Annie I. Antón

According to our database1, Annie I. Antón authored at least 89 papers between 1994 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Discovering undocumented knowledge through visualization of agile software development activities.
Requir. Eng., 2018

2017
How Much Undocumented Knowledge is there in Agile Software Development?: Case Study on Industrial Project Using Issue Tracking System and Version Control System.
Proceedings of the 25th IEEE International Requirements Engineering Conference, 2017

2016
Privacy Impacts of IoT Devices: A SmartTV Case Study.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Visualizing the effects of requirements evolution.
Proceedings of the 38th International Conference on Software Engineering, 2016

Early Adopters of the Internet and Social Media in Cuba.
Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, 2016

2015
Evaluating Legal Implementation Readiness Decision-Making.
IEEE Trans. Software Eng., 2015

2014
Identifying and classifying ambiguity for regulatory requirements.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

Now more than ever: Privacy and security are required (keynote).
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

Tracking requirements evolution by using issue tickets: a case study of a document management and approval system.
Proceedings of the 36th International Conference on Software Engineering, 2014

2013
Facing Challenges and Having Fun.
IEEE Computer, 2013

An empirical investigation of software engineers' ability to classify legal cross-references.
Proceedings of the 21st IEEE International Requirements Engineering Conference, 2013

Automated text mining for requirements analysis of policy documents.
Proceedings of the 21st IEEE International Requirements Engineering Conference, 2013

2012
A legal cross-references taxonomy for reasoning about compliance requirements.
Requir. Eng., 2012

Assessing identification of compliance requirements from privacy policies.
Proceedings of the Fifth IEEE International Workshop on Requirements Engineering and Law, 2012

Managing changing compliance requirements by predicting regulatory evolution.
Proceedings of the 2012 20th IEEE International Requirements Engineering Conference (RE), 2012

UCONLEGAL: a usage control model for HIPAA.
Proceedings of the ACM International Health Informatics Symposium, 2012

2011
Digital privacy: theory, policies and technologies.
Requir. Eng., 2011

The role of data use agreements in specifying legally compliant software requirements.
Proceedings of the Fourth International Workshop on Requirements Engineering and Law, 2011

A legal cross-references taxonomy for identifying conflicting software requirements.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

Assessing the accuracy of legal implementation readiness decisions.
Proceedings of the RE 2011, 19th IEEE International Requirements Engineering Conference, Trento, Italy, August 29 2011, 2011

2010
Evaluating existing security and privacy requirements for legal compliance.
Requir. Eng., 2010

How Internet Users' Privacy Concerns Have Evolved since 2002.
IEEE Security & Privacy, 2010

A Method for Identifying Software Requirements Based on Policy Commitments.
Proceedings of the RE 2010, 18th IEEE International Requirements Engineering Conference, Sydney, New South Wales, Australia, September 27, 2010

The production rule framework: developing a canonical set of software requirements for compliance with law.
Proceedings of the ACM International Health Informatics Symposium, 2010

2009
IT Compliance: Aligning Legal and Product Requirements.
IT Professional, 2009

Requirements-based Access Control Analysis and Policy Specification (ReCAPS).
Information & Software Technology, 2009

A distributed requirements management framework for legal compliance and accountability.
Computers & Security, 2009

Identifying vulnerabilities and critical requirements using criminal court proceedings.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Identifying Commitment-Based Software Requirements to Thwart Unfair and Deceptive Practices.
Proceedings of the Second International Workshop on Requirements Engineering and Law, 2009

Checking Existing Requirements for Compliance with Law Using a Production Rule Model.
Proceedings of the Second International Workshop on Requirements Engineering and Law, 2009

Developing Production Rule Models to Aid in Acquiring Requirements from Legal Texts.
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009

Prioritizing Legal Requirements.
Proceedings of the Second International Workshop on Requirements Engineering and Law, 2009

2008
Analyzing Regulatory Rules for Privacy and Security Requirements.
IEEE Trans. Software Eng., 2008

Semantic parameterization: A process for modeling domain descriptions.
ACM Trans. Softw. Eng. Methodol., 2008

An Empirical Study of Consumer Perceptions and Comprehension of Web Site Privacy Policies.
IEEE Trans. Engineering Management, 2008

Scenario support for effective requirements.
Information & Software Technology, 2008

Aligning Requirements with HIPAA in the iTrust System.
Proceedings of the 16th IEEE International Requirements Engineering Conference, 2008

A Requirements-based Comparison of Privacy Taxonomies.
Proceedings of the First International Workshop on Requirements Engineering and Law, 2008

Legal Requirements, Compliance and Practice: An Industry Case Study in Accessibility.
Proceedings of the 16th IEEE International Requirements Engineering Conference, 2008

Automating the Extraction of Rights and Obligations for Regulatory Compliance.
Proceedings of the Conceptual Modeling, 2008

2007
The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information.
IEEE Security & Privacy, 2007

HIPAA's Effect on Web Site Privacy Policies.
IEEE Security & Privacy, 2007

A roadmap for comprehensive online privacy policy management.
Commun. ACM, 2007

Towards understanding user perceptions of authentication technologies.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Addressing Legal Requirements in Requirements Engineering.
Proceedings of the 15th IEEE International Requirements Engineering Conference, 2007

Improving Performance Requirements Specifications from Field Failure Reports.
Proceedings of the 15th IEEE International Requirements Engineering Conference, 2007

Extracting rights and obligations from regulations: toward a tool-supported process.
Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), 2007

2006
A semantics based approach to privacy languages.
Comput. Syst. Sci. Eng., 2006

Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations.
Proceedings of the 14th IEEE International Conference on Requirements Engineering (RE 2006), 2006

Enforceability vs. Accountability in Electronic Policies.
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

Ensuring Compliance between Policies, Requirements and Software Design: A Case Study.
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006

Privacy Policy Representation in Web-based Healthcare.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
Examining Internet privacy policies within the context of user privacy values.
IEEE Trans. Engineering Management, 2005

Transnational Information Sharing, Event Notification, Rule Enforcement and Process Coordination.
IJEGR, 2005

Mining rule semantics to understand legislative compliance.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

Analyzing Goal Semantics for Rights, Permissions, and Obligations.
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005

Deriving Semantic Models from Privacy Policies.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

2004
A requirements taxonomy for reducing Web site privacy vulnerabilities.
Requir. Eng., 2004

Misuse and Abuse Cases: Getting Past the Positive.
IEEE Security & Privacy, 2004

Inside JetBlue's Privacy Policy Violations.
IEEE Security & Privacy, 2004

Financial Privacy Policies and the Need for Standardization.
IEEE Security & Privacy, 2004

Specifying privacy policies with P3P and EPAL: lessons learned.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

A formal semantics for P3P.
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004

'I Need It Now': Improving Website Usability by Contextualizing Privacy Policies.
Proceedings of the Web Engineering - 4th International Conference, 2004

Experiences in applying agile software development practices in new product development.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004

A Prototype System for Transnational Information Sharing and Process Coordination: System Demo.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

A Prototype System for Transnational Information Sharing and Process Coordination.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

Addressing End-User Privacy Concerns.
Proceedings of the 10th Americas Conference on Information Systems, 2004

An Initial Exploration of the Relationship Between Pair Programming and Brooks' Law.
Proceedings of the 2004 Agile Development Conference (ADC 2004), 2004

2003
Functional Paleontology: The Evolution of User-Visible System Services.
IEEE Trans. Software Eng., 2003

Point/Counterpoint: Don't Solve a Problem Before You Get to It / Successful Software Projects Need Requirements Planning.
IEEE Software, 2003

Precluding incongruous behavior by aligning software requirements with security and privacy policies.
Information & Software Technology, 2003

SMaRT - Scenario Management and Requirements Tool.
Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003), 2003

Contrasting Use Case, Goal, and Scenario Analysis of the Euronet System.
Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003), 2003

2002
Guest Editorial: Requirements Engineering for Information Security.
Requir. Eng., 2002

Analyzing Website Privacy Requirements Using a Privacy Goal Taxonomy.
Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering (RE 2002), 2002

2001
Strategies for Developing Policies and Requirements for Secure and Private Electronic Commerce.
Proceedings of the E-Commerce Security and Privacy, 2001

Deriving Goals from a Use-Case Based Requirements Specification.
Requir. Eng., 2001

Evolving Beyond Requirements Creep: A Risk-Based Evolutionary Prototyping Model.
Proceedings of the 5th IEEE International Symposium on Requirements Engineering (RE 2001), 2001

The Role of Policy and Stakeholder Privacy Values in Requirements Engineering.
Proceedings of the 5th IEEE International Symposium on Requirements Engineering (RE 2001), 2001

Functional Paleontology: System Evolution as the User Sees It.
Proceedings of the 23rd International Conference on Software Engineering, 2001

2000
What Do You Mean I've Been Practicing without a License? Certification and Licensing of Requirements Engineering Professionals.
Proceedings of the 4th International Conference on Requirements Engineering, 2000

1999
An Integrated Scenario Management Strategy.
Proceedings of the 4th IEEE International Symposium on Requirements Engineering (RE '99), 1999

1998
A Representational Framework for Scenarios of System Use.
Requir. Eng., 1998

The Use of Goals to Surface Requirements for Evolving Systems.
Proceedings of the Forging New Links, 1998

1996
A Web-based requirements analysis tool.
Proceedings of the 5th Workshop on Enabling Technologies, 1996

Goal-Based Requirements Analysis.
Proceedings of the 2nd International Conference on Requirements Engineering, 1996

1994
Inquiry-Based Requirements Analysis.
IEEE Software, 1994

Goal Decomposition and Scenario Analysis in Business Process Reengineering
Proceedings of the Advanced Information Systems Engineering, 1994


  Loading...