During the requirements elicitation phase, analysts have often to take into consideration laws and regulations en-acted by different levels of government. The purpose of this paper is twofold. First, a systematic process is outlined which, given a problem and a collection of legal prescrip-tions, generates a set of requirements that address the prob-lem while complying with the prescriptions. Second, the conceptual framework is outlined, which characterises the process by providing both legal concepts proposed in theo-retical studies in the legal domain and concepts from goal-oriented requirements engineering. The issues and chal-lenges of the proposed framework are also evaluated, with regard to expected results. 1. Software and the law No...
The increasing complexity of IT systems and the growing demand for regulation compliance are main is...
Laws set requirements that force organizations to assess the security and privacy of their IT system...
Laws set requirements that force organizations to assess the security and privacy of their IT system...
During the requirements elicitation phase, analysts have often to take into consideration laws and ...
A software system complies with a regulation if its operation is consistent with the regulation unde...
In modern societies, both business and private life are deeply pervaded by software and information ...
. Accretion procedure of crimes and security breaches against the privacy of individual’s informati...
—For software systems that process and manage sensitive information, compliance with laws has becom...
Laws and regulations are increasingly impacting the design and development of software systems, as l...
We identify 74 generic, reusable technical requirements based on the GDPR that can be applied to sof...
Legal texts, such as regulations and legislation, are increasingly playing an important role in requ...
[Context and motivation] The increasing demand of software systems to process and manage sensitive i...
Abstract—The great impact that law has on the design of software systems has been widely recognized ...
Abstract The high cost of non-compliance with laws and regulations that govern software systems make...
The increasing complexity of IT systems and the grow-ing demand for regulation compliance are main i...
The increasing complexity of IT systems and the growing demand for regulation compliance are main is...
Laws set requirements that force organizations to assess the security and privacy of their IT system...
Laws set requirements that force organizations to assess the security and privacy of their IT system...
During the requirements elicitation phase, analysts have often to take into consideration laws and ...
A software system complies with a regulation if its operation is consistent with the regulation unde...
In modern societies, both business and private life are deeply pervaded by software and information ...
. Accretion procedure of crimes and security breaches against the privacy of individual’s informati...
—For software systems that process and manage sensitive information, compliance with laws has becom...
Laws and regulations are increasingly impacting the design and development of software systems, as l...
We identify 74 generic, reusable technical requirements based on the GDPR that can be applied to sof...
Legal texts, such as regulations and legislation, are increasingly playing an important role in requ...
[Context and motivation] The increasing demand of software systems to process and manage sensitive i...
Abstract—The great impact that law has on the design of software systems has been widely recognized ...
Abstract The high cost of non-compliance with laws and regulations that govern software systems make...
The increasing complexity of IT systems and the grow-ing demand for regulation compliance are main i...
The increasing complexity of IT systems and the growing demand for regulation compliance are main is...
Laws set requirements that force organizations to assess the security and privacy of their IT system...
Laws set requirements that force organizations to assess the security and privacy of their IT system...