{"id":"https://openalex.org/W2013061491","doi":"https://doi.org/10.1109/relaw.2011.6050266","title":"The role of data use agreements in specifying legally compliant software requirements","display_name":"The role of data use agreements in specifying legally compliant software requirements","publication_year":2011,"publication_date":"2011-08-01","ids":{"openalex":"https://openalex.org/W2013061491","doi":"https://doi.org/10.1109/relaw.2011.6050266","mag":"2013061491"},"language":"en","primary_location":{"id":"doi:10.1109/relaw.2011.6050266","is_oa":false,"landing_page_url":"https://doi.org/10.1109/relaw.2011.6050266","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Fourth International Workshop on Requirements Engineering and Law","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103712565","display_name":"Jessica Young Schmidt","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jessica Young Schmidt","raw_affiliation_strings":["Department of Computer Science, North Carolina State University, Raleigh, NC, USA","North Carolina State University, Department of Computer Science, Raleigh, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University, Department of Computer Science, Raleigh, USA#TAB#","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103352687","display_name":"Annie I. Ant\u00f3n","orcid":"https://orcid.org/0000-0002-4397-9613"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Annie I. Anton","raw_affiliation_strings":["Department of Computer Science, North Carolina State University, Raleigh, NC, USA","North Carolina State University, Department of Computer Science, Raleigh, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University, Department of Computer Science, Raleigh, USA#TAB#","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028171895","display_name":"Laurie Williams","orcid":"https://orcid.org/0000-0003-3300-6540"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Laurie Williams","raw_affiliation_strings":["Department of Computer Science, North Carolina State University, Raleigh, NC, USA","North Carolina State University, Department of Computer Science, Raleigh, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University, Department of Computer Science, Raleigh, USA#TAB#","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025175755","display_name":"Paul N. Otto","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Paul N. Otto","raw_affiliation_strings":["Department of Computer Science, North Carolina State University, Raleigh, NC, USA","North Carolina State University, Department of Computer Science, Raleigh, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University, Department of Computer Science, Raleigh, USA#TAB#","institution_ids":["https://openalex.org/I137902535"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103712565"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":4.4337,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.94496511,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9623000025749207,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10350","display_name":"Electronic Health Records Systems","score":0.9506999850273132,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/health-insurance-portability-and-accountability-act","display_name":"Health Insurance Portability and Accountability Act","score":0.7787438035011292},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5869534015655518},{"id":"https://openalex.org/keywords/privilege","display_name":"Privilege (computing)","score":0.491984099149704},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4824736416339874},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4403754770755768},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.4378218650817871},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.42855918407440186},{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.42478036880493164},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.40192413330078125},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3662700057029724},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.3569311499595642},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3510114252567291},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1540583074092865}],"concepts":[{"id":"https://openalex.org/C2778306010","wikidata":"https://www.wikidata.org/wiki/Q606563","display_name":"Health Insurance Portability and Accountability Act","level":3,"score":0.7787438035011292},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5869534015655518},{"id":"https://openalex.org/C2780138299","wikidata":"https://www.wikidata.org/wiki/Q3404265","display_name":"Privilege (computing)","level":2,"score":0.491984099149704},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4824736416339874},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4403754770755768},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.4378218650817871},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.42855918407440186},{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.42478036880493164},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.40192413330078125},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3662700057029724},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.3569311499595642},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3510114252567291},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1540583074092865},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/relaw.2011.6050266","is_oa":false,"landing_page_url":"https://doi.org/10.1109/relaw.2011.6050266","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Fourth International Workshop on Requirements Engineering and Law","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320310013","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1493372904","https://openalex.org/W1515587369","https://openalex.org/W1974258029","https://openalex.org/W2013086879","https://openalex.org/W2018357323","https://openalex.org/W2060691344","https://openalex.org/W2107930672","https://openalex.org/W2114305512","https://openalex.org/W2125596064","https://openalex.org/W2125689148","https://openalex.org/W2149581025","https://openalex.org/W2156996736","https://openalex.org/W6983066051"],"related_works":["https://openalex.org/W2435140079","https://openalex.org/W329668553","https://openalex.org/W2071764545","https://openalex.org/W2169699977","https://openalex.org/W2186292738","https://openalex.org/W1529039972","https://openalex.org/W2417650639","https://openalex.org/W2038732192","https://openalex.org/W4251772101","https://openalex.org/W2261857008"],"abstract_inverted_index":{"Security":[0],"and":[1,9,30,53,66,89,104,117],"privacy":[2,31],"requirements":[3,32,38,84,134],"are":[4,10,94],"often":[5,11],"not":[6,12],"explicitly":[7],"stated":[8],"easy":[13],"to":[14,47,86,121,142],"elicit.":[15],"In":[16],"this":[17,127],"paper,":[18],"we":[19,113,129],"discuss":[20,101],"data":[21,75],"use":[22],"agreements":[23],"(DUAs)":[24],"as":[25,72,92],"a":[26,59,73],"source":[27],"of":[28,68],"security":[29],"that":[33,58],"can":[34],"be":[35],"leveraged":[36],"by":[37],"engineers.":[39],"Within":[40],"the":[41,48,98,105],"healthcare":[42],"domain,":[43],"regulations":[44],"created":[45],"pursuant":[46],"U.S.":[49],"Health":[50],"Insurance":[51],"Portability":[52],"Accountability":[54],"Act":[55],"(HIPAA)":[56],"specify":[57],"DUA":[60],"must":[61],"exist":[62],"for":[63,83,88],"certain":[64],"uses":[65],"disclosures":[67],"protected":[69],"health":[70],"information":[71,106],"limited":[74],"set.":[76],"For":[77],"compliance":[78,133,138],"reasons,":[79],"it":[80],"is":[81],"important":[82],"engineers":[85],"ask":[87],"evaluate":[90],"DUAs,":[91,112],"they":[93],"legally":[95,123],"binding":[96],"on":[97],"parties.":[99],"We":[100],"HIPAA-governed":[102],"DUAs":[103],"contained":[107],"within":[108],"them.":[109],"Using":[110],"four":[111],"apply":[114],"commitment,":[115],"privilege,":[116],"right":[118],"(CPR)":[119],"analysis":[120],"identify":[122],"compliant":[124],"requirements.":[125],"Through":[126],"work,":[128],"have":[130],"identified":[131],"contractual":[132],"while":[135],"also":[136],"identifying":[137],"problems":[139],"in":[140],"relation":[141],"DUAs.":[143]},"counts_by_year":[{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
