338
Views
6
CrossRef citations to date
0
Altmetric
Original Articles

Analyzing privacy requirements: A case study of healthcare in Saudi Arabia

, &

References

  • Breaux TD, Vail MW, Antón AI. Towards regulatory compliance: extracting rights and obligations to align requirements with regulations. The 14th IEEE International Requirements Engineering Conference; 2006 Sep 11–15; Minneapolis/St. Paul. Los Alamitos, CA: IEEE; 2006:49–58
  • Cheng BHC, Atlee JM. Research directions in requirements engineering. Conference on Future of Software Engineering; 2007 May 23–25; Minneapolis. Los Alamitos, CA: IEEE; 2007:285–303
  • Wu R, Ahn G-J, Hu H. Towards HIPAA-compliant healthcare systems. The 2nd ACM SIGHIT International Health Informatics Symposium; 2012 Jan 28–30; Miami. New York, NY: ACM; 2012:894
  • Maxwell JC, Antón AI, Swire P, et al. A legal cross-references taxonomy for reasoning about compliance requirements. J Requirement Eng 2012;17:99–115
  • Massey AI, Otto PN, Hayward LJ, Antón AI. Evaluating existing security and privacy requirements for legal compliance. J Requirement Eng 2010;15:119–37
  • Otto PN, Antón AI. Addressing legal requirements in requirements engineering. The 15th IEEE International Requirements Engineering Conference; 2007 Oct 15–19; Delhi. Los Alamitos, CA: IEEE; 2007:5–14
  • Breaux TD. Legal requirements acquisition for the specification of legally compliant information systems [dissertation]. Raleigh, NC: North Carolina State University; 2009:116
  • Breaux TD, Antón AI. Analyzing regulatory rules for privacy and security requirements. IEEE Trans Softw Eng 2008;34:5–20
  • Alkabba AF, Hussein GMA, Albar AA, et al. The major medical ethical challenges facing the public and healthcare providers in Saudi Arabia. J Family Community Med 2012;19:1–6
  • Jakobsen S. MENA and Egypt are like an upside down Europe [Internet]. Arab News; 2013 Aug 24. Available from: http://www.arabnews.com/news/462245 [last accessed 7 Oct 2013]
  • Brodie CA, Karat C, Karat J. An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench. Proceedings of Symposium on Usable Privacy and Security (SOUPS); 2006 Jul 12–14; Pittsburgh, PA. New York, NY: ACM; 2006:168
  • Kiyavitskaya N, Zeni N, Breaux TD, et al. Extracting rights and obligations from regulations: toward a tool-supported process. The 22nd IEEE/ACM International Conference on Automated Software Engineering; 2007 Nov 5–9; Atlanta, GA. New York, NY: ACM; 2007:429–32
  • Stamey JW, Rossi RA. Automatically identifying relations in privacy policies. The 27th ACM International Conference on Design of Communication; 2009 Oct 5–7; Bloomington, IN. New York, NY: ACM; 2009:233–8
  • Waterman K. Pre-processing legal text: policy parsing and isomorphic intermediate representation. Intelligent Information Privacy Management Symposium; 2010 Mar 22–24; Stanford University. Stanford, CA: AAAI; 2010
  • Barth A, Datta A, Mitchell C, Nissenbaum H. Privacy and contextual integrity: framework and applications. The 2006 IEEE Symposium on Security and Privacy; 2006 May 21–24; Berkeley/Oakland. Los Alamitos, CA: IEEE; 2006:184–98
  • May MJ, Gunter CA, Lee I. Privacy APIs: access control techniques to analyze and verify legal privacy policies. The 19th IEEE Workshop on Computer Security Foundations; 2006 July 5–7; Venice. Los Alamitos, CA: IEEE Computer Society; 2006:85–97
  • Mont MC, Pearson S, Creese S, et al. A conceptual model for privacy policies with consent and revocation requirements. IFIP Adv Inform Commun Technol 2011;352:258–70
  • Pearson S, Rao P, Sander T, et al. Scalable, accountable privacy management for large organizations. The 13th workshop on Enterprise Distributed Object Computing Conference; 2009 Sep 1–4; Auckland. Los Alamitos, CA: IEEE; 2009:168–75
  • Yin RK. Case study research: design and methods. Applied Social Research Methods Series. 5th ed. Thousand Oaks: Sage Publications; 2014
  • Saudi Council for Health Specialties. Ethics of the medical profession. 2nd ed. Riyadh, Saudi Arabia: Saudi Council for Health Specialties; 2003
  • Glaser BC, Strauss AL. The discovery of grounded theory. Chicago: Aldine Publishing; 1967
  • Breaux TD, Antón AI, Doyle J. Semantic parameterization: a process for modeling domain descriptions. ACM Trans Softw Eng Methodol 2008;18:1–27
  • Crick T. Superoptimisation: provably optimal code generation using answer set programming [dissertation]. Bath, UK: University of Bath; 2009:131
  • Enderton H. A mathematical introduction to logic. Boston, MA: Academic Press; 2001

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.