{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T03:32:04Z","timestamp":1764905524728,"version":"3.28.0"},"reference-count":48,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/re.2013.6636700","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T23:25:31Z","timestamp":1383089131000},"page":"4-13","source":"Crossref","is-referenced-by-count":54,"title":["Automated text mining for requirements analysis of policy documents"],"prefix":"10.1109","author":[{"given":"Aaron K.","family":"Massey","sequence":"first","affiliation":[]},{"given":"Jacob","family":"Eisenstein","sequence":"additional","affiliation":[]},{"given":"Annie I.","family":"Anton","sequence":"additional","affiliation":[]},{"given":"Peter P.","family":"Swire","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"journal-title":"Readability Revisited The new Dale-Chall Readability Formula","year":"1995","author":"chall","key":"35"},{"key":"17","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/978-3-642-03168-7_3","article-title":"A comparative study of online privacy policies and formats","volume":"5672","author":"mcdonald","year":"2009","journal-title":"Privacy Enhancing Technologies Ser Lecture Notes in Computer Science"},{"key":"36","first-page":"574","volume":"2001","author":"si","year":"2001","journal-title":"A Statistical Model for Scientific Readability Cikm"},{"key":"18","article-title":"Cost of reading privacy policies,\" i\/s","author":"mcdonald","year":"2008","journal-title":"A Journal of Law and Policy for the Information Society 2008 Privacy Year in Review Issue"},{"key":"33","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1177\/001872087001200505","article-title":"Derivation and Validation of the Automated Readability Index for use with Technical Materials","volume":"12","author":"kincaid","year":"1970","journal-title":"Human Factors"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.65"},{"key":"34","first-page":"594","article-title":"A readability formula for short passages","volume":"33","author":"fry","year":"1990","journal-title":"J Reading"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2008.922634"},{"key":"39","article-title":"Complexity of inference in latent dirichlet allocation","author":"sontag","year":"2011","journal-title":"Twenty-Fifth Annual Conference on Neural Information Processing Systems"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/IWSESS.2009.5068457"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.306"},{"key":"37","first-page":"193","author":"collins-thompson","year":"2004","journal-title":"A Language Modeling Approach to Predicting Reading Difficulty"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(03)00095-8"},{"key":"38","article-title":"Topic modeling in the humanities: An overview","author":"templeton","year":"2011","journal-title":"Maryland Institute for Technology in the Humanities"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2005.12"},{"key":"21","article-title":"Probabilistic topic models","author":"steyvers","year":"2006","journal-title":"Latent Semantic Analysis A Road to Meaning"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/2133806.2133826"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1108\/eb046814"},{"journal-title":"R Foundation for Statistical Computing","article-title":"R: A language and environment for statistical computing","year":"2012","key":"42"},{"key":"41","first-page":"27","article-title":"On smoothing and inference for topic models","author":"asuncion","year":"2009","journal-title":"Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence ser"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0307752101"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253568"},{"key":"45","article-title":"An estimate of an upper bound for the entropy of english","volume":"18","author":"brown","year":"1992","journal-title":"Computational Linguistics"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1108\/eb026526"},{"journal-title":"Introduction to probabilistic topic models","year":"2012","author":"blei","key":"47"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553515"},{"key":"22","first-page":"240","article-title":"The role of natural language in requirements engineering Requirements Engineering 1993","author":"ryan","year":"1993","journal-title":"Proc IEEE Int Symp"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1093\/pan\/mps028"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1093\/pan\/mpp034"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1162\/jmlr.2003.3.4-5.993"},{"key":"26","article-title":"Necessary but Not Sufficient: Standardized Mechanisms for Privacy Notice and Choice","volume":"10","author":"cranor","year":"2012","journal-title":"Journal of Telecommunications and High Technology Law"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.1004"},{"journal-title":"Internet Users","year":"2012","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1037\/h0057532"},{"key":"3","article-title":"On people, the death of privacy, and data pollution","author":"schneier","year":"2008","journal-title":"EDUCAUSE Review"},{"key":"2","article-title":"Data, data everywhere","author":"cukier","year":"2010","journal-title":"The Economist"},{"key":"1","article-title":"Why software is eating the world","author":"andreessen","year":"2011","journal-title":"Wall Street Journal"},{"key":"10","first-page":"29","article-title":"Strategies for developing policies and requirements for secure e-commerce systems","author":"ant'on","year":"2001","journal-title":"Recent Advances in E-Commerce Security and Privacy"},{"journal-title":"The Technique of Clear Writing","year":"1952","author":"gunning","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.17"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.7"},{"key":"32","first-page":"8","article-title":"Derivation of new readability formulas (Automated Readability Index, Fog Count and Flesch Reading Ease Formula) for Navy enlisted personnel","author":"kincaid","year":"1975","journal-title":"Research Branch Report"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-003-0183-z"},{"key":"31","article-title":"SMOG grading- A new readability","author":"mclaughlin","year":"1969","journal-title":"J Reading"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281243"},{"key":"9","first-page":"1409","article-title":"Regulating privacy by design","volume":"26","author":"rubinstein","year":"2012","journal-title":"Berkeley Technol Law J"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0108-6"}],"event":{"name":"2013 IEEE 21st International Requirements Engineering Conference (RE)","start":{"date-parts":[[2013,7,15]]},"location":"Rio de Janeiro-RJ, Brazil","end":{"date-parts":[[2013,7,19]]}},"container-title":["2013 21st IEEE International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621629\/6636689\/06636700.pdf?arnumber=6636700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T13:14:21Z","timestamp":1564578861000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6636700\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/re.2013.6636700","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}