pp. 34-44
    • Sindre, G.1    Opdahl, A.L.2
  • 40
    • 79955476068 scopus 로고    scopus 로고
    • It's all about trust: The expanding scope of security obligations in global privacy and e-transactions law
    • T.J. Smedinghoff It's all about trust: the expanding scope of security obligations in global privacy and e-transactions law Michigan State Journal of International Law 16 2007 1
    • (2007) Michigan State Journal of International Law , vol.16 , pp. 1
    • Smedinghoff, T.J.1
  • 41
    • 27644567989 scopus 로고    scopus 로고
    • Legal requirements reuse: A critical success factor for requirements quality and personal data protection
    • Toval S, Olmos A, Piattini M. Legal requirements reuse: a critical success factor for requirements quality and personal data protection. In: IEEE Int'l Conf. Req'ts Engr., 2002, pp. 95-103.
    • (2002) IEEE Int'l Conf. req'Ts Engr. , pp. 95-103
    • Toval, S.1    Olmos, A.2    Piattini, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.