-
1
-
-
0020845864
-
Program design by informal English descriptions
-
Abbot RJ "Program design by informal English descriptions." Commun. ACM 26(11):882-894, 1983.
-
(1983)
Commun ACM
, vol.26
, Issue.11
, pp. 882-894
-
-
Abbot, R.J.1
-
2
-
-
17744389340
-
A requirements taxonomy for reducing web site privacy vulnerabilities
-
A.I. Antón, J.B. Earp, "A requirements taxonomy for reducing web site privacy vulnerabilities," Req'ts Engr. J., 9(3):169-185, 2004.
-
(2004)
Req'Ts Engr. J.
, vol.9
, Issue.3
, pp. 169-185
-
-
Antón, A.I.1
Earp, J.B.2
-
3
-
-
84898981840
-
Crowd synthesis: Extracting categories and clusters from complex data
-
ACM
-
P.,ré, A. Kittur, S.P. Dow. "Crowd synthesis: extracting categories and clusters from complex data." 17th ACM Conf. Comp. Sup. Coop. Work & Soc. Comp. 2014. ACM.
-
(2014)
17th ACM Conf. Comp. Sup. Coop. Work & Soc. Comp.
-
-
Ré, P.1
-
5
-
-
84909950534
-
Scaling requirements extraction to the crowd: Experiments on privacy policies
-
T.D. Breaux, F.Schaub, "Scaling requirements extraction to the crowd: experiments on privacy policies," 22nd IEEE Int'l Req'ts Engr. Conf., pp. 163-172, 2014.
-
(2014)
22nd IEEE Int'l req'Ts Engr. Conf
, pp. 163-172
-
-
Breaux, T.D.1
Schaub, F.2
-
6
-
-
84906230637
-
Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements
-
T.D. Breaux, H. Hibshi, A. Rao. "Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements." Req'ts Engr. J., 19(3): 281-307, 2014.
-
(2014)
Req'Ts Engr. J.
, vol.19
, Issue.3
, pp. 281-307
-
-
Breaux, T.D.1
Hibshi, H.2
Rao, A.3
-
7
-
-
84962431723
-
Detecting Repurposing and Over-collection in Multi-Party Privacy Requirements Specifications
-
To Appear
-
T.D. Breaux, D. Smullen, H. Hibshi, "Detecting Repurposing and Over-collection in Multi-Party Privacy Requirements Specifications," To Appear: IEEE 23rd Int'l Conf. Req'ts Engr., Ontario, Canada, 2015.
-
(2015)
IEEE 23rd Int'l Conf. Req'Ts Engr., Ontario, Canada
-
-
Breaux, T.D.1
Smullen, D.2
Hibshi, H.3
-
8
-
-
84963558472
-
-
Copyright IBM Corp
-
C.A. Brodie, C. Karat, J. Karat, "An Empirical Study of Natural Language Parsing of Privacy Policy Rules Using the SPARCLE Policy Workbench, Symposium On Usable Privacy and Security (SOUPS), Copyright IBM Corp, 2006.
-
(2006)
An Empirical Study of Natural Language Parsing of Privacy Policy Rules Using the SPARCLE Policy Workbench, Symposium on Usable Privacy and Security (SOUPS)
-
-
Brodie, C.A.1
Karat, C.2
Karat, J.3
-
9
-
-
0027574423
-
Goal-directed requirements acquisition
-
A. Dardenne, S. Fickas, A. van Lamsweerde. "Goal-directed requirements acquisition," Sci. Comp. Prog., 20:3-50, 1993.
-
(1993)
Sci. Comp. Prog.
, vol.20
, pp. 3-50
-
-
Dardenne, A.1
Fickas, S.2
Van Lamsweerde, A.3
-
10
-
-
84974295346
-
Technical terminology: Some linguistic properties and an algorithm for identification in text
-
J.S. Justeson, S.M. Katz, 1995. "Technical terminology: some linguistic properties and an algorithm for identification in text." Natural Lang. Engr. 1:9-27.
-
(1995)
Natural Lang. Engr
, vol.1
, pp. 9-27
-
-
Justeson, J.S.1
Katz, S.M.2
-
11
-
-
84861847181
-
StakeRare: Using social networks and collaborative filtering for large-scale requirements elicitation
-
S. L. Lim, A. Finkelstein. "StakeRare: using social networks and collaborative filtering for large-scale requirements elicitation," IEEE Trans. Soft. Engr., 38(3): 707-735, 2012.
-
(2012)
IEEE Trans. Soft. Engr
, vol.38
, Issue.3
, pp. 707-735
-
-
Lim, S.L.1
Finkelstein, A.2
-
12
-
-
84891067949
-
Automated text mining for requirements analysis of policy documents
-
A.K. Massey, J. Eisenstein, A.I. Anton, P.P. Swire, "Automated text mining for requirements analysis of policy documents," 21rd Int'l Conf. Req'ts Engr., pp. 4-13, 2013.
-
(2013)
21rd Int'l Conf. Req'Ts Engr
, pp. 4-13
-
-
Massey, A.K.1
Eisenstein, J.2
Anton, A.I.3
Swire, P.P.4
-
14
-
-
33845791661
-
A longitudinal assessment of online privacy notice readability
-
G.R. Milne, M.J. Culnan, H. Greene "A Longitudinal Assessment of Online Privacy Notice Readability." J. Public Policy & Marketing: 2006, 25(2): 238-249.
-
(2006)
J. Public Policy & Marketing
, vol.25
, Issue.2
, pp. 238-249
-
-
Milne, G.R.1
Culnan, M.J.2
Greene, H.3
-
15
-
-
79958083139
-
Human computation: A survey and taxonomy of a growing field
-
ACM
-
A. J. Quinn, B. B. Bederson. "Human Computation: A Survey and Taxonomy of a Growing Field." Conf. Hum. Factors in Comp. Sys., pp. 1403-12, 2011, ACM.
-
(2011)
Conf. Hum. Factors in Comp. Sys.
, pp. 1403-1412
-
-
Quinn, A.J.1
Bederson, B.B.2
-
16
-
-
80053360508
-
Cheap and Fast-but Is It Good?: Evaluating Non-Expert annotations for natural language tasks
-
ACL
-
R. Snow, B. O'Connor, D. Jurafsky, A. Y. Ng. "Cheap and Fast-but Is It Good?: Evaluating Non-Expert Annotations for Natural Language Tasks." Conf. Emp. Meths. in NLP, pp. 254-63, 2008, ACL.
-
(2008)
Conf. Emp. Meths. in NLP
, pp. 254-263
-
-
Snow, R.1
O'Connor, B.2
Jurafsky, D.3
Ng, A.Y.4
-
17
-
-
85066762295
-
Privee: An architecture for automatically analyzing web privacy policies
-
S. Zimmeck, S.M. Bellovin. "Privee: An Architecture for Automatically Analyzing Web Privacy Policies." USENIX Security, pp. 1-16, 2014.
-
(2014)
USENIX Security
, pp. 1-16
-
-
Zimmeck, S.1
Bellovin, S.M.2
|