we should research techniques to manually and then
automatically evaluate the quality of these privacy
policies. For example, how can we evaluate the
quality of a specific policy. Further research and
guidelines may help companies to properly specify
these policies. Third, and consequence from the
second issue, we should include the ability to analyze
not just one but a set of inter-related policies and
automatically identify inconsistencies among the
requirements stated in these policies, that increasingly
appear in multi-tier systems, in which each tier may
be owned and operated by a different party, and
raising additional problems such as over-collection
and repurposing (Breaux et al., 2015).
ACKNOWLEDGEMENTS
This work was partially supported by national funds
under FCT projects UID/CEC/50021/2013,
EXCL/EEI-ESS/0257/2012, CMUP-EPB/TIC/0053/
2013 and the project TT-MDD-Mindbury/2014.
REFERENCES
Ammar, W., et al., 2012. Automatic categorization of
privacy policies: A pilot study. In School of Computer
Science, Language Technology Institute, Technical
Report CMU-LTI-12-019.
Baader, F., Calvenese, D., McGuiness, D. (eds), 2003. The
description logic handbook: theory, implementation
and applications. Cambridge University Press.
Bettini, L., 2013. Implementing Domain-Specific
Languages with Xtext and Xtend. Packt Publishing Ltd.
Bird, S., Klein, E., Loper, E., 2009. Natural Language
Processing with Python. O'Reilly Media, 1st edition.
Breaux, T.D., Baumer, D.L., 2011. Legally ‘Reasonable’
Security Requirements: A 10-year FTC Retrospective.
Computers & Security, 30(4):178-193.
Breaux, T. D., Hibshi, H. and Rao, A., 2014. Eddy, a formal
language for specifying and analyzing data flow
specifications for conflicting privacy requirements.
Requirements Engineering, 19(3):1–27.
Breaux, T. D., Smullen, D., Hibshi, H., 2015. Detecting
Repurposing and Over-collection in Multi-Party
Privacy Requirements Specifications. In Proceedings
of IEEE International Requirements Engineering
Conference (RE'15).
Caramujo, J., Silva, A. R., 2015. Analyzing Privacy
Policies based on a Privacy-Aware Profile: the
Facebook and LinkedIn case studies. In Proceedings of
IEEE CBI'2015, IEEE.
Ceri, S. et al., 1995. Web Information Retrieval. Springer,
2013.
Cortes, C. and Vapnik, V., 1995. Support-vector networks.
Machine Learning, 20(3):273-297.
Cunningham, H., 2006. Information Extraction, Automatic.
In Encyclopedia of Language & Linguistics, volume 5.
Elsevier, 2nd edition.
Davis, A. M., 2005. Just Enough Requirements
Management: Where Software Development Meets
Marketing. Dorset House Publishing, 1st edition.
Emam, K., Koru, A., 2008. A Replicated Survey of IT
Software Project Failures. IEEE Software, 25(5):84-90.
Farrell, C.B., 2011. FTC charges deceptive privacy
practices in Google’s rollout of its buzz social network.
In U.S. Federal Trade Commission News Release,
March 30.
Ferreira, D., Silva, A. R., 2012. RSLingo: An Information
Extraction Approach toward Formal Requirements
Specifications. In Proc. of the 2nd Int. Workshop on
Model-Driven Requirements Engineering, IEEE CS.
Ferreira, D., Silva, A. R., 2013. RSL-IL: An Interlingua for
Formally Documenting Requirements. In Proc. of the
of Third IEEE International Workshop on Model-
Driven Requirements Engineering, IEEE CS.
Ferreira, D., Silva, A. R., 2013a. RSL-PL: A Linguistic
Pattern Language for Documenting Software
Requirements. In Proc. of Third International
Workshop on Requirements Patterns, IEEE CS.
Kagal, L., Finin, T. and Joshi, A., 2003. A policy language
for a pervasive computing environment. In Proc. of the
4th IEEE International Workshop on Policies for
Distributed Systems and Networks, 63–74.
Kovitz, B., 1998. Practical Software Requirements:
Manual of Content and Style. Manning.
Lafferty, J., McCallum, A. and Pereira, F., 2001.
Conditional Random Fields: Probabilistic Models for
Segmenting and Labeling Sequence Data. In
Proceedings of the 18th International Conference on
Machine Learning.
Pohl, K., 2010. Requirements Engineering: Fundamentals,
Principles, and Techniques, Springer.
Quinlan, J., 1986. Induction of Decision Trees, Machine
Learning, 1(1):81-106.
Ramos, J., 2003. Using tf-idf to determine word relevance
in document queries. In Proceedings of the first
instructional conference on machine learning.
Robertson, S., Robertson, J., 2006. Mastering the
Requirements Process, 2nd edition. Addison-Wesley.
Sarawagi, S., 2008. Information Extraction. Foundations
and Trends in Databases 1(3):261-377.
Silva, A. R., 2014. SpecQua: Towards a Framework for
Requirements Specifications with Increased Quality. In
Enterprise Information Systems. Springer.
Silva, A.R., 2015. Model-Driven Engineering: A Survey
Supported by a Unified Conceptual Model. Computer
Languages, Systems & Structures, 43. Elsevier.
Sommerville, I., Sawyer, P., 1997. Requirements
Engineering: A Good Practice Guide. Wiley.
Steel, E., Fowler, G. A., 2010. Facebook in privacy breach.
Wall Street Journal, Oct. 18.
Tonti, G. et al., 2003. Semantic Web languages for policy
representation and reasoning: A comparison of KAoS,