we should research techniques to manually and then 
automatically evaluate the quality of these privacy 
policies. For example, how can we evaluate the 
quality of a specific policy. Further research and 
guidelines may help companies to properly specify 
these policies. Third, and consequence from the 
second issue, we should include the ability to analyze 
not just one but a set of inter-related policies and 
automatically identify inconsistencies among the 
requirements stated in these policies, that increasingly 
appear in multi-tier systems, in which each tier may 
be owned and operated by a different party, and 
raising additional problems such as over-collection 
and repurposing (Breaux et al., 2015). 
ACKNOWLEDGEMENTS 
This work was partially supported by national funds 
under FCT projects UID/CEC/50021/2013, 
EXCL/EEI-ESS/0257/2012, CMUP-EPB/TIC/0053/ 
2013 and the project TT-MDD-Mindbury/2014. 
REFERENCES 
Ammar, W., et al., 2012. Automatic categorization of 
privacy policies: A pilot study. In School of Computer 
Science, Language Technology Institute, Technical 
Report CMU-LTI-12-019. 
Baader, F., Calvenese, D., McGuiness, D. (eds), 2003. The 
description  logic  handbook:  theory,  implementation  
and  applications. Cambridge University Press. 
Bettini, L., 2013. Implementing Domain-Specific 
Languages with Xtext and Xtend. Packt Publishing Ltd. 
Bird, S., Klein, E., Loper, E., 2009. Natural Language 
Processing with Python. O'Reilly Media, 1st edition. 
Breaux, T.D., Baumer, D.L., 2011. Legally ‘Reasonable’ 
Security Requirements: A 10-year FTC Retrospective. 
Computers & Security, 30(4):178-193. 
Breaux, T. D., Hibshi, H. and Rao, A., 2014. Eddy, a formal 
language for specifying and analyzing data flow 
specifications for conflicting privacy requirements. 
Requirements Engineering, 19(3):1–27. 
Breaux, T. D., Smullen, D., Hibshi, H., 2015. Detecting 
Repurposing and Over-collection in Multi-Party 
Privacy Requirements Specifications. In Proceedings 
of IEEE International Requirements Engineering 
Conference (RE'15). 
Caramujo, J., Silva, A. R., 2015. Analyzing Privacy 
Policies based on a Privacy-Aware Profile: the 
Facebook and LinkedIn case studies. In Proceedings of 
IEEE CBI'2015, IEEE. 
Ceri, S. et al., 1995. Web Information Retrieval. Springer, 
2013. 
Cortes, C. and Vapnik, V., 1995. Support-vector networks. 
Machine Learning, 20(3):273-297. 
Cunningham, H., 2006. Information Extraction, Automatic. 
In Encyclopedia of Language & Linguistics, volume 5. 
Elsevier, 2nd edition. 
Davis, A. M., 2005. Just Enough Requirements 
Management: Where Software Development Meets 
Marketing. Dorset House Publishing, 1st edition. 
Emam, K., Koru, A., 2008. A Replicated Survey of IT 
Software Project Failures. IEEE Software, 25(5):84-90. 
Farrell, C.B., 2011. FTC charges deceptive privacy 
practices in Google’s rollout of its buzz social network. 
In  U.S. Federal Trade Commission News Release, 
March 30. 
Ferreira, D., Silva, A. R., 2012. RSLingo: An Information 
Extraction Approach toward Formal Requirements 
Specifications. In Proc. of the 2nd Int. Workshop on 
Model-Driven Requirements Engineering, IEEE CS. 
Ferreira, D., Silva, A. R., 2013. RSL-IL: An Interlingua for 
Formally Documenting Requirements. In Proc. of the 
of Third IEEE International Workshop on Model-
Driven Requirements Engineering, IEEE CS. 
Ferreira, D., Silva, A. R., 2013a. RSL-PL: A Linguistic 
Pattern Language for Documenting Software 
Requirements. In Proc. of Third International 
Workshop on Requirements Patterns, IEEE CS. 
Kagal, L., Finin, T. and Joshi, A., 2003. A policy language 
for a pervasive computing environment. In Proc. of the 
4th IEEE International Workshop on Policies for 
Distributed Systems and Networks, 63–74. 
Kovitz, B., 1998. Practical Software Requirements: 
Manual of Content and Style. Manning. 
Lafferty, J., McCallum, A. and Pereira, F., 2001. 
Conditional Random Fields: Probabilistic Models for 
Segmenting and Labeling Sequence Data. In 
Proceedings of the 18th International Conference on 
Machine Learning. 
Pohl, K., 2010. Requirements Engineering: Fundamentals, 
Principles, and Techniques, Springer. 
Quinlan, J., 1986. Induction of Decision Trees, Machine 
Learning, 1(1):81-106. 
Ramos, J., 2003. Using tf-idf to determine word relevance 
in document queries. In Proceedings of the first 
instructional conference on machine learning. 
Robertson, S., Robertson, J., 2006. Mastering the 
Requirements Process, 2nd edition. Addison-Wesley. 
Sarawagi, S., 2008. Information Extraction. Foundations 
and Trends in Databases 1(3):261-377. 
Silva, A. R., 2014. SpecQua: Towards a Framework for 
Requirements Specifications with Increased Quality. In 
Enterprise Information Systems. Springer. 
Silva, A.R., 2015. Model-Driven Engineering: A Survey 
Supported by a Unified Conceptual Model. Computer 
Languages, Systems & Structures, 43. Elsevier. 
Sommerville, I.,  Sawyer, P., 1997. Requirements 
Engineering: A Good Practice Guide. Wiley. 
Steel, E., Fowler, G. A., 2010. Facebook in privacy breach. 
Wall Street Journal, Oct. 18. 
Tonti, G. et al., 2003. Semantic Web languages for policy 
representation and reasoning: A comparison of KAoS,