Public Policy Challenges: An RE Perspective

In this perspective paper, we investigate the parallels between public policy and IT projects from the perspective of traditional RE practice. Using the mainstream media as an information source (a ...

[1]  Walid Maalej,et al.  How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Reviews , 2014, 2014 IEEE 22nd International Requirements Engineering Conference (RE).

[2]  Dagny Hauksdottir,et al.  Establishing Reusable Requirements Derived from Laws and Regulations for Medical Device Development , 2016, 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW).

[3]  Gilberto Cysneiros Filho,et al.  Towards Legal Compliance in IT Procurement Planning in Brazil’s Federal Public Administration , 2016, 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW).

[4]  Donald K. Wright,et al.  An Updated Look at the Impact of Social Media on Public Relations Practice , 2009 .

[5]  Birgit Penzenstadler,et al.  Complying with Law for RE in the Automotive Domain , 2008, 2008 Requirements Engineering and Law.

[6]  Axel van Lamsweerde,et al.  Managing Conflicts in Goal-Driven Requirements Engineering , 1998, IEEE Trans. Software Eng..

[7]  Edward B. Royzman,et al.  Negativity Bias, Negativity Dominance, and Contagion , 2001 .

[8]  Walid Maalej,et al.  Bug report, feature request, or simply praise? On automatically classifying app reviews , 2015, 2015 IEEE 23rd International Requirements Engineering Conference (RE).

[9]  Walid Maalej,et al.  User feedback in the appstore: An empirical study , 2013, 2013 21st IEEE International Requirements Engineering Conference (RE).

[10]  Jay M. Handelman,et al.  Stakeholder Marketing and the Organizational Field: The Role of Institutional Capital and Ideological Framing , 2010 .

[11]  Barbara Paech,et al.  Proceedings of the 13th international working conference on Requirements engineering: foundation for software quality , 2007 .

[12]  W. N. Dunn,et al.  Public Policy Analysis: An Integrated Approach , 2017 .

[13]  Barry W. Boehm,et al.  Identifying Quality-Requirement Conflicts , 1996, IEEE Softw..

[14]  Krzysztof Wnuk,et al.  More than requirements: Applying requirements engineering techniques to the challenge of setting corporate intellectual policy, an experience report , 2011, 2011 Fourth International Workshop on Requirements Engineering and Law.

[15]  Ian Sommerville,et al.  Viewpoints: principles, problems and a practical approach to requirements engineering , 1997, Ann. Softw. Eng..

[16]  Gilberto A. Cysneiros Filho,et al.  Towards a legal compliance verification approach on the procurement process of IT solutions for the Brazilian Federal Public Administration , 2014, RELAW.

[17]  L. Manovich,et al.  Trending: The Promises and the Challenges of Big Social Data , 2012 .

[18]  Dae Hee Kwak,et al.  User- Versus Mainstream-Media-Generated Content: Media Source, Message Valence, and Team Identification and Sport Consumers' Response , 2010 .

[19]  M. Kirschenbaum The Remaking of Reading : Data Mining and the Digital Humanities , 2007 .

[20]  Mehrdad Sabetzadeh,et al.  An automated framework for detection and resolution of cross references in legal texts , 2015, Requirements Engineering.

[21]  Tomi Männistö,et al.  Experiences from an industry-wide initiative for setting metadata for regulatory requirements in the nuclear domain , 2014, 2014 IEEE 7th International Workshop on Requirements Engineering and Law (RELAW).

[22]  Daniel Amyot,et al.  Creating Quantitative Goal Models: Governmental Experience , 2014, ER.

[23]  John Yen,et al.  A systematic tradeoff analysis for conflicting imprecise requirements , 1997, Proceedings of ISRE '97: 3rd IEEE International Symposium on Requirements Engineering.

[24]  Lee A. Bygrave,et al.  A right to be forgotten? , 2014, Commun. ACM.

[25]  Robert W. Zmud,et al.  A Synthesis of Research on Requirements Analysis and Knowledge Acquisition Techniques , 1992, MIS Q..

[26]  B. Chandrasekaran,et al.  Design Problem Solving: A Task Analysis , 1990, AI Mag..

[27]  B. Flyvbjerg Five Misunderstandings About Case-Study Research , 2006, 1304.1186.

[28]  Marek J. Sergot,et al.  The British Nationality Act as a logic program , 1986, CACM.

[29]  J. O. N. Entine,et al.  The Myth of Social Investing , 2003 .

[30]  Sandra Waddock,et al.  Myths and Realities of Social Investing , 2003 .

[31]  Annie I. Antón,et al.  Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations , 2006, 14th IEEE International Requirements Engineering Conference (RE'06).

[32]  A. Terry Bahill,et al.  Re-evaluating systems engineering concepts using systems thinking , 1998, IEEE Trans. Syst. Man Cybern. Part C.

[33]  D. Sculley,et al.  Meaning and mining: the impact of implicit assumptions in data mining for the humanities , 2008, Lit. Linguistic Comput..

[34]  Travis D. Breaux,et al.  Regulatory Requirements Traceability and Analysis Using Semi-formal Specifications , 2013, REFSQ.

[35]  Mehrdad Sabetzadeh,et al.  From RELAW Research to Practice: Reflections on an Ongoing Technology Transfer Project , 2017, 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW).

[36]  Mehrdad Sabetzadeh,et al.  Model-Based Simulation of Legal Requirements: Experience from Tax Policy Simulation , 2016, 2016 IEEE 24th International Requirements Engineering Conference (RE).

[37]  Jay W. Forrester,et al.  System dynamics, systems thinking, and soft OR , 1994 .

[38]  P. Shrivastava Is Strategic Management Ideological? , 1986 .

[39]  M. Meiser Unintended consequences. , 2008, The American journal of nursing.

[40]  Daniel Amyot,et al.  Towards outcome-based regulatory compliance in aviation security , 2012, 2012 20th IEEE International Requirements Engineering Conference (RE).

[41]  Mehrdad Sabetzadeh,et al.  Automated Checking of Conformance to Requirements Templates Using Natural Language Processing , 2015, IEEE Transactions on Software Engineering.