{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:48:42Z","timestamp":1760586522848},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,6,10]],"date-time":"2010-06-10T00:00:00Z","timestamp":1276128000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1007\/s00766-010-0108-6","type":"journal-article","created":{"date-parts":[[2010,6,9]],"date-time":"2010-06-09T06:47:22Z","timestamp":1276066042000},"page":"33-46","source":"Crossref","is-referenced-by-count":26,"title":["Commitment analysis to operationalize software requirements from privacy policies"],"prefix":"10.1007","volume":"16","author":[{"given":"Jessica D.","family":"Young","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2010,6,10]]},"reference":[{"issue":"11","key":"108_CR1","doi-asserted-by":"crossref","first-page":"882","DOI":"10.1145\/182.358441","volume":"26","author":"RJ Abbott","year":"1983","unstructured":"Abbott RJ (1983) Program design by informal english descriptions. Commun ACM 26(11):882\u2013894","journal-title":"Commun ACM"},{"key":"108_CR2","unstructured":"Ant\u00f3n AI (1997) Goal Identification and Refinement in the Specification of Software-Based Information Systems. Ph.D. Thesis, Georgia Institute of Technology"},{"key":"108_CR3","unstructured":"Ant\u00f3n A (2007) Is that vault really protecting your privacy? ThePrivacyPlace.org Blog. 9 Oct 2007"},{"issue":"3","key":"108_CR4","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/s00766-003-0183-z","volume":"9","author":"AI Ant\u00f3n","year":"2004","unstructured":"Ant\u00f3n AI, Earp JB (2004) A requirements taxonomy for reducing web site privacy vulnerabilities. Requir Eng J 9(3):169\u2013185","journal-title":"Requir Eng J"},{"key":"108_CR5","doi-asserted-by":"crossref","unstructured":"Ant\u00f3n AI, Earp JB, Carter RA (2003) Precluding incongruous behavior by aligning software requirements with security and privacy policies. Inf Softw Technol, Elsevier 45(14): 967\u2013977","DOI":"10.1016\/S0950-5849(03)00095-8"},{"issue":"1","key":"108_CR6","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/MSP.2007.7","volume":"5","author":"AI Ant\u00f3n","year":"2007","unstructured":"Ant\u00f3n AI, Earp JB, Vail MW, Jain N, Gheen C, Frink JM (2007) HIPAA\u2019s Effect on web site privacy policies. IEEE Secur Priv 5(1):45\u201352","journal-title":"IEEE Secur Priv"},{"key":"108_CR7","unstructured":"Breaux TD (2009) Legal Requirements Acquisition for the Specification of Legally Compliant Information Systems. Ph.D. Thesis, North Carolina State University, April 2009"},{"key":"108_CR8","doi-asserted-by":"crossref","unstructured":"Breaux TD, Ant\u00f3n AI (2005) Deriving semantic models from privacy policies. In: Proceedings of IEEE 6th workshop on policies for distributed systems and networks, pp 67\u201376","DOI":"10.1109\/POLICY.2005.12"},{"issue":"1","key":"108_CR9","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/TSE.2007.70746","volume":"34","author":"TD Breaux","year":"2008","unstructured":"Breaux TD, Ant\u00f3n AI (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Trans Softw Eng 34(1):5\u201320","journal-title":"IEEE Trans Softw Eng"},{"issue":"2","key":"108_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1416563.1416565","volume":"18","author":"TD Breaux","year":"2008","unstructured":"Breaux TD, Ant\u00f3n AI, Doyle J (2008) Semantic parameterization: a process for modeling domain descriptions. ACM Trans Softw Eng Methodol 18(2):1\u201327","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"108_CR11","doi-asserted-by":"crossref","unstructured":"Breaux TD, Vail MW, Ant\u00f3n AI (2006) Towards regulatory compliance: extracting rights and obligations to align requirements with regulations. In: Proceedings of the 13th IEEE international conference on requirements engineering","DOI":"10.1109\/RE.2006.68"},{"key":"108_CR12","doi-asserted-by":"crossref","unstructured":"Cleland-Huang J, Chang CK, Sethi G, Javvaji K, Hu H, Xia J (2002) Automating speculative queries through event-based requirements traceability. In: Proceedings of the IEEE joint international requirements engineering conference (RE\u201902), 9\u201313 September 2002, pp 289\u2013296","DOI":"10.1109\/ICRE.2002.1048540"},{"issue":"2","key":"108_CR13","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/TEM.2005.844927","volume":"52","author":"JB Earp","year":"2005","unstructured":"Earp JB, Ant\u00f3n AI, Aiman-Smith L, Stufflebeam W (2005) Examining internet privacy policies within the context of user privacy values. IEEE Trans Eng Manag 52(2):227\u2013237","journal-title":"IEEE Trans Eng Manag"},{"key":"108_CR14","unstructured":"Federal Trade Commission (2004) Federal trade commission decisions: findings, options, and orders, July 1, 2004 to December 31, 2004, Vol. 138"},{"key":"108_CR15","unstructured":"Federal Trade Commission (2009) Privacy initiative: unfairness & deception\u2014enforcement. Accessed 2 June 2009. http:\/\/www.ftc.gov\/privacy\/privacyinitiatives\/promises_enf.html"},{"key":"108_CR16","unstructured":"Federal Trade Commission Act (15 U.S.C. \u00a7\u00a741-58)"},{"key":"108_CR17","unstructured":"Garner BA (ed) (2004) Black\u2019s law dictionary, 8th edn. West"},{"key":"108_CR18","doi-asserted-by":"crossref","unstructured":"Ghanavati S, Amyot D, Peyton L (2007) Towards a framework for tracking legal compliance in healthcare. In: Proceedings of the 19th international conference of advanced information systems engineering, pp 218\u2013232","DOI":"10.1007\/978-3-540-72988-4_16"},{"key":"108_CR19","volume-title":"Theoretical sensitivity","author":"BG Glaser","year":"1978","unstructured":"Glaser BG (1978) Theoretical sensitivity. Sociology Press, Mill Valley"},{"key":"108_CR20","volume-title":"The discovery of grounded theory","author":"BG Glaser","year":"1967","unstructured":"Glaser BG, Strauss AL (1967) The discovery of grounded theory. Aldine Transaction, Chicago"},{"key":"108_CR21","doi-asserted-by":"crossref","unstructured":"Haddadi A (1995) A formal theory of commitments. In: Communication and cooperation in agent systems, vol 1056. Lecture notes in computer science. Springer, Berlin, pp 51\u201382","DOI":"10.1007\/3-540-61044-8_9"},{"key":"108_CR22","unstructured":"Hofmann M (2006) Federal trade commission enforcement of privacy. In: Wolf C (ed) Proskauer on privacy: a guide to privacy and data security law in the information age. Practising Law Institute, New York, NY"},{"issue":"1","key":"108_CR23","doi-asserted-by":"crossref","first-page":"16","DOI":"10.2307\/785533","volume":"23","author":"WN Hohfeld","year":"1913","unstructured":"Hohfeld WN (1913) Some fundamental legal conceptions as applied in judicial reasoning. Yale Law J 23(1):16\u201359","journal-title":"Yale Law J"},{"key":"108_CR24","volume-title":"Readings in agents","year":"1998","unstructured":"Huhns MN, Singh MP (eds) (1998) Readings in agents. Morgan Kaufman, San Francisco"},{"key":"108_CR25","volume-title":"Foundations of statistical natural language processing","author":"CD Manning","year":"1999","unstructured":"Manning CD, Sch\u00fctze H (1999) Foundations of statistical natural language processing. The MIT Press, Cambridge"},{"key":"108_CR26","doi-asserted-by":"crossref","unstructured":"Massey AK, Otto PN, Ant\u00f3n AI (2009) Prioritizing legal requirements. In: Proceedings of the second international workshop on requirements engineering and law","DOI":"10.1109\/RELAW.2009.9"},{"issue":"1","key":"108_CR27","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s00766-009-0089-5","volume":"15","author":"AK Massey","year":"2010","unstructured":"Massey AK, Otto PN, Hayward LJ, Ant\u00f3n AI (2010) Evaluating existing security and privacy requirements for legal compliance. Requir Eng J 15(1):119\u2013137","journal-title":"Requir Eng J"},{"key":"108_CR28","doi-asserted-by":"crossref","unstructured":"Maxwell JC, Ant\u00f3n AI (2009) Developing production rule models to aid in acquiring requirements from legal texts. In: Proceedings of the 17th intl. IEEE requirements engineering conference, pp 101\u2013110","DOI":"10.1109\/RE.2009.21"},{"key":"108_CR29","doi-asserted-by":"crossref","unstructured":"Maxwell JC, Ant\u00f3n AI (2009) Checking existing requirements for compliance with law using a production rule model. In: Proceedings of the second international workshop on requirements engineering and law","DOI":"10.1109\/RELAW.2009.3"},{"key":"108_CR30","doi-asserted-by":"crossref","unstructured":"Otto PN, Ant\u00f3n AI (2007) Addressing legal requirements in requirements engineering. In: Proceedings of the 15th IEEE international requirements engineering conference, pp 5\u201314","DOI":"10.1109\/RE.2007.65"},{"issue":"2","key":"108_CR31","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/52.268952","volume":"11","author":"C Potts","year":"1994","unstructured":"Potts C, Takahashi K, Ant\u00f3n AI (1994) Inquiry\u2014based requirements analysis. IEEE Softw 11(2):21\u201332","journal-title":"IEEE Softw"},{"key":"108_CR32","unstructured":"Robinson WN (2005) Implementing rule-based monitors within a framework for continuous requirements monitoring. In: Proceedings of the 38th Hawaii international conference on system sciences"},{"key":"108_CR33","doi-asserted-by":"crossref","unstructured":"Siena A, Perini A, Susi A, Mylopoulos J (2009) A meta-model for modelling law-compliant requirements. In: Proceedings of the second international workshop on requirements engineering and law","DOI":"10.1109\/RELAW.2009.1"},{"key":"108_CR34","unstructured":"Sotto LJ, Simpson AP (2008) Surviving an FTC investigation after a data breach. N Y Law J"},{"issue":"3","key":"108_CR35","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1109\/TEM.2008.922634","volume":"55","author":"MW Vail","year":"2008","unstructured":"Vail MW, Earp JB, Ant\u00f3n AI (2008) An empirical study of consumer perceptions and comprehension of web site privacy policies. IEEE Trans Eng Manag 55(3):442\u2013454","journal-title":"IEEE Trans Eng Manag"},{"key":"108_CR36","doi-asserted-by":"crossref","unstructured":"Wan F, Singh MP (2005) Formalizing and achieving multiparty agreements via commitments. In: Proceedings of autonomous agents and multi-agent systems, pp 770\u2013777","DOI":"10.1145\/1082473.1082591"},{"key":"108_CR37","unstructured":"Yin RK (2003) Case study research: design and methods. In: Applied social research methods series, vol 5, 3rd edn. Sage Publications"},{"key":"108_CR38","unstructured":"Young J, Ant\u00f3n AI (2008) Are google health\u2019s privacy practices healthy? ThePrivacyPlace.org. 20 June 2008"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-010-0108-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00766-010-0108-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-010-0108-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T23:04:32Z","timestamp":1559171072000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00766-010-0108-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6,10]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["108"],"URL":"https:\/\/doi.org\/10.1007\/s00766-010-0108-6","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"value":"0947-3602","type":"print"},{"value":"1432-010X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,6,10]]}}}