Annie Antón
#45,147
Most Influential Person Now
American computer scientist
Annie Antón's AcademicInfluence.com Rankings
Annie Antóncomputer-science Degrees
Computer Science
#2580
World Rank
#2696
Historical Rank
#1115
USA Rank
Database
#7837
World Rank
#8151
Historical Rank
#996
USA Rank
Download Badge
Computer Science
Annie Antón's Degrees
- PhD Information Technology Georgia Tech
- Masters Information Technology Georgia Tech
- Bachelors Computer Science University of Richmond
Similar Degrees You Can Earn
Why Is Annie Antón Influential?
(Suggest an Edit or Addition)According to Wikipedia, Annie Antón is an academic and researcher in the fields of computer science, mathematical logic, and bioinformatics. She is a professor in the School of Interactive Computing at Georgia Tech, within its College of Computing. She is the founder and director of ThePrivacyPlace.org, a research center devoted to issues of privacy protection in information systems. She has also held advisory positions in industry and government.
Annie Antón's Published Works
Published Works
- Goal-based requirements analysis (1996) (639)
- Inquiry-based requirements analysis (1994) (617)
- Analyzing Regulatory Rules for Privacy and Security Requirements (2008) (356)
- The use of goals to surface requirements for evolving systems (1998) (311)
- Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations (2006) (278)
- Goal identification and refinement in the specification of software-based information systems (1997) (228)
- Examining Internet privacy policies within the context of user privacy values (2005) (217)
- Goal Decomposition and Scenario Analysis in Business Process Reengineering (1994) (213)
- Financial privacy policies and the need for standardization (2004) (195)
- Addressing Legal Requirements in Requirements Engineering (2007) (190)
- A requirements taxonomy for reducing Web site privacy vulnerabilities (2004) (135)
- How internet users' privacy concerns have evolved since 2002 (2010) (133)
- Analyzing Website privacy requirements using a privacy goal taxonomy (2002) (127)
- Deriving Goals from a Use-Case Based Requirements Specification (2001) (122)
- Analyzing goal semantics for rights, permissions, and obligations (2005) (102)
- Automating the Extraction of Rights and Obligations for Regulatory Compliance (2008) (101)
- Towards understanding user perceptions of authentication technologies (2007) (99)
- A roadmap for comprehensive online privacy policy management (2007) (97)
- Strategies for Developing Policies and Requirements for Secure Electronic Commerce Systems (2000) (90)
- Misuse and Abuse Cases: Getting Past the Positive (2004) (88)
- Toward a framework for evaluating extreme programming (2004) (88)
- An Empirical Study of Consumer Perceptions and Comprehension of Web Site Privacy Policies (2008) (84)
- Semantic parameterization: A process for modeling domain descriptions (2008) (82)
- An integrated scenario management strategy (1999) (79)
- Legal requirements acquisition for the specification of legally compliant information systems (2009) (78)
- Identifying and classifying ambiguity for regulatory requirements (2014) (74)
- Automated text mining for requirements analysis of policy documents (2013) (74)
- Evaluating existing security and privacy requirements for legal compliance (2010) (71)
- A formal semantics for P3P (2004) (70)
- Developing Production Rule Models to Aid in Acquiring Requirements from Legal Texts (2009) (68)
- Evolving beyond requirements creep: a risk-based evolutionary prototyping model (2001) (67)
- Deriving semantic models from privacy policies (2005) (65)
- Functional paleontology: system evolution as the user sees it (2001) (65)
- HIPAA's Effect on Web Site Privacy Policies (2007) (64)
- A distributed requirements management framework for legal compliance and accountability (2009) (63)
- A Representational Framework for Scenarios of System Use (1998) (61)
- Prioritizing Legal Requirements (2009) (58)
- The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information (2007) (54)
- Legal Requirements, Compliance and Practice: An Industry Case Study in Accessibility (2008) (54)
- Inquiry-Based Scenario Analysis of System Requirements (1994) (54)
- Precluding incongruous behavior by aligning software requirements with security and privacy policies (2003) (53)
- Scenario support for effective requirements (2008) (53)
- Mining rule semantics to understand legislative compliance (2005) (52)
- Specifying privacy policies with P3P and EPAL: lessons learned (2004) (48)
- An initial exploration of the relationship between pair programming and Brooks' law (2004) (47)
- Checking Existing Requirements for Compliance with Law Using a Production Rule Model (2009) (42)
- Extracting rights and obligations from regulations: toward a tool-supported process (2007) (42)
- Requirements-based Access Control Analysis and Policy Specification (ReCAPS) (2009) (42)
- A legal cross-references taxonomy for reasoning about compliance requirements (2012) (42)
- The role of policy and stakeholder privacy values in requirements engineering (2001) (42)
- Inside JetBlue's privacy policy violations (2004) (41)
- Defensive computer-security deception operations: processes, principles and techniques (2006) (41)
- The production rule framework: developing a canonical set of software requirements for compliance with law (2010) (40)
- A legal cross-references taxonomy for identifying conflicting software requirements (2011) (40)
- A Systematic Method for Acquiring Regulatory Requirements : A Frame-Based Approach (2007) (39)
- Functional Paleontology: The Evolution of User-Visible System Services (2003) (39)
- A Method for Identifying Software Requirements Based on Policy Commitments (2010) (38)
- A semantics based approach to privacy languages (2006) (37)
- Transnational Information Sharing, Event Notification, Rule Enforcement and Process Coordination (2005) (36)
- Point/Counterpoint: Don't Solve a Problem Before You Get to It / Successful Software Projects Need Requirements Planning (2003) (29)
- Strategies for Developing Policies and Requirements for Secure and Private Electronic Commerce (2001) (29)
- A Web-based requirements analysis tool (1996) (28)
- A SOCIAL, TECHNICAL, AND LEGAL FRAMEWORK FORPRIVACY MANAGEMENT AND POLICIES (2002) (25)
- Managing changing compliance requirements by predicting regulatory evolution (2012) (24)
- A Taxonomy for Web Site Privacy Requirements (2001) (23)
- Assessing the accuracy of legal implementation readiness decisions (2011) (23)
- The complexity underlying jetblue.s privacy policy violations (2003) (21)
- Early Adopters of the Internet and Social Media in Cuba (2016) (20)
- Enforceability vs. accountability in electronic policies (2006) (19)
- Ensuring compliance between policies, requirements and software design: a case study (2006) (18)
- An analysis of web site privacy policy evolution in the presence of HIPAA (2004) (18)
- Experiences in applying agile software development practices in new product development (2004) (17)
- A ROADMAP FOR COMPREHENSIVE ONLINE PRIVACY POLICY (2004) (17)
- Scenario Networks: A Case Study of the Enhanced Messaging System (2001) (16)
- Managing Use Cases During Goal-Driven Requirements Engineering: Challenges Encountered and Lessons Learned (1999) (16)
- Privacy Impacts of IoT Devices: A SmartTV Case Study (2016) (16)
- The Use of Goals to Extract Privacy and Security Requirements from Policy Statements (2003) (14)
- 'I Need It Now': Improving Website Usability by Contextualizing Privacy Policies (2004) (14)
- Evaluating Legal Implementation Readiness Decision-Making (2015) (12)
- A framework for privacy-enhanced access control analysis in requirements engineering (2004) (12)
- How Much Undocumented Knowledge is there in Agile Software Development?: Case Study on Industrial Project Using Issue Tracking System and Version Control System (2017) (11)
- Scenario Networks for Software Specification and Scenario Management TR-2001-15 (2001) (11)
- An empirical investigation of software engineers' ability to classify legal cross-references (2013) (11)
- Assessing identification of compliance requirements from privacy policies (2012) (10)
- Legal requirements metrics for compliance analysis (2012) (10)
- Addressing End-User Privacy Concerns (2004) (10)
- Privacy Policy Representation in Web-based Healthcare (2007) (10)
- Scenario networks and formalization for scenario management (2002) (9)
- Aligning Requirements with HIPAA in the iTrust System (2008) (9)
- A Requirements-based Comparison of Privacy Taxonomies (2008) (9)
- EPRAM: Evolutionary Prototyping Risk Analysis & Mitigation (e-Commerce Software Development Process Document) (2001) (9)
- Discovering undocumented knowledge through visualization of agile software development activities (2018) (9)
- A Strategy for Addressing Ambiguity in Regulatory Requirements (2015) (8)
- A refined production rule model for aiding in regulatory compliance (2010) (8)
- An algorithm to generate compliance monitors from regulations (2006) (8)
- Balancing Good Intentions : Protecting the Privacy of Electronic Health Information (2010) (8)
- Defining the Internet of Devices: Privacy and Security Implications (2014) (8)
- Requirements Engineering in the Long-Term: Fifty Years of Telephony Feature Evolution (1999) (7)
- Improving Performance Requirements Specifications from Field Failure Reports (2007) (7)
- Visualizing the Effects of Requirements Evolution (2016) (7)
- Triage for legal requirements (2010) (7)
- Behavioral Advertising Ethics (2011) (7)
- Validating Existing Requirements for Compliance with Law Using a Production Rule Model (2009) (7)
- A Prototype System for Transnational Information Sharing and Process Coordination: System Demo (2004) (6)
- A Distributed Requirements Management Framework for Compliance and Accountability (2006) (6)
- Enabling transnational collection, notification, and sharing of information (2003) (6)
- Managing Legal Texts in Requirements Engineering (2009) (6)
- Enhancing Privacy in Robotics via Judicious Sensor Selection (2020) (6)
- Pair Programming and the Factors Affecting Brooks'' Law (2003) (5)
- SMaRT - scenario management and requirements tool (2003) (5)
- Symposium on Requirements Engineering for Information Scurity (2000) (5)
- Tailored CMM for a Small e-Commerce Company - Level 2: Repeatable (2001) (5)
- The role of data use agreements in specifying legally compliant software requirements (2011) (5)
- Tracking requirements evolution by using issue tickets: a case study of a document management and approval system (2014) (5)
- Deriving Access Control Policies from Requirements Specifications and Database Designs (2004) (5)
- Contrasting use case, goal, and scenario analysis of the Euronet system (2003) (4)
- Goal-Mining to Examine Health Care Privacy Policies (2001) (4)
- First International Workshop on Requirements Engineering and Law (RELAW) (2008) (4)
- Impalpable constraints: Framing requirements for formal methods (2007) (4)
- UCONLEGAL: a usage control model for HIPAA (2012) (4)
- The role of law in requirements engineering (2007) (3)
- IT Compliance: Aligning Legal and Product Requirements (2009) (3)
- Identifying vulnerabilities and critical requirements using criminal court proceedings (2009) (3)
- Managing ambiguity and traceability in regulatory requirements: A tool-supported frame-based approach (2007) (3)
- Digital privacy: theory, policies and technologies (2011) (3)
- A visibility classification scheme for privacy management requirements (2002) (3)
- Clarifying the Internet of Things by Defining the Internet of Devices (2014) (3)
- Toward an XP Evaluation Framework (2003) (2)
- Proceedings of the 3rd Symposium on Requirements Engineering for Information Security (2002) (2)
- Object based requirements modelling for process continuity (1993) (2)
- Exploring the use of a .safe subset. of extreme programming: An industrial case study (2004) (2)
- Identifying Commitment-Based Software Requirements to Thwart Unfair and Deceptive Practices (2009) (2)
- ITR : Encoding Rights , Permissions and Obligations : Privacy Policy Specification and Compliance (2003) (1)
- Discovering undocumented knowledge through visualization of agile software development activities (2018) (1)
- Trustmarks and Privacy (2014) (1)
- Letter to the editor [2] (2007) (1)
- Guest Editorial: Requirements Engineering for Information Security (2002) (1)
- Using Scenario Networks for Scenario Management and Software Specification (2001) (1)
- Security and privacy requirements analysis tool software requirements specification version 2.00 (2004) (1)
- Object-Orientation in Requirements , Specifications and Models TR-2001-12 (2001) (1)
- Towards achieving a balance between planning and agility in software development (2003) (1)
- Inquiry-Based Scenario Analysis of System Requirements Colin Potts (1994) (0)
- A distributed requirements management framework for compliance (2006) (0)
- Using production rules to aid security requirements acquisition from legal texts (2008) (0)
- 8th International Workshop on Requirements Engineering and Law (RELAW 2015) (2015) (0)
- Use Case, Goal, and Scenario Analysis of the Euronet System : Comparing Methods and Results (2003) (0)
- Americas Conference on Information Systems ( AMCIS ) December 2002 A SOCIAL , TECHNICAL , AND LEGAL FRAMEWORK FOR PRIVACY MANAGEMENT AND POLICIES (2002) (0)
- Forging trust: panel (2006) (0)
- A framework supporting the privacy policy life cycle helps guide the kind of research to consider before sound privacy answers may be realized . COMPREHENSIVE ONLINE PRIVACY POLICY MANAGEMENT (2007) (0)
- What do you mean I've been practicing without a license? certification & licensing of requirements engineering professionals (2000) (0)
- Integrating access control policy specification into the software development process (2005) (0)
- Development Phases Different Policy Levels Security and Privacy Policies in Natural Language Access Control Policies in Declarative or Semi-Structured Languages Access Control Policies in Formal Logic Requirements Analysis System (2005) (0)
- Towards improved requirements practices in Agile software development (2002) (0)
- ISA-97 Compliant Architecture Testbed (ICAT) Projectry Organizations (1992) (0)
- Now more than ever: Privacy and security are required (keynote) (2014) (0)
- Acquiring software compliance artifacts from policies and regulations (2006) (0)
- Analyzing policy commitments for privacy and security requirements (2008) (0)
- A Lecture Hall B Lecture Hall C Time Lecture Hall A Lecture Hall B Lecture Hall C Lecture Hall (2012) (0)
- NOVEMBER RESEARCH REPORT COLLEGE OF MANAGEMENT ACCEPTED PAPERS IN REFEREED JOURNALS (2007) (0)
- A legal cross-references taxonomy for reasoning about compliance requirements (2012) (0)
- Issues identified in the software process due to barriers found during eliciting requirements on agile software projects: Insights from India (2020) (0)
- Facing challenges and having fun (2013) (0)
- Object-Orientation in Requirements, Specifications and Models (2001) (0)
- A Privacy Protection Comparison of Popular Web Browsers (2002) (0)
- 17. C. Potts, ‘‘.Supporting Software Design: Integrating Design Methods, and Design (0)
This paper list is powered by the following services:
Other Resources About Annie Antón
What Schools Are Affiliated With Annie Antón?
Annie Antón is affiliated with the following schools: