-
1
-
-
84873951871
-
Why software is eating the world
-
Aug
-
M. Andreessen, "Why Software is Eating the World," Wall Street Journal, http://online.wsj.com/article/ SB10001424053111903480904576512250915629460.html, Aug. 2011
-
(2011)
Wall Street Journal
-
-
Andreessen, M.1
-
2
-
-
80051803315
-
Data, data everywhere
-
K. Cukier, "Data, data everywhere," The Economist, http://www. economist.com/node/15557443, Feb. 2010
-
(2010)
The Economist
-
-
Cukier, K.1
-
3
-
-
84891131497
-
On people, the death of privacy, and data pollution
-
March / April
-
B. Schneier and M. Pasiewicz, "On People, the Death of Privacy, and Data Pollution," EDUCAUSE Review, http://www.educause.edu/ero/ article/people-death-privacy-And-data-pollution, March / April 2008
-
(2008)
Educause Review
-
-
Schneier, B.1
Pasiewicz, M.2
-
4
-
-
2342522578
-
Financial privacy policies and the need for standardization
-
Mar Apr
-
A. Ant'on, J. Earp, Q. He, W. Stufflebeam, D. Bolchini, and C. Jensen, "Financial privacy policies and the need for standardization," Security and Privacy, IEEE, vol. 2, no. 2, pp. 36-45, Mar- Apr 2004
-
(2004)
Security and Privacy IEEE
, vol.2
, Issue.2
, pp. 36-45
-
-
Ant'On, A.1
Earp, J.2
He, Q.3
Stufflebeam, W.4
Bolchini, D.5
Jensen, C.6
-
5
-
-
17744389340
-
A requirements taxonomy for reducing web site privacy vulnerabilities
-
A. I. Ant'on and J. B. Earp, "A requirements taxonomy for reducing web site privacy vulnerabilities," Requirements Engineering, vol. 9, no. 3, pp. 169-185, 2004
-
(2004)
Requirements Engineering
, vol.9
, Issue.3
, pp. 169-185
-
-
Ant'On, A.I.1
Earp, J.B.2
-
6
-
-
33847749523
-
Hipaa's effect on web site privacy policies
-
Jan-Feb
-
A. I. Anton, J. B. Eart, M.W. Vail, N. Jain, C. M. Gheen, and J. M. Frink, "Hipaa's effect on web site privacy policies," Security and Privacy, IEEE, vol. 5, no. 1, pp. 45-52, Jan-Feb. 2007
-
(2007)
Security and Privacy IEEE
, vol.5
, Issue.1
, pp. 45-52
-
-
Anton, A.I.1
Eart, J.B.2
Vail, M.W.3
Jain, N.4
Gheen, C.M.5
Frink, J.M.6
-
8
-
-
79952008961
-
Commitment Analysis to Operationalize Software Requirements from Privacy Notices
-
March
-
J. D. Young, "Commitment Analysis to Operationalize Software Requirements from Privacy Notices," Requirements Engineering, vol. 16, no. 1, pp. 33-46, March 2010
-
(2010)
Requirements Engineering
, vol.16
, Issue.1
, pp. 33-46
-
-
Young, J.D.1
-
10
-
-
4243980729
-
Strategies for developing policies and requirements for secure e-commerce systems
-
A. Gosh, Ed. Kluwer Academic Publishers
-
A. I. Ant'on and J. B. Earp, "Strategies for developing policies and requirements for secure e-commerce systems," in Recent Advances in E-Commerce Security and Privacy, A. Gosh, Ed. Kluwer Academic Publishers, 2001, pp. pp. 29-46
-
(2001)
Recent Advances in E-Commerce Security and Privacy
, pp. 29-46
-
-
Ant'On, A.I.1
Earp, J.B.2
-
11
-
-
0141509901
-
Precluding incongruous behavior by aligning software requirements with security and privacy policies
-
A. I. Ant́on, J. B. Earp, and R. A. Carter, "Precluding incongruous behavior by aligning software requirements with security and privacy policies," Information and Software Technology, vol. 45, no. 14, pp. 967-977, 2003
-
(2003)
Information and Software Technology
, vol.45
, Issue.14
, pp. 967-977
-
-
Ant́on, A.I.1
Earp, J.B.2
Carter, R.A.3
-
12
-
-
33744985815
-
Deriving semantic models from privacy policies
-
Sixth IEEE International Workshop on June 6-8, 2005
-
T. Breaux and A. Ant́on, "Deriving semantic models from privacy policies," Policies for Distributed Systems and Networks, 2005. Sixth IEEE International Workshop on, pp. 67-76, June 6-8, 2005 2005
-
(2005)
Policies for Distributed Systems and Networks
, vol.2005
, pp. 67-76
-
-
Breaux, T.1
Ant́on, A.2
-
13
-
-
70349921474
-
Metamodel for privacy policies within SOA
-
Washington, DC, USA: IEEE Computer Society
-
D. S. Allison, H. F. El Yamany, and M. Capretz, "Metamodel for privacy policies within SOA," in IWSESS '09: Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems. Washington, DC, USA: IEEE Computer Society, 2009, pp. 40-46
-
(2009)
IWSESS '09: Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
, pp. 40-46
-
-
Allison, D.S.1
El Yamany, H.F.2
Capretz, M.3
-
15
-
-
45849084997
-
Addressing legal requirements in requirements engineering
-
RE '07. 15th IEEE International 5-14, 15-19 Oct. 2007
-
P. N. Otto and A. I. Ant'on, "Addressing Legal Requirements in Requirements Engineering," Requirements Engineering Conference, 2007. RE '07. 15th IEEE International, pp. 5-14, 15-19 Oct. 2007
-
(2007)
Requirements Engineering Conference
-
-
Otto, P.N.1
Ant'On, A.I.2
-
16
-
-
49149130858
-
An empirical study of consumer perceptions and comprehension of web site privacy policies
-
Aug
-
M. W. Vail, J. B. Earp, and A. I. Ant́on, "An empirical study of consumer perceptions and comprehension of web site privacy policies," Engineering Management, IEEE Transactions on, vol. 55, no. 3, pp. 442-454, Aug. 2008
-
(2008)
Engineering Management IEEE Transactions on
, vol.55
, Issue.3
, pp. 442-454
-
-
Vail, M.W.1
Earp, J.B.2
Ant́on, A.I.3
-
17
-
-
69949164208
-
A comparative study of online privacy policies and formats
-
I. Goldberg and M. Atallah, Eds.Springer Berlin Heidelberg
-
A. McDonald, R. Reeder, P. Kelley, and L. Cranor, "A comparative study of online privacy policies and formats," in Privacy Enhancing Technologies, ser. Lecture Notes in Computer Science, I. Goldberg and M. Atallah, Eds. Springer Berlin Heidelberg, 2009, vol. 5672, pp. 37-55
-
(2009)
Privacy Enhancing Technologies, Ser. Lecture Notes in Computer Science
, vol.5672
, pp. 37-55
-
-
McDonald, A.1
Reeder, R.2
Kelley, P.3
Cranor, L.4
-
19
-
-
14744275332
-
Privacy and rationality in individual decision making
-
Jan-Feb
-
A. Acquisti and J. Grossklags, "Privacy and rationality in individual decision making," IEEE Security and Privacy, vol. 3, no. 1, pp. 26-33, Jan-Feb. 2005
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.1
, pp. 26-33
-
-
Acquisti, A.1
Grossklags, J.2
-
20
-
-
84861170800
-
Probabilistic topic models
-
Ar 2012
-
D. M. Blei, "Probabilistic topic models," Commun. ACM, vol. 55, no. 4, pp. 77-84, Apr. 2012
-
Commun. ACM
, vol.55
, Issue.4
, pp. 77-84
-
-
Blei, D.M.1
-
21
-
-
33745909504
-
Probabilistic topic models
-
T. Landauer D. Mcnamara, S. Dennis, and W. Kintsch, Eds. Laurence Erlbaum
-
M. Steyvers and T. Griffiths, "Probabilistic topic models," in Latent Semantic Analysis: A Road to Meaning., T. Landauer, D. Mcnamara, S. Dennis, and W. Kintsch, Eds. Laurence Erlbaum, 2006
-
(2006)
Latent Semantic Analysis: A Road to Meaning
-
-
Steyvers, M.1
Griffiths, T.2
-
22
-
-
85016111200
-
The role of natural language in requirements engineering Requirements Engineering 1993
-
Jan
-
K. Ryan, "The role of natural language in requirements engineering," in Requirements Engineering, 1993., Proceedings of IEEE International Symposium on, Jan 1993, pp. 240-242
-
(1993)
Proceedings of IEEE International Symposium
, pp. 240-242
-
-
Ryan, K.1
-
23
-
-
84880655688
-
Text as Data : The promise and pitfalls of automatic content analysis methods for political texts
-
forthcoming
-
J. Grimmer and B. M. Stewart, "Text as Data : The Promise and Pitfalls of Automatic Content Analysis Methods for Political Texts," Political Analysis (forthcoming), 2013
-
(2013)
Political Analysis
-
-
Grimmer, J.1
Stewart, B.M.2
-
24
-
-
77951646429
-
A bayesian hierarchical topic model for political texts: Measuring expressed agendas in senate press releases
-
J. Grimmer, "A bayesian hierarchical topic model for political texts: Measuring expressed agendas in senate press releases," Political Analysis, vol. 18, no. 1, pp. 1-35, 2010
-
(2010)
Political Analysis
, vol.18
, Issue.1
, pp. 1-35
-
-
Grimmer, J.1
-
25
-
-
0141607824
-
Latent dirichlet allocation
-
D. M. Blei, A. Ng, and M. Jordan, "Latent dirichlet allocation," JMLR, vol. 3, pp. 993-1022, 2003
-
(2003)
JMLR
, vol.3
, pp. 993-1022
-
-
Blei, D.M.1
Ng, A.2
Jordan, M.3
-
26
-
-
84891111030
-
Necessary but Not Sufficient: Standardized Mechanisms for Privacy Notice and Choice
-
L. F. Cranor, "Necessary But Not Sufficient: Standardized Mechanisms for Privacy Notice and Choice," Journal of Telecommunications and High Technology Law, vol. 10, no. 2, 2012
-
(2012)
Journal of Telecommunications and High Technology Law
, vol.10
, Issue.2
-
-
Cranor, L.F.1
-
27
-
-
34249005931
-
A survey and analysis of the p3p protocol's agents, adoption, maintenance, and future
-
April-June
-
I. Reay, P. Beatty, S. Dick, and J. Miller, "A survey and analysis of the p3p protocol's agents, adoption, maintenance, and future," Dependable and Secure Computing, IEEE Transactions on, vol. 4, no. 2, pp. 151- 164, April-June 2007
-
(2007)
Dependable and Secure Computing IEEE Transactions
, vol.4
, Issue.2
, pp. 151-164
-
-
Reay, I.1
Beatty, P.2
Dick, S.3
Miller, J.4
-
28
-
-
84875540510
-
-
The World Bank per 100 people The World Bank Group
-
The World Bank, "Internet Users (per 100 people)," The World Bank Group, http://data.worldbank.org/ indicator/IT.NET.USER.P2?cid= GPD 44, 2012
-
(2012)
Internet Users
-
-
-
29
-
-
0344229953
-
A new readability yardstick
-
R. F. Flesch, "A New Readability Yardstick," Journal of Applied Psychology, vol. 32, pp. 221-233, 1948
-
(1948)
Journal of Applied Psychology
, vol.32
, pp. 221-233
-
-
Flesch, R.F.1
-
31
-
-
0001736594
-
SMOG grading- A new readability
-
May
-
G. McLaughlin, "SMOG grading- A new readability," Journal of Reading, May 1969
-
(1969)
Journal of Reading
-
-
McLaughlin, G.1
-
32
-
-
0005579279
-
Derivation of new readability formulas (Automated Readability Index, Fog Count and Flesch Reading Ease Formula) for Navy enlisted personnel
-
Naval Technical Training, U. S. Naval Air Station, Memphis, TN.
-
J. Kincaid, J. R.P. Fishburne, R. Rogers, and B. Chissom, "Derivation of new readability formulas (Automated Readability Index, Fog Count and Flesch Reading Ease Formula) for Navy enlisted personnel," Research Branch Report 8-75, Naval Technical Training, U. S. Naval Air Station, Memphis, TN., 1975
-
(1975)
Research Branch Report
, pp. 8-75
-
-
Kincaid, J.1
Fishburne, J.R.P.2
Rogers, R.3
Chissom, B.4
-
33
-
-
84965931772
-
Derivation and Validation of the Automated Readability Index for use with Technical Materials
-
J. Kincaid and E. Smith, "Derivation and Validation of the Automated Readability Index for use with Technical Materials," Human Factors, vol. 12, pp. 457-464, 1970
-
(1970)
Human Factors
, vol.12
, pp. 457-4464
-
-
Kincaid, J.1
Smith, E.2
-
34
-
-
84930559774
-
A readability formula for short passages
-
E. Fry, "A readability formula for short passages," Journal of Reading, vol. 33, no. 8, pp. 594-597, 1990
-
(1990)
Journal of Reading
, vol.33
, Issue.8
, pp. 594-5597
-
-
Fry, E.1
-
40
-
-
1842788824
-
Finding scientific topics
-
T. Griffiths and M. Steyvers, "Finding scientific topics," Proceedings of the National Academy of Sciences of the United States of America, vol. 101, no. Suppl 1, pp. 5228-5235, 2004
-
(2004)
Proceedings of the National Academy of Sciences of the United States of America
, vol.101
, Issue.1
, pp. 5228-5235
-
-
Griffiths, T.1
Steyvers, M.2
-
41
-
-
77954725706
-
On smoothing and inference for topic models
-
UAI '09. Arlington, Virginia, United States: AUAI Press
-
A. Asuncion, M. Welling, P. Smyth, and Y. W. Teh, "On smoothing and inference for topic models," in Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence, ser. UAI '09. Arlington, Virginia, United States: AUAI Press, 2009, pp. 27-34
-
(2009)
Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence, ser
, pp. 27-34
-
-
Asuncion, A.1
Welling, M.2
Smyth, P.3
Teh, Y.W.4
-
42
-
-
84907095419
-
R: A language and environment for statistical computing
-
R Development Core Team
-
R Development Core Team, "R: A Language and Environment for Statistical Computing," R Foundation for Statistical Computing, http: //www.R-project.org, 2012
-
(2012)
R Foundation for Statistical Computing
-
-
-
43
-
-
84948481845
-
An algorithm for suffix stripping
-
M. Porter, "An Algorithm for Suffix Stripping," Program, vol. 14, no. 3, pp. 130-137, 1980
-
(1980)
Program
, vol.14
, Issue.3
, pp. 130-1137
-
-
Porter, M.1
-
44
-
-
84953744816
-
A statistical interpretation of term specificity and its application in retrieval
-
K.S. Jones, "A statistical interpretation of term specificity and its application in retrieval," Journal of Documentation, vol. 28, no. 1, pp. 11-21, 1972
-
(1972)
Journal of Documentation
, vol.28
, Issue.1
, pp. 11-121
-
-
Jones, K.S.1
-
45
-
-
85050785331
-
An estimate of an upper bound for the entropy of english
-
P. F. Brown, S. A. D. Pietra, V. J. D. Pietra, J. C. Lai, and R. L. Mercer, "An Estimate of an Upper Bound for the Entropy of English," Computational Linguistics, vol. 18, no. 1, 1992
-
(1992)
Computational Linguistics
, vol.18
, Issue.1
-
-
Brown, P.F.1
Pietra, S.A.D.2
Pietra, V.J.D.3
Lai, J.C.4
Mercer, R.L.5
-
46
-
-
71149089356
-
Evaluation methods for topic models
-
ACM
-
H. Wallach, I. Murray, R. Salakhutdinov, and D. Mimno, "Evaluation methods for topic models," in Proceedings of the 26th Annual International Conference on Machine Learning. ACM, 2009, pp. 1105-1112
-
(2009)
Proceedings of the 26th Annual International Conference on Machine Learning
, pp. 1105-1112
-
-
Wallach, H.1
Murray, I.2
Salakhutdinov, R.3
Mimno, D.4
-
48
-
-
3042822164
-
P3P: Making privacy policies more useful
-
Nov-Dec
-
L. Cranor, "P3P: Making privacy policies more useful," IEEE Security and Privacy, vol. 1, no. 6, pp. 50-55, Nov-Dec. 2003
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.6
, pp. 50-55
-
-
Cranor, L.1
|