Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

2015 IEEE Eighth International Workshop on Requirements Engineering and Law (RELAW)

25-25 Aug. 2015

Filter Results

Displaying Results 1 - 12 of 12
  • [Copyright notice]

    Publication Year: 2015, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2015, Page(s): 61
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • Message from the Chairs/RELAW 2015 Organization

    Publication Year: 2015, Page(s):iii - vii
    Request permission for commercial reuse | PDF file iconPDF (112 KB) | HTML iconHTML
    Freely Available from IEEE
  • Semantic web representations for reasoning about applicability and satisfiability of federal regulations for information security

    Publication Year: 2015, Page(s):1 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (530 KB) | HTML iconHTML

    In this paper, the Nomos 2 framework for modeling law-compliant solutions in software system design is applied in the context of the Federal Information Security Modernization Act (FISMA) of 2014. Information security regulatory statements with a high variability space are examined to explore the utility and limits of the Nomos 2 framework for information security regulations. Additionally, Nomos ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Terminology matching of requirements specification documents and regulations for compliance checking

    Publication Year: 2015, Page(s):10 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    To check the consistency between requirements specification documents and regulations by using a model checking technique, requirements analysts generate inputs to the model checker, i.e., state transition machines from the documents and logical formulas from the regulatory statements to be verified as properties. During these generation processes, to make the logical formulas semantically corresp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an information type lexicon for privacy policies

    Publication Year: 2015, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB) | HTML iconHTML

    Privacy policies serve to inform consumers about a company's data practices, and to protect the company from legal risk due to undisclosed uses of consumer data. In addition, US and EU regulators require companies to accurately describe their practices in these policies, and some laws prescribe how companies should write these policies. Despite these aims, privacy policies are frequently criticize... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling legal and regulative requirements for ranking alternatives of cloud-based services

    Publication Year: 2015, Page(s):25 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (758 KB) | HTML iconHTML

    The decision to adopt a new technology in an organization is a complex task because of several Non-Functional Requirements (NFR) e.g., availability, interoperability, and presence of several alternatives, e.g., service providers can offer multiple packages. To support such a decision and to select the best alternative a Trade-off based Adoption Methodology for Cloud-based Infrastructure and Servic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards systems for increased access to justice using goal modeling

    Publication Year: 2015, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1037 KB) | HTML iconHTML

    Emerging cyberjustice systems are in need of relevant requirements engineering approaches, for example, to provide citizens with better access to the judicial system. In this context, this paper proposes the use of goal modeling for developing Online Dispute Resolution (ODR) systems in Canada. With ODR, the use of technology has the potential of increasing access to justice at low cost. We argue t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring and managing the design restriction of enterprise architecture (EA) principles on EA models

    Publication Year: 2015, Page(s):37 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB) | HTML iconHTML

    Implementation and formalisation, alongside with creation, adoption and usage of Enterprise Architecture (EA) principles are hot topics of the current years of EA research. However, the EA community, both academic and professional, misses a consensus on the definitions and use of principles. Furthermore, not much research is done in the direction of measuring the impact (e.g. design restriction) o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparing and analyzing definitions in multi-jurisdictions

    Publication Year: 2015, Page(s):47 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1428 KB) | HTML iconHTML

    Regulatory definitions establish the scope and boundary for legal statements and provide software designers with means to assess the coverage of their designs under the law. However, the number of phrases that serve to define this boundary in a legal statement are usually large and often a simple legal statement contains or is affected by up to 10 definition-related phrases. In addition, software ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structuring diverse regulatory requirements for global product development

    Publication Year: 2015, Page(s):57 - 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (158 KB) | HTML iconHTML

    Developing a system for different contexts (e.g., countries, organisations and situations) means that the requirements for the system can differ in diverse cases. The challenge is to deal with this diversity in a systematic way, taking account of variance in compliance, and avoiding contradictions. In this paper, we describe a framework for analysing the diversity of requirements that emanates fro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.