{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:46:03Z","timestamp":1729647963652,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/re.2013.6636760","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T19:25:31Z","timestamp":1383074731000},"page":"381-384","source":"Crossref","is-referenced-by-count":2,"title":["The regulatory world and the machine: Harmonizing legal requirements and the systems they affect"],"prefix":"10.1109","author":[{"given":"David G.","family":"Gordon","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/11428817_9","article-title":"Natural language processing: Mature enough for requirements documents analysis?","author":"kof","year":"2005","journal-title":"Natural Language Processing and Information Systems"},{"key":"17","first-page":"1","article-title":"A framework to support alignment of secure software engineering with legal regulations","volume":"10","author":"islam","year":"2010","journal-title":"Software Systems Modeling"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1515\/9781400821211","author":"king","year":"1994","journal-title":"Designing Social Inquiry Scientific Inference in Qualitative Research"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-013-0167-6"},{"key":"16","article-title":"Validation of decision support systems","author":"greenberg","year":"1987","journal-title":"Mathematical Models for Decision Support"},{"key":"13","first-page":"83","author":"gordon","year":"2011","journal-title":"Managing Multi-Jurisdictional Requirements in the Cloud Towards A Computational Legal Landscape"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345843"},{"journal-title":"Regulations Expressed As Logical Models","year":"2005","author":"giblin","key":"11"},{"key":"12","volume":"121","author":"gilstrap","year":"2011","journal-title":"Burden Shifting in Software Licensing Agreements"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s007660200002"},{"key":"20","volume":"88","author":"needles","year":"2009","journal-title":"Data Game Learning to Love the State-Based Approach to Data Breach Notification Law"},{"journal-title":"As Sony Counts Hacking Costs Analysts See Billion-Dollar Repair Bill","year":"2011","author":"osaka","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.65"},{"journal-title":"The True Cost of Compliance","year":"2011","key":"24"},{"journal-title":"Third Annual Benchmark Study on Patient Privacy and Security","year":"2012","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/RELAW.2012.6347801"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.18"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2010.5679166"},{"key":"29","first-page":"383","author":"siena","year":"2012","journal-title":"Capturing Variability of Law with Nomos 2 Conceptual Modeling- 31st International Conference ER"},{"key":"3","article-title":"Regulatory requirements traceability and analysis using semi-formal specifications","author":"breaux","year":"2013","journal-title":"2013 Int Working Conference on Requirements Engineering Foundation for Software Quality"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2008.36"},{"journal-title":"An Introduction to Qualitative Research","year":"2009","author":"flick","key":"10"},{"journal-title":"Legal Requirements Acquisition for the Specification of Legally Compliant Information Systems","year":"2009","author":"breaux","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2002.1048511"},{"journal-title":"Global Information Security Survey","year":"2012","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61350-323-2.ch302"},{"journal-title":"Basics of Qualitative Research Techniques and Procedures for Developing Grounded Theory","year":"2007","author":"corbin","key":"5"},{"journal-title":"Case Study Research Design and Methods","year":"2009","author":"yin","key":"31"},{"key":"4","article-title":"Australian data breach notification : AAvoiding the State\/Federal overlap","author":"burdon","year":"2010","journal-title":"Proceedings of 5th International Conference on Legal Security and Privacy Issues in IT Law"},{"key":"9","article-title":"Hacking into data breach notification laws","author":"faulkner","year":"2010","journal-title":"Florida Law Review"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1852786.1852810"}],"event":{"name":"2013 IEEE 21st International Requirements Engineering Conference (RE)","start":{"date-parts":[[2013,7,15]]},"location":"Rio de Janeiro-RJ, Brazil","end":{"date-parts":[[2013,7,19]]}},"container-title":["2013 21st IEEE International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621629\/6636689\/06636760.pdf?arnumber=6636760","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T09:14:16Z","timestamp":1564564456000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6636760\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/re.2013.6636760","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}