TY - GEN
T1 - Towards Norm Classification
T2 - 29th IEEE International Requirements Engineering Conference Workshops, REW 2021
AU - Shah, Vedarsh
AU - Peng, Zedong
AU - Malla, Ganesh
AU - Niu, Nan
N1 - Publisher Copyright:
© 2021 IEEE.
PY - 2021/9
Y1 - 2021/9
N2 - Regulatory policies, like the US Health Insurance Portability and Accountability Act (HIPAA), impose the social norms mediated by software-intensive systems. Breaches, modeled as norm violations, can help elicit security and privacy requirements to prevent future system failures. This paper reports our initial analysis of 38 HIPAA breaches with the objective of classifying them into the different norm types: commitments, authorizations, or prohibitions. The results show only limited distinguishing power of textual features, and reveal the fundamental interchangeability of commitments and prohibitions.
AB - Regulatory policies, like the US Health Insurance Portability and Accountability Act (HIPAA), impose the social norms mediated by software-intensive systems. Breaches, modeled as norm violations, can help elicit security and privacy requirements to prevent future system failures. This paper reports our initial analysis of 38 HIPAA breaches with the objective of classifying them into the different norm types: commitments, authorizations, or prohibitions. The results show only limited distinguishing power of textual features, and reveal the fundamental interchangeability of commitments and prohibitions.
KW - security and privacy breaches
KW - social norms
UR - https://www.scopus.com/pages/publications/85118461174
U2 - 10.1109/REW53955.2021.00074
DO - 10.1109/REW53955.2021.00074
M3 - Conference contribution
AN - SCOPUS:85118461174
T3 - Proceedings of the IEEE International Conference on Requirements Engineering
SP - 415
EP - 420
BT - Proceedings - 29th IEEE International Requirements Engineering Conference Workshops, REW 2021
A2 - Yue, Tao
A2 - Mirakhorli, Mehdi
PB - IEEE Computer Society
Y2 - 20 September 2021 through 24 September 2021
ER -