ITR : Encoding Rights , Permissions and Obligations : Privacy Policy Specification and Compliance

[1]  Nuel Belnap,et al.  The deliberative stit: A study of action, omission, ability, and obligation , 1995, J. Philos. Log..

[2]  Aldo Dagnino,et al.  Deriving Goals from a Use-Case Based Requirements Specification , 2001, Requirements Engineering.

[3]  Fay Cobb Payton,et al.  Dirty laundry: privacy issues for IT professionals , 2000 .

[4]  Michael Gurski,et al.  P3P and Privacy: An update for the Privacy Community , 2004 .

[5]  Shelly Farnham,et al.  Decreasing online 'bad' behavior , 2002, CHI Extended Abstracts.

[6]  Christen Krogh,et al.  Hohfeld in cyberspace and other applications of normative reasoning in agent technology , 1999, Artificial Intelligence and Law.

[7]  Qingfeng He,et al.  A Privacy-Aware Database Interface , 2002 .

[8]  Annie I. Antón,et al.  Analyzing Website privacy requirements using a privacy goal taxonomy , 2002, Proceedings IEEE Joint International Conference on Requirements Engineering.

[9]  Colin Potts,et al.  Invented requirements and imagined customers: requirements engineering for off-the-shelf software , 1995, Proceedings of 1995 IEEE International Symposium on Requirements Engineering (RE'95).

[10]  Kenji Takahashi,et al.  Inquiry-based requirements analysis , 1994, IEEE Software.

[11]  S. J. Goldsack,et al.  Requirements engineering for real-time systems , 1991, Softw. Eng. J..

[12]  John F. Horty,et al.  Deontic logic as founded on nonmonotonic logic , 1993, Annals of Mathematics and Artificial Intelligence.

[13]  Annie I. Antón,et al.  Goal-based requirements analysis , 1996, Proceedings of the Second International Conference on Requirements Engineering.

[14]  Alice M. Obenchain-Leeson,et al.  Volume 6 , 1998 .

[15]  J. Horty Agency and Deontic Logic , 2001 .

[16]  Carlos Jensen,et al.  Privacy in Digital Environments: Empowering Users , 2002 .

[17]  John L. Koverman The Garden City , 1984 .

[18]  A. Antón,et al.  Strategies for Developing Policies and Requirements for Secure Electronic Commerce Systems , 2000 .

[19]  Records, Computers and the Rights of Citizens , 1973 .

[20]  Annie I. Antón,et al.  A Representational Framework for Scenarios of System Use , 1998, Requirements Engineering.

[21]  Annie I. Antón,et al.  Goal Decomposition and Scenario Analysis in Business Process Reengineering , 1994, CAiSE.

[22]  Annie I. Antón,et al.  Functional Paleontology: The Evolution of User-Visible System Services , 2003, IEEE Trans. Software Eng..

[23]  Colin Potts Metaphors of intent , 2001, Proceedings Fifth IEEE International Symposium on Requirements Engineering.

[24]  Julia B. Earp,et al.  A Multidisciplinary Electronic Commerce Project Studio for Secure Systems , 2000 .

[25]  Steven M. Drucker,et al.  The effect of communication modality on cooperation in online environments , 2000, CHI.

[26]  Victor Lesser,et al.  The IPUS blackboard architecture as a framework for computational auditory scene analysis , 1998 .

[27]  José Luiz Fiadeiro,et al.  Temporal reasoning over deontic specifications , 1991, J. Log. Comput..

[28]  Douglas Black,et al.  Autonomy and Trust in Bioethics , 2002 .

[29]  Fay Cobb Payton,et al.  Privacy of medical records: IT implications of HIPAA , 2000, CSOC.

[30]  J. Rubenfeld The Right of Privacy , 1989 .

[31]  Colin Potts,et al.  Using schematic scenarios to understand user needs , 1995, Symposium on Designing Interactive Systems.

[32]  Frédéric Cuppens An Epistemic and Deontic Logic for Reasoning about Computer Security , 1990, ESORICS.

[33]  Colin Potts,et al.  Software-engineering research revisited , 1993, IEEE Software.

[34]  Julia K. Brande Computer Network Routing with a Fuzzy Neural Network , 1997 .

[35]  M. Wooldridge,et al.  Agent-Based Computing , 2019, CIRP Encyclopedia of Production Engineering.

[36]  P. Kollock SOCIAL DILEMMAS: The Anatomy of Cooperation , 1998 .

[37]  Shelly Farnham,et al.  Finding others online: reputation systems for social online spaces , 2002, CHI.

[38]  T. S. E. Maibaum,et al.  Towards electronic contract performance , 2001, 12th International Workshop on Database and Expert Systems Applications.

[39]  Ana I. Anton,et al.  Goal identification and refinement in the specification of software-based information systems , 1997 .

[40]  René Wies,et al.  Policies in network and systems management—Formal definition and architecture , 1994, Journal of Network and Systems Management.

[41]  Ralph Johnson,et al.  design patterns elements of reusable object oriented software , 2019 .

[42]  José Meseguer,et al.  Universal Realization, Persistent Interconnection and Implementation of Abstract Modules , 1982, ICALP.

[43]  Annie I. Antón,et al.  Functional paleontology: system evolution as the user sees it , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.

[44]  Anthony Finkelstein,et al.  Structured common sense: the elicitation and formalisation of system requirements , 1986 .

[45]  Colin Potts,et al.  Naturalistic inquiry and requirements engineering: reconciling their theoretical foundations , 1997, Proceedings of ISRE '97: 3rd IEEE International Symposium on Requirements Engineering.

[46]  Colin Potts,et al.  ScenIC: a strategy for inquiry-driven requirements determination , 1999, Proceedings IEEE International Symposium on Requirements Engineering (Cat. No.PR00188).

[47]  Anthony Finkelstein,et al.  Building formal specifications using structured common sense , 1987 .

[48]  Z Hudson,et al.  Privacy: report on the privacy policies and practices of health web sites. , 2000, Professional ethics report : newsletter of the American Association for the Advancement of Science, Committee on Scientific Freedom & Responsibility, Professional Society Ethics Group.

[49]  Julia Brande Earp,et al.  Innovative web use to learn about consumer behavior and online privacy , 2003, CACM.

[50]  Annie I. Antón,et al.  The use of goals to surface requirements for evolving systems , 1998, Proceedings of the 20th International Conference on Software Engineering.

[51]  Colin Potts,et al.  Requirements models in context , 1997, Proceedings of ISRE '97: 3rd IEEE International Symposium on Requirements Engineering.