Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy and confidentiality in process mining: Threats and research challenges
Privacy and confidentiality are very important prerequisites for applying process mining to
comply with regulations and keep company secrets. This article provides a foundation for …
comply with regulations and keep company secrets. This article provides a foundation for …
Understanding the GDPR from a requirements engineering perspective—a systematic map** study on regulatory data protection requirements
Data protection compliance is critical from a requirements engineering (RE) perspective,
both from a software development lifecycle (SDLC) perspective and regulatory compliance …
both from a software development lifecycle (SDLC) perspective and regulatory compliance …
The perspective of Brazilian software developers on data privacy
Context: Maintaining the privacy of user data is a concern in software development to satisfy
customer needs or to comply with privacy laws. Recent studies have shown that software …
customer needs or to comply with privacy laws. Recent studies have shown that software …
COPri v. 2—A core ontology for privacy requirements
Nowadays, most enterprises collect, store, and manage personal information of customers to
deliver their services. In such a setting, privacy has emerged as a key concern since …
deliver their services. In such a setting, privacy has emerged as a key concern since …
Evaluating a privacy requirements specification method by using a mixed-method approach: results and lessons learned
Although agile software development (ASD) has been adopted in the industry, requirements
approaches for ASD still neglect non-functional requirements. Privacy has become a …
approaches for ASD still neglect non-functional requirements. Privacy has become a …
An ontology for privacy requirements via a systematic literature review
Privacy has emerged as a key concern for business and social computing as security
breaches have compromised personal data for millions. Despite this, much of existing work …
breaches have compromised personal data for millions. Despite this, much of existing work …
Socio-Technical Modelling for GDPR Principles: an Extension for the STS-ml
Compliance with data protection regulations is vital for organizations and starts at the
requirements level. The General Data Protection Regulation (GDPR) has been the …
requirements level. The General Data Protection Regulation (GDPR) has been the …
A natural language-based method to specify privacy requirements: an evaluation with practitioners
Organisations are becoming concerned with effectively dealing with privacy-related
requirements. Existing Requirements Engineering methods based on structured natural …
requirements. Existing Requirements Engineering methods based on structured natural …
An approach to formal desription of the user notification scenarios in privacy policies
M Kuznetsov, E Novikova… - 2022 30th Euromicro …, 2022 - ieeexplore.ieee.org
Nowadays the collection and usage of users' personal data have become an extremely
common scenario. The users actively provide their personal data to customize or improve …
common scenario. The users actively provide their personal data to customize or improve …
CIDaTa: an ontology-based framework for international data transfers and GDPR compliance
Cross-border data transfers and their legal aspects have created a daunting landscape for
application and service providers, in which rules and regulations need to be constantly …
application and service providers, in which rules and regulations need to be constantly …