2015 IEEE 23rd International Requirements Engineering Conference (RE) 2015
DOI: 10.1109/re.2015.7320419
|View full text |Cite
|
Sign up to set email alerts
|

Detecting repurposing and over-collection in multi-party privacy requirements specifications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…Further research and guidelines may help companies to properly specify these policies. Third, and consequence from the second issue, we should include the ability to analyze not just one but a set of inter-related policies and automatically identify inconsistencies among the requirements stated in these policies, that increasingly appear in multi-tier systems, in which each tier may be owned and operated by a different party, and raising additional problems such as over-collection and repurposing (Breaux et al, 2015). Rei, andPonder.…”
Section: Discussionmentioning
confidence: 99%
“…Further research and guidelines may help companies to properly specify these policies. Third, and consequence from the second issue, we should include the ability to analyze not just one but a set of inter-related policies and automatically identify inconsistencies among the requirements stated in these policies, that increasingly appear in multi-tier systems, in which each tier may be owned and operated by a different party, and raising additional problems such as over-collection and repurposing (Breaux et al, 2015). Rei, andPonder.…”
Section: Discussionmentioning
confidence: 99%
“…When identifying the personal information mentioned in privacy policies, we find that some sentences contain refinement phrases [42]. The refinement phrase refines one general concept with more specific concepts [27], [42].…”
Section: Steps In Privacy Policy Analysismentioning
confidence: 99%
“…When identifying the personal information mentioned in privacy policies, we find that some sentences contain refinement phrases [42]. The refinement phrase refines one general concept with more specific concepts [27], [42]. The specific concept refers to a specific kind of information accessed by the app (e.g., device ID) and the general concept is an abstraction of the specific concept (e.g., device information).…”
Section: Steps In Privacy Policy Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Breaux et al [7] also elaborated techniques for modelling multi-party data flows requirements and verifying the purpose specification as well as limitation principles.…”
Section: Related Workmentioning
confidence: 99%