SlideShare a Scribd company logo
1 of 15
Download to read offline
Terminology Matching of
Requirements Specification
Documents and Regulations
for Compliance Checking
Tokyo Institute of Technology, Japan
Ryotaro Nakamura,Yu Negishi,
Shinpei Hayashi, and Motoshi Saeki
1
2
Goal: Regulation-Compliant
Requirements Elicitation
 Many regulations, laws, rules, etc. to follow
 How to obtain requirements compliant to
regulations?
☞Verification &Validation to check compliance
after/during eliciting requirements
3
Our Approach:
Systematic Checking
 Formal and iterative ways to improve
compliance!
Requirements
Specification
Regulation
Regulation
Regulation
Regulation
Systematic check
of compliance
Feedback
Compliance Checking
w/ Model Checker [Saeki 09]
4
RegulationRegulationRegulation
Regulation
Compliance checking using
Model Checker
Feedback
Actor
UC1
S1 S2
State transition diag.
Use case desc.
Logical formula
Requirements Specification
p → AF q
Regulation
[Act on the Protection of Personal Information]
Use case description
Terminology Matching
5
...
3. The system gets from
a customer her address.
...
6. The system notifies the
purpose of utilization
to the customer.
When having acquired personal
information, a business operator
handling personal information
shall, ..., promptly notify the
person of the Purpose of
Utilization or publicly announce
the Purpose of Utilization.
How to associate these sentences?
Regulation
[Act on the Protection of Personal Information]Use case description
6
Case Grammar Approach
 Requires semantic relationship of words
6
3. The system gets from
a customer her address
When having acquired personal
information, a business operator
handling personal information shall, ...
(Get,
actor: System,
object: Address,
source: Customer)
(Acquire,
actor: Business operator,
object: Personal information,
source: Person)
Dictionaries
Overview of OurTechnique
7
State transition
model
Use case
desc.
Case frames
w/ concepts
Sentences
in case
frame form
Properties
concept
hierarchy
: :
Case
frames
Regulations
Detecting
concepts
Generating
props.
Words
Model
checker
1st step 2nd step
Checking
consistency
Step 1: Detecting Concepts
8
verb actor object source
Learn Human |
Organization
Habit |
Studies
Human |
Organization
verb actor object source
Acquire Human |
Organization
Thing Human |
Organization
Dictionary of Case Frames
“The system gets from the
customer her address”
Case Structure
verb actor object source
Get System Address Customer
P
System Address Customer
Customer
HumanThing
Address
Dictionary of
Hierarchical Concepts
Get
Acquire
Learn
Term
Personal
information Person
✘
✔
Institution
Organization
Business
operator
Step 2: Instantiating
PropertyTemplate
9
(Acquire, ...)
∧ ¬ (Announce, ...)
→ AF ((Notify, ...) ∨ (Announce, ...))
verb actor object source
Get System Address Customer
Case frame from RD
Template
Instantiate every
possible candidates
(Get, System,Address, Customer)
∧ ¬ (Announce, ...)
→ AF ((Notify, ...) ∨ (Announce, ...)
(Get, System,Address, Customer)
∧ ¬ (Announce, ...)
→ AF ((Notify, ...) ∨ (Announce, ...))
(Get, System,Address, Customer)
∧ ¬ (Announce, ...)
→ AF ((Notify, ...) ∨ (Announce, ...))
10
Implementation
 Components
– Cabocha (Japanese lexical and dep. analyzer)
– NuSMV (Model checker)
– Dictionary: EDR Japanese dictionary
# words # concepts # frames
From EDR dic. 270000 410000 13000
Newly added by us 61 59 10
11
Case Studies and Acts
 Case 1: Online shopping (like Amazon)
– Act on Protection of Personal Information
• Article 18
– Act on Regulation of Transmission of Specified
Electronic Mail
• Article 3
– Act on Specified Commercial Transactions
• Articles 11 and 13
 Case 2: Pet Store
– Act on Welfare and Management of Animals
• Articles 21 and 22
12
Case 1: Online Shopping
 Including 16 use cases
Show Change password
Send an ad-mail
Reject receiving
ad-mails
Confirm privacy
policy
Remove an item
from the cart
Open the items
of the cart
<<include>>
Sign up
Customer Admin
Log out
Delete account
Display the
detail of an item
Add an item to
the cart
<<include>>
Open search
page
<<include>>
<<include>>
Log in
<<include>>
Check out
Accept receiving
ad-mails
<<include>>
Open account
setting page
13
Case 1: Results
 Precision: 0.50 (4/8)
 Recall: 0.66 (4/6)
 Reason of failures:
– Structural differences of case frames
• “System receives payment” vs.“System approves payment”
– Regardless of relationships between formulas
14
Case 2: Pet Store
 Confirmed violation by comparing the results
– Operator shall show a buyer the cats/dogs that she
likes to by directly in advance
Reserve an appointment
to see cats/dogs
Register
animals
Show
cats/dogs
suggested to add
15
Concluding Remarks
 Conclusion
– A technique to support matching the words in a RD
and regulations for checking the consistency
– Word matching based on the concept hierarchy
– Confirmed the feasibility
 Future work
– Improving accuracy of matching
– Larger case studies

More Related Content

Viewers also liked

Class Responsibility Assignment as Fuzzy Constraint Satisfaction
Class Responsibility Assignment as Fuzzy Constraint SatisfactionClass Responsibility Assignment as Fuzzy Constraint Satisfaction
Class Responsibility Assignment as Fuzzy Constraint SatisfactionShinpei Hayashi
 
Toward Understanding How Developers Recognize Features in Source Code from De...
Toward Understanding How Developers Recognize Features in Source Code from De...Toward Understanding How Developers Recognize Features in Source Code from De...
Toward Understanding How Developers Recognize Features in Source Code from De...Shinpei Hayashi
 
Guiding Identification of Missing Scenarios for Dynamic Feature Location
Guiding Identification of Missing Scenarios for Dynamic Feature LocationGuiding Identification of Missing Scenarios for Dynamic Feature Location
Guiding Identification of Missing Scenarios for Dynamic Feature LocationShinpei Hayashi
 
Feature Location for Multi-Layer System Based on Formal Concept Analysis
Feature Location for Multi-Layer System Based on Formal Concept AnalysisFeature Location for Multi-Layer System Based on Formal Concept Analysis
Feature Location for Multi-Layer System Based on Formal Concept AnalysisHiroshi Kazato
 
Visualizing Stakeholder Concerns with Anchored Map
Visualizing Stakeholder Concerns with Anchored MapVisualizing Stakeholder Concerns with Anchored Map
Visualizing Stakeholder Concerns with Anchored MapTakanori Ugai
 
Toward Structured Location of Features
Toward Structured Location of FeaturesToward Structured Location of Features
Toward Structured Location of FeaturesHiroshi Kazato
 
Refactoring Edit History of Source Code
Refactoring Edit History of Source CodeRefactoring Edit History of Source Code
Refactoring Edit History of Source CodeShinpei Hayashi
 
Supporting Design Model Refactoring for Improving Class Responsibility Assign...
Supporting Design Model Refactoring for Improving Class Responsibility Assign...Supporting Design Model Refactoring for Improving Class Responsibility Assign...
Supporting Design Model Refactoring for Improving Class Responsibility Assign...Shinpei Hayashi
 
Detecting Occurrences of Refactoring with Heuristic Search
Detecting Occurrences of Refactoring with Heuristic SearchDetecting Occurrences of Refactoring with Heuristic Search
Detecting Occurrences of Refactoring with Heuristic SearchShinpei Hayashi
 
Incremental Feature Location and Identification in Source Code
Incremental Feature Location and Identification in Source CodeIncremental Feature Location and Identification in Source Code
Incremental Feature Location and Identification in Source CodeHiroshi Kazato
 
Historef: A Tool for Edit History Refactoring
Historef: A Tool  for Edit History RefactoringHistoref: A Tool  for Edit History Refactoring
Historef: A Tool for Edit History RefactoringShinpei Hayashi
 
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」Takashi Kobayashi
 

Viewers also liked (12)

Class Responsibility Assignment as Fuzzy Constraint Satisfaction
Class Responsibility Assignment as Fuzzy Constraint SatisfactionClass Responsibility Assignment as Fuzzy Constraint Satisfaction
Class Responsibility Assignment as Fuzzy Constraint Satisfaction
 
Toward Understanding How Developers Recognize Features in Source Code from De...
Toward Understanding How Developers Recognize Features in Source Code from De...Toward Understanding How Developers Recognize Features in Source Code from De...
Toward Understanding How Developers Recognize Features in Source Code from De...
 
Guiding Identification of Missing Scenarios for Dynamic Feature Location
Guiding Identification of Missing Scenarios for Dynamic Feature LocationGuiding Identification of Missing Scenarios for Dynamic Feature Location
Guiding Identification of Missing Scenarios for Dynamic Feature Location
 
Feature Location for Multi-Layer System Based on Formal Concept Analysis
Feature Location for Multi-Layer System Based on Formal Concept AnalysisFeature Location for Multi-Layer System Based on Formal Concept Analysis
Feature Location for Multi-Layer System Based on Formal Concept Analysis
 
Visualizing Stakeholder Concerns with Anchored Map
Visualizing Stakeholder Concerns with Anchored MapVisualizing Stakeholder Concerns with Anchored Map
Visualizing Stakeholder Concerns with Anchored Map
 
Toward Structured Location of Features
Toward Structured Location of FeaturesToward Structured Location of Features
Toward Structured Location of Features
 
Refactoring Edit History of Source Code
Refactoring Edit History of Source CodeRefactoring Edit History of Source Code
Refactoring Edit History of Source Code
 
Supporting Design Model Refactoring for Improving Class Responsibility Assign...
Supporting Design Model Refactoring for Improving Class Responsibility Assign...Supporting Design Model Refactoring for Improving Class Responsibility Assign...
Supporting Design Model Refactoring for Improving Class Responsibility Assign...
 
Detecting Occurrences of Refactoring with Heuristic Search
Detecting Occurrences of Refactoring with Heuristic SearchDetecting Occurrences of Refactoring with Heuristic Search
Detecting Occurrences of Refactoring with Heuristic Search
 
Incremental Feature Location and Identification in Source Code
Incremental Feature Location and Identification in Source CodeIncremental Feature Location and Identification in Source Code
Incremental Feature Location and Identification in Source Code
 
Historef: A Tool for Edit History Refactoring
Historef: A Tool  for Edit History RefactoringHistoref: A Tool  for Edit History Refactoring
Historef: A Tool for Edit History Refactoring
 
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」
 

Similar to Terminology Matching of Requirements Specification Documents and Regulations for Compliance Checking

Automated Recommendation of Templates for Legal Requirements
Automated Recommendation of Templates for Legal RequirementsAutomated Recommendation of Templates for Legal Requirements
Automated Recommendation of Templates for Legal RequirementsLionel Briand
 
Real Time Business Insights
Real Time Business Insights Real Time Business Insights
Real Time Business Insights Jaiveer Singh
 
The 25 Best Opinion Paragraph Example Ideas
The 25 Best Opinion Paragraph Example IdeasThe 25 Best Opinion Paragraph Example Ideas
The 25 Best Opinion Paragraph Example IdeasTracy Clark
 
Towards Automating Security Compliance Value Chain_FSE15_2June_submitted_final
Towards Automating Security Compliance Value Chain_FSE15_2June_submitted_finalTowards Automating Security Compliance Value Chain_FSE15_2June_submitted_final
Towards Automating Security Compliance Value Chain_FSE15_2June_submitted_finalSmita S. Ghaisas
 
Introduction to Data Mining
Introduction to Data MiningIntroduction to Data Mining
Introduction to Data MiningNofel Elahi
 
Supply Chain Basic terminologies
Supply Chain Basic terminologiesSupply Chain Basic terminologies
Supply Chain Basic terminologiesWaqar Ahmed Khan
 
V labs-assignment-1-sepm
V labs-assignment-1-sepmV labs-assignment-1-sepm
V labs-assignment-1-sepmSayanChaudhuri5
 
Thesis Statement Examples For Research Papers Ess
Thesis Statement Examples For Research Papers  EssThesis Statement Examples For Research Papers  Ess
Thesis Statement Examples For Research Papers EssCynthia Wilson
 
A Level Gp Essay Outlines
A Level Gp Essay OutlinesA Level Gp Essay Outlines
A Level Gp Essay OutlinesAndrea Ngo
 
A Level Gp Essay Outlines
A Level Gp Essay OutlinesA Level Gp Essay Outlines
A Level Gp Essay OutlinesCindy Turner
 
Transaction Processing Systems ( Tps )
Transaction Processing Systems ( Tps )Transaction Processing Systems ( Tps )
Transaction Processing Systems ( Tps )Michelle Madero
 
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 SydneyLegal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 Sydneyanthonywong
 
Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ...
 Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ... Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ...
Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ...Knobbe Martens - Intellectual Property Law
 
Student Persuasive Essay Topics
Student Persuasive Essay TopicsStudent Persuasive Essay Topics
Student Persuasive Essay TopicsJessica Gefroh
 
IoT Business Implications of Joint Infringement (Akamai v. Limelight)
IoT Business Implications of Joint Infringement (Akamai v. Limelight)IoT Business Implications of Joint Infringement (Akamai v. Limelight)
IoT Business Implications of Joint Infringement (Akamai v. Limelight)Alex G. Lee, Ph.D. Esq. CLP
 
Refining The System Definition
Refining The System DefinitionRefining The System Definition
Refining The System DefinitionSandeep Ganji
 
Cyber Security Unit laws_and_regulatory_requirements.pptx
Cyber Security Unit  laws_and_regulatory_requirements.pptxCyber Security Unit  laws_and_regulatory_requirements.pptx
Cyber Security Unit laws_and_regulatory_requirements.pptxSourabhNath4
 
Use cases - As approach to building shared vision
Use cases - As approach to building shared visionUse cases - As approach to building shared vision
Use cases - As approach to building shared visionAbhilash Gopalakrishnan
 

Similar to Terminology Matching of Requirements Specification Documents and Regulations for Compliance Checking (20)

Automated Recommendation of Templates for Legal Requirements
Automated Recommendation of Templates for Legal RequirementsAutomated Recommendation of Templates for Legal Requirements
Automated Recommendation of Templates for Legal Requirements
 
Real Time Business Insights
Real Time Business Insights Real Time Business Insights
Real Time Business Insights
 
The 25 Best Opinion Paragraph Example Ideas
The 25 Best Opinion Paragraph Example IdeasThe 25 Best Opinion Paragraph Example Ideas
The 25 Best Opinion Paragraph Example Ideas
 
Business analysis thinking methodology
Business analysis thinking methodologyBusiness analysis thinking methodology
Business analysis thinking methodology
 
Towards Automating Security Compliance Value Chain_FSE15_2June_submitted_final
Towards Automating Security Compliance Value Chain_FSE15_2June_submitted_finalTowards Automating Security Compliance Value Chain_FSE15_2June_submitted_final
Towards Automating Security Compliance Value Chain_FSE15_2June_submitted_final
 
Introduction to Data Mining
Introduction to Data MiningIntroduction to Data Mining
Introduction to Data Mining
 
Supply Chain Basic terminologies
Supply Chain Basic terminologiesSupply Chain Basic terminologies
Supply Chain Basic terminologies
 
V labs-assignment-1-sepm
V labs-assignment-1-sepmV labs-assignment-1-sepm
V labs-assignment-1-sepm
 
Thesis Statement Examples For Research Papers Ess
Thesis Statement Examples For Research Papers  EssThesis Statement Examples For Research Papers  Ess
Thesis Statement Examples For Research Papers Ess
 
A Level Gp Essay Outlines
A Level Gp Essay OutlinesA Level Gp Essay Outlines
A Level Gp Essay Outlines
 
A Level Gp Essay Outlines
A Level Gp Essay OutlinesA Level Gp Essay Outlines
A Level Gp Essay Outlines
 
Transaction Processing Systems ( Tps )
Transaction Processing Systems ( Tps )Transaction Processing Systems ( Tps )
Transaction Processing Systems ( Tps )
 
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 SydneyLegal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
 
Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ...
 Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ... Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ...
Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ...
 
Student Persuasive Essay Topics
Student Persuasive Essay TopicsStudent Persuasive Essay Topics
Student Persuasive Essay Topics
 
IoT Business Implications of Joint Infringement (Akamai v. Limelight)
IoT Business Implications of Joint Infringement (Akamai v. Limelight)IoT Business Implications of Joint Infringement (Akamai v. Limelight)
IoT Business Implications of Joint Infringement (Akamai v. Limelight)
 
Putting your practice on cloud 9
Putting your practice on cloud 9Putting your practice on cloud 9
Putting your practice on cloud 9
 
Refining The System Definition
Refining The System DefinitionRefining The System Definition
Refining The System Definition
 
Cyber Security Unit laws_and_regulatory_requirements.pptx
Cyber Security Unit  laws_and_regulatory_requirements.pptxCyber Security Unit  laws_and_regulatory_requirements.pptx
Cyber Security Unit laws_and_regulatory_requirements.pptx
 
Use cases - As approach to building shared vision
Use cases - As approach to building shared visionUse cases - As approach to building shared vision
Use cases - As approach to building shared vision
 

More from Shinpei Hayashi

Revisiting the Effect of Branch Handling Strategies on Change Recommendation
Revisiting the Effect of Branch Handling Strategies on Change RecommendationRevisiting the Effect of Branch Handling Strategies on Change Recommendation
Revisiting the Effect of Branch Handling Strategies on Change RecommendationShinpei Hayashi
 
An Extensive Study on Smell Aware Bug Localization
An Extensive Study on Smell Aware Bug LocalizationAn Extensive Study on Smell Aware Bug Localization
An Extensive Study on Smell Aware Bug LocalizationShinpei Hayashi
 
RefactorHub: A Commit Annotator for Refactoring
RefactorHub: A Commit Annotator for RefactoringRefactorHub: A Commit Annotator for Refactoring
RefactorHub: A Commit Annotator for RefactoringShinpei Hayashi
 
Can Automated Impact Analysis Technique Help Predicting Decaying Modules?
Can Automated Impact Analysis Technique Help Predicting Decaying Modules?Can Automated Impact Analysis Technique Help Predicting Decaying Modules?
Can Automated Impact Analysis Technique Help Predicting Decaying Modules?Shinpei Hayashi
 
The Impact of Systematic Edits in History Slicing
The Impact of Systematic Edits in History SlicingThe Impact of Systematic Edits in History Slicing
The Impact of Systematic Edits in History SlicingShinpei Hayashi
 
ChangeMacroRecorder: Recording Fine-Grained Textual Changes of Source Code
ChangeMacroRecorder: Recording Fine-Grained Textual Changes of Source CodeChangeMacroRecorder: Recording Fine-Grained Textual Changes of Source Code
ChangeMacroRecorder: Recording Fine-Grained Textual Changes of Source CodeShinpei Hayashi
 
Inference-Based Detection of Architectural Violations in MVC2
Inference-Based Detection of Architectural Violations in MVC2Inference-Based Detection of Architectural Violations in MVC2
Inference-Based Detection of Architectural Violations in MVC2Shinpei Hayashi
 
Detecting Bad Smells of Refinement in Goal-Oriented Requirements Analysis
Detecting Bad Smells of Refinement in Goal-Oriented Requirements AnalysisDetecting Bad Smells of Refinement in Goal-Oriented Requirements Analysis
Detecting Bad Smells of Refinement in Goal-Oriented Requirements AnalysisShinpei Hayashi
 
ソフトウェア工学勉強会への誘い
ソフトウェア工学勉強会への誘いソフトウェア工学勉強会への誘い
ソフトウェア工学勉強会への誘いShinpei Hayashi
 

More from Shinpei Hayashi (9)

Revisiting the Effect of Branch Handling Strategies on Change Recommendation
Revisiting the Effect of Branch Handling Strategies on Change RecommendationRevisiting the Effect of Branch Handling Strategies on Change Recommendation
Revisiting the Effect of Branch Handling Strategies on Change Recommendation
 
An Extensive Study on Smell Aware Bug Localization
An Extensive Study on Smell Aware Bug LocalizationAn Extensive Study on Smell Aware Bug Localization
An Extensive Study on Smell Aware Bug Localization
 
RefactorHub: A Commit Annotator for Refactoring
RefactorHub: A Commit Annotator for RefactoringRefactorHub: A Commit Annotator for Refactoring
RefactorHub: A Commit Annotator for Refactoring
 
Can Automated Impact Analysis Technique Help Predicting Decaying Modules?
Can Automated Impact Analysis Technique Help Predicting Decaying Modules?Can Automated Impact Analysis Technique Help Predicting Decaying Modules?
Can Automated Impact Analysis Technique Help Predicting Decaying Modules?
 
The Impact of Systematic Edits in History Slicing
The Impact of Systematic Edits in History SlicingThe Impact of Systematic Edits in History Slicing
The Impact of Systematic Edits in History Slicing
 
ChangeMacroRecorder: Recording Fine-Grained Textual Changes of Source Code
ChangeMacroRecorder: Recording Fine-Grained Textual Changes of Source CodeChangeMacroRecorder: Recording Fine-Grained Textual Changes of Source Code
ChangeMacroRecorder: Recording Fine-Grained Textual Changes of Source Code
 
Inference-Based Detection of Architectural Violations in MVC2
Inference-Based Detection of Architectural Violations in MVC2Inference-Based Detection of Architectural Violations in MVC2
Inference-Based Detection of Architectural Violations in MVC2
 
Detecting Bad Smells of Refinement in Goal-Oriented Requirements Analysis
Detecting Bad Smells of Refinement in Goal-Oriented Requirements AnalysisDetecting Bad Smells of Refinement in Goal-Oriented Requirements Analysis
Detecting Bad Smells of Refinement in Goal-Oriented Requirements Analysis
 
ソフトウェア工学勉強会への誘い
ソフトウェア工学勉強会への誘いソフトウェア工学勉強会への誘い
ソフトウェア工学勉強会への誘い
 

Recently uploaded

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 

Recently uploaded (20)

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 

Terminology Matching of Requirements Specification Documents and Regulations for Compliance Checking

  • 1. Terminology Matching of Requirements Specification Documents and Regulations for Compliance Checking Tokyo Institute of Technology, Japan Ryotaro Nakamura,Yu Negishi, Shinpei Hayashi, and Motoshi Saeki 1
  • 2. 2 Goal: Regulation-Compliant Requirements Elicitation  Many regulations, laws, rules, etc. to follow  How to obtain requirements compliant to regulations? ☞Verification &Validation to check compliance after/during eliciting requirements
  • 3. 3 Our Approach: Systematic Checking  Formal and iterative ways to improve compliance! Requirements Specification Regulation Regulation Regulation Regulation Systematic check of compliance Feedback
  • 4. Compliance Checking w/ Model Checker [Saeki 09] 4 RegulationRegulationRegulation Regulation Compliance checking using Model Checker Feedback Actor UC1 S1 S2 State transition diag. Use case desc. Logical formula Requirements Specification p → AF q
  • 5. Regulation [Act on the Protection of Personal Information] Use case description Terminology Matching 5 ... 3. The system gets from a customer her address. ... 6. The system notifies the purpose of utilization to the customer. When having acquired personal information, a business operator handling personal information shall, ..., promptly notify the person of the Purpose of Utilization or publicly announce the Purpose of Utilization. How to associate these sentences?
  • 6. Regulation [Act on the Protection of Personal Information]Use case description 6 Case Grammar Approach  Requires semantic relationship of words 6 3. The system gets from a customer her address When having acquired personal information, a business operator handling personal information shall, ... (Get, actor: System, object: Address, source: Customer) (Acquire, actor: Business operator, object: Personal information, source: Person)
  • 7. Dictionaries Overview of OurTechnique 7 State transition model Use case desc. Case frames w/ concepts Sentences in case frame form Properties concept hierarchy : : Case frames Regulations Detecting concepts Generating props. Words Model checker 1st step 2nd step Checking consistency
  • 8. Step 1: Detecting Concepts 8 verb actor object source Learn Human | Organization Habit | Studies Human | Organization verb actor object source Acquire Human | Organization Thing Human | Organization Dictionary of Case Frames “The system gets from the customer her address” Case Structure verb actor object source Get System Address Customer P System Address Customer Customer HumanThing Address Dictionary of Hierarchical Concepts Get Acquire Learn Term Personal information Person ✘ ✔ Institution Organization Business operator
  • 9. Step 2: Instantiating PropertyTemplate 9 (Acquire, ...) ∧ ¬ (Announce, ...) → AF ((Notify, ...) ∨ (Announce, ...)) verb actor object source Get System Address Customer Case frame from RD Template Instantiate every possible candidates (Get, System,Address, Customer) ∧ ¬ (Announce, ...) → AF ((Notify, ...) ∨ (Announce, ...) (Get, System,Address, Customer) ∧ ¬ (Announce, ...) → AF ((Notify, ...) ∨ (Announce, ...)) (Get, System,Address, Customer) ∧ ¬ (Announce, ...) → AF ((Notify, ...) ∨ (Announce, ...))
  • 10. 10 Implementation  Components – Cabocha (Japanese lexical and dep. analyzer) – NuSMV (Model checker) – Dictionary: EDR Japanese dictionary # words # concepts # frames From EDR dic. 270000 410000 13000 Newly added by us 61 59 10
  • 11. 11 Case Studies and Acts  Case 1: Online shopping (like Amazon) – Act on Protection of Personal Information • Article 18 – Act on Regulation of Transmission of Specified Electronic Mail • Article 3 – Act on Specified Commercial Transactions • Articles 11 and 13  Case 2: Pet Store – Act on Welfare and Management of Animals • Articles 21 and 22
  • 12. 12 Case 1: Online Shopping  Including 16 use cases Show Change password Send an ad-mail Reject receiving ad-mails Confirm privacy policy Remove an item from the cart Open the items of the cart <<include>> Sign up Customer Admin Log out Delete account Display the detail of an item Add an item to the cart <<include>> Open search page <<include>> <<include>> Log in <<include>> Check out Accept receiving ad-mails <<include>> Open account setting page
  • 13. 13 Case 1: Results  Precision: 0.50 (4/8)  Recall: 0.66 (4/6)  Reason of failures: – Structural differences of case frames • “System receives payment” vs.“System approves payment” – Regardless of relationships between formulas
  • 14. 14 Case 2: Pet Store  Confirmed violation by comparing the results – Operator shall show a buyer the cats/dogs that she likes to by directly in advance Reserve an appointment to see cats/dogs Register animals Show cats/dogs suggested to add
  • 15. 15 Concluding Remarks  Conclusion – A technique to support matching the words in a RD and regulations for checking the consistency – Word matching based on the concept hierarchy – Confirmed the feasibility  Future work – Improving accuracy of matching – Larger case studies