Works (24)

Updated: July 5th, 2023 15:59

2012 journal article

A legal cross-references taxonomy for reasoning about compliance requirements

REQUIREMENTS ENGINEERING, 17(2), 99–115.

By: J. Maxwell n, A. Anton n, P. Swire, M. Riaz n & C. McCraw n

author keywords: Requirements engineering; Conflicting requirements; Regulatory compliance; Software compliance engineering; Financial systems; Healthcare IT
TL;DR: A legal cross-reference taxonomy is proposed to aid requirements engineers in classifying cross-references as they specify compliance requirements to address conflicting requirements that may otherwise thwart legal compliance. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2011 conference paper

A legal cross-references taxonomy for identifying conflicting software requirements

2011 19th ieee international requirements engineering conference (re), 197–206.

By: J. Maxwell n, A. Anton n & P. Swire

TL;DR: A legal cross-reference taxonomy is proposed to aid requirements engineers in classifying cross-references as they specify compliance requirements to address conflicting requirements that may otherwise thwart legal compliance. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2011 conference paper

Assessing the accuracy of legal implementation readiness decisions

2011 19th ieee international requirements engineering conference (re), 207–216.

By: A. Massey n, B. Smith n, P. Otto n & A. Anton n

TL;DR: The average graduate-level software engineering student is ill-prepared to write legally compliant software with any confidence and that domain experts are an absolute necessity, and the potential utility of legal requirements metrics in aiding software engineers as they make legal compliance decisions is indicated. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2011 article

Digital privacy: theory, policies and technologies

Anton, A. I., Breaux, T. D., Gritzalis, S., & Mylopoulos, J. (2011, March). REQUIREMENTS ENGINEERING, Vol. 16, pp. 1–2.

By: A. Anton n, T. Breaux*, S. Gritzalis* & J. Mylopoulos*

TL;DR: This special issue of the Springer’s RequirementsEngineering journal aims at providing researchers and professionals with insights into the state-of-the-art in Digital Privacy from the views of Theory, Policies andTechnologies. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2010 journal article

Evaluating existing security and privacy requirements for legal compliance

REQUIREMENTS ENGINEERING, 15(1), 119–137.

By: A. Massey n, P. Otto n, L. Hayward n & A. Anton n

author keywords: Security requirements; Privacy requirements; Legal compliance; Refactoring requirements
TL;DR: Evaluation of the requirements for iTrust, an open-source Electronic Health Records system, for compliance with legal requirements governing security and privacy in the healthcare domain, using existing requirements engineering techniques. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2010 journal article

How internet users' privacy concerns have evolved since 2002

IEEE Security & Privacy Magazine, 8(1), 21–27.

By: A. Anton n, J. Earp n & J. Young n

TL;DR: Internet privacy was the topic in this paper and it was mentioned that individuals have become more concerned about personalization in customized browsing experiences, monitored purchasing patterns, and targeted marketing and research. (via Semantic Scholar)
Sources: Web Of Science, Crossref
Added: August 6, 2018

2009 journal article

A distributed requirements management framework for legal compliance and accountability

COMPUTERS & SECURITY, 28(1-2), 8–17.

By: T. Breaux n, A. Anton n & E. Spafford*

author keywords: Requirements engineering; Compliance; Accountability; Policy regulation
TL;DR: A requirements management framework is proposed that enables executives, business managers, software developers and auditors to distribute legal obligations across business units and/or personnel with different roles and technical capabilities and improves accountability by integrating traceability throughout the policy and requirements lifecycle. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 article

Developing Production Rule Models to Aid in Acquiring Requirements from Legal Texts

PROCEEDINGS OF THE 2009 17TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, pp. 101–110.

By: J. Maxwell n & A. Anton n

TL;DR: This paper introduces the Production Rule Modeling methodology, and demonstrates this methodology using examples from a production rule model for four sections of the U.S. Heath Insurance Portability and Accountability Act (HIPAA). (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 journal article

Requirements-based Access Control Analysis and Policy Specification (ReCAPS)

INFORMATION AND SOFTWARE TECHNOLOGY, 51(6), 993–1009.

By: Q. He* & A. Anton n

author keywords: Requirements analysis; Security; Access control
TL;DR: The ReCAPS method integrates policy specification into the software development process, ensures consistency across software artifacts, and provides prescriptive guidance for how to specify ACPs, improving the quality of requirements specifications and system designs. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Analyzing regulatory rules for privacy and security requirements

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 34(1), 5–20.

By: T. Breaux n & A. Anton n

author keywords: data security and privacy; laws and regulations; compliance; accountability; requirements engineering
TL;DR: The methodology provides statement-level coverage for an entire regulatory document to consistently identify and infer six types of data access constraints, handle complex cross references, resolve ambiguities, and assign required priorities between access rights and obligations to avoid unlawful information disclosures. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Scenario support for effective requirements

INFORMATION AND SOFTWARE TECHNOLOGY, 50(3), 198–220.

By: T. Alspaugh* & A. Anton n

author keywords: requirements engineering; scenario analysis; scenario management
TL;DR: Six aspects of scenarios having inherent structure on which automated support may be based, and the results of using such support are discussed, resulting in higher-quality scenarios for better system requirements. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Semantic Parameterization: A Process for Modeling Domain Descriptions

ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 18(2).

By: T. Breaux n, A. Anton n & J. Doyle n

Contributors: T. Breaux n, A. Antón n & J. Doyle n

author keywords: Documentation; Standardization; Human Factors; Natural language; domain knowledge; formal specification; description logic
TL;DR: This article presents a systematic process called Semantic Parameterization for expressing natural language domain descriptions of goals as specifications in description logic, and allows engineers to automate inquiries using who, what, and where questions, completing the formalization of the ICM questions. (via Semantic Scholar)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: August 6, 2018

2007 journal article

A roadmap for COMPREHENSIVE online privacy policy management

COMMUNICATIONS OF THE ACM, 50(7), 109–116.

By: A. Anton n, E. Bertino*, N. Li* & T. Yu n

TL;DR: A framework supporting the privacy policy life cycle helps guide the kind of research to consider before sound privacy answers may be realized. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2007 journal article

HIPAA's effect on web site privacy policies

IEEE SECURITY & PRIVACY, 5(1), 45–52.

By: A. Anton n, J. Earp n, M. Vail n, N. Jain n, C. Gheen n & J. Frink n

TL;DR: A longitudinal study examines the effects of HIPAA's enactment on a collection of privacy policy documents for a fixed set of organizations over a four-year period, analyzed using goal mining, a content-analysis method that supports extraction of useful information about institutions' privacy practices from documents. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2007 journal article

The ChoicePoint dilemma - How data brokers should handle the privacy of personal information

IEEE SECURITY & PRIVACY, 5(5), 15–23.

By: P. Otto n, A. Anton n & D. Baumer n

TL;DR: This report examines Choice-Point's data breach, explores what went wrong from the perspective of consumers, executives, policy, and IT systems, and offers recommendations for the future. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2006 journal article

A semantics based approach to privacy languages

Computer Systems Science and Engineering, 21(5), 339–352.

By: N. Li, T. Yu & A. Anton

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Examining Internet privacy policies within the context of user privacy values

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 52(2), 227–237.

By: J. Earp n, A. Anton n, L. Aiman-Smith n & W. Stufflebeam n

author keywords: E-commerce; privacy management; privacy policy; software engineering
TL;DR: Examining Internet users' major expectations about website privacy and revealed a notable discrepancy between what privacy policies are currently stating and what users deem most significant are suggested to privacy managers and software project managers. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2004 journal article

A requirements taxonomy for reducing Web site privacy vulnerabilities

REQUIREMENTS ENGINEERING, 9(3), 169–185.

By: A. Anton & J. Earp n

author keywords: privacy requirements; security requirements
TL;DR: A taxonomy of privacy requirements for Web sites is presented, using goal-mining, the extraction of pre-requ requirements goals from post-requirements text artefacts, to develop the taxonomy that can be used by Web site designers to reduce Web site privacy vulnerabilities and ensure that their stated and actual policies are consistent with each other. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2004 journal article

Financial privacy policies and the need for standardization

IEEE SECURITY & PRIVACY, 2(2), 36–45.

By: A. Anton n, J. Earp n, Q. He n, W. Stufflebeam n, D. Bolchini* & C. Jensen*

TL;DR: The authors analyze 40 online privacy policy documents from nine financial institutions to examine their clarity and readability and show that compliance with the existing legislation and standards is, at best, questionable. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2004 journal article

Inside JetBlue's privacy policy violations

IEEE Security & Privacy, 2(6), 18-.

By: A. Anton, Q. He & D. Baumer

Source: NC State University Libraries
Added: August 6, 2018

2004 article

Misuse and abuse cases: Getting past the positive

IEEE SECURITY & PRIVACY, Vol. 2, pp. 90–92.

By: P. Hope*, G. McGraw* & A. Anton n

TL;DR: The authors provide a nonacademic introduction to the software security best practice of misuse and abuse cases, showing you how to put the basic science to work. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2003 article

Functional paleontology: The evolution of user-visible system services

Anton, A. I., & Potts, C. (2003, February). IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, Vol. 29, pp. 151–166.

By: A. Anton n & C. Potts*

author keywords: measurement; metrics; empirical methods; reverse engineering; requirements engineering; software evolution
TL;DR: This paper describes "functional paleontology," an approach to analyzing the evolution of user-visible features or services independent of architecture and design intent, and classify the benefits and burdens of interpersonal communication services into core and peripheral categories. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2003 article

Precluding incongruous behavior by aligning software requirements with security and privacy policies

Anton, A. I., Earp, J. B., & Carter, R. A. (2003, November 1). INFORMATION AND SOFTWARE TECHNOLOGY, Vol. 45, pp. 967–977.

By: A. Anton n, J. Earp n & R. Carter*

author keywords: privacy policy; security policy; requirements alignment
TL;DR: Validated techniques to identify conflicts between system requirements and the governing security and privacy policies are presented and are generalizable to other domains, in which systems contain sensitive information. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2003 article

Successful software projects need requirements planning

IEEE SOFTWARE, Vol. 20, pp. 44-+.

By: A. Anton n

TL;DR: Expressing a set of complete, consistent, and correct requirements is conceptually complex, but essential in the quest to develop high-quality, useful software. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.