@article{young_2011, title={Commitment analysis to operationalize software requirements from privacy policies}, volume={16}, ISSN={0947-3602 1432-010X}, url={http://dx.doi.org/10.1007/s00766-010-0108-6}, DOI={10.1007/s00766-010-0108-6}, number={1}, journal={Requirements Engineering}, publisher={Springer Science and Business Media LLC}, author={Young, Jessica D.}, year={2011}, month={Mar}, pages={33–46} } @article{anton_earp_young_2010, title={How internet users' privacy concerns have evolved since 2002}, volume={8}, ISSN={1540-7993}, url={http://dx.doi.org/10.1109/msp.2010.38}, DOI={10.1109/msp.2010.38}, number={1}, journal={IEEE Security & Privacy Magazine}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Anton, A.I. and Earp, J.B. and Young, J.D.}, year={2010}, month={Jan}, pages={21–27} }