Travis D. Breaux, Ph.D.

Affiliations: 
2009 North Carolina State University, Raleigh, NC 
Area:
Computer Science, Law, Information Science
Google:
"Travis Breaux"

Parents

Sign in to add mentor
Annie I. Anton grad student 2009 NCSU
 (Legal requirements acquisition for the specification of legally compliant information systems.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Bhatia J, Evans MC, Breaux TD. (2019) Identifying incompleteness in privacy policy goals using semantic frames Requirements Engineering. 24: 291-313
Caramujo J, Silva ARd, Monfared SSM, et al. (2019) RSL-IL4Privacy: a domain-specific language for the rigorous specification of privacy policies Requirements Engineering. 24: 1-26
Bhatia J, Breaux TD. (2018) Empirical Measurement of Perceived Privacy Risk Acm Transactions On Computer-Human Interaction. 25: 34
Reidenberg JR, Bhatia J, Breaux TD, et al. (2016) Ambiguity in Privacy Policies and the Impact of Regulation The Journal of Legal Studies. 45: 163-190
Schaub F, Breaux TD, Sadeh NM. (2016) Crowdsourcing privacy policy analysis: Potential, challenges and best practices Information Technology. 58: 229-236
Bhatia J, Breaux TD, Schaub F. (2016) Mining privacy goals from privacy policies using hybridized task recomposition Acm Transactions On Software Engineering and Methodology. 25
Slavin R, Wang X, Hosseini MB, et al. (2016) Toward a framework for detecting privacy policy violations in android application code Proceedings - International Conference On Software Engineering. 14: 25-36
Hibshi H, Breaux TD, Riaz M, et al. (2016) A grounded analysis of experts’ decision-making during security assessments Journal of Cybersecurity. 2: 147-163
Bhatia J, Breaux TD. (2015) Towards an information type lexicon for privacy policies 8th International Workshop On Requirements Engineering and Law, Relaw 2015 - Proceedings. 19-24
Breaux TD, Smullen D, Hibshi H. (2015) Detecting repurposing and over-collection in multi-party privacy requirements specifications 2015 Ieee 23rd International Requirements Engineering Conference, Re 2015 - Proceedings. 166-175
See more...