Automated Extraction of Non-functional Requirements in Available Documentation John Slankas and Laurie Williams 1st Workshop on Natural Language Analysis.

Slides:



Advertisements
Similar presentations
Meaningful Use and Health Information Exchange
Advertisements

Requirements Engineering Processes – 2
Chapter 12 Decision Support Systems
IHE Workshop – June 2006What IHE Delivers 1 Cynthia A. Levy Cedara Software IHE Technical Committee Import Reconciliation Workflow Profile.
National HIT Agenda and HIE John W. Loonsk, M.D. Director of Interoperability and Standards Office of the National Coordinator Department of Health.
NISTs Role in Securing Health Information AMA-IEEE Medical Technology Conference on Individualized Healthcare Kevin Stine, Information Security Specialist.
1 Documentation Legal Framework Air Navigation Orders Guidelines ATS Manual Airport Manual Safety Management Manual ICAO Annexes Licenses / Certificates.
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
4th VRE Programme meeting July 2006, Manchester User engagement: five key challenges and strategies for addressing them Chris Ramsden and Kerstin.
EMS Checklist (ISO model)
1 Dr. Ashraf El-Farghly SECC. 2 Level 3 focus on the organization - Best practices are gathered across the organization. - Processes are tailored depending.
How much HIPAA is enough? Session 2: What to Do - HIPAA-compliance with Datto.
“The Honeywell Web-based Corrective Action Solution”
Health IT Certificate Series. 2 Why Health IT? Health information technology (health IT) makes it possible for health.
2009 Data Protection Seminar
OWASP Secure Coding Practices Quick Reference Guide
Slide 1 Shall Lists. Slide 2 Shall List Statement Categories  Functional Requirements  Non-Functional Requirements.
Primary and secondary use of EHR: Enhancing clinical research Pharmaceutical Industry Perspectives Dr. Karin Heidenreich Senior Public Affairs Manager/Novartis.
What is this course? This course is designed to provide a basic awareness and understanding of ICD-10 and why it is so critical to our organization.
Problem solving methodology Information Technology Units Adapted from VCAA Study Design - Information Technology Byron Mitchell, November.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 2.
Hydrological information systems Svein Taksdal Head of section, Section for Hydroinformatics Hydrology department Norwegian Water Resources and Energy.
© Prentice Hall CHAPTER 11 Facilitating User Computing.
Hidden in Plain Sight: Automatically Identifying Security Requirements from Natural Language Artifacts Maria Riaz, Jason King, John Slankas, Laurie Williams.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
Distributed Capture within a Microsoft Environment.
Security Controls – What Works
Agenda Overview Why TransCAD Challenges/tips Initiatives Applications.
HITSP – enabling healthcare interoperability 1 enabling healthcare interoperability 1 Standards Harmonization HITSP’s efforts to address HIT-related provisions.
Design of a Certifiably Dependable Next- Generation Air Transportation System Stephen A. JacklinMichelle M. Eshow Michael R. LowryDave McNally Ewen Denny.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
System Analysis and Design
First Practice - Information Security Management System Implementation and ISO Certification.
Text Classification With Labeled and Unlabeled Data Presenter: Aleksandar Milisic Supervisor: Dr. David Albrecht.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
August 12, Meaningful Use *** UDOH Informatics Brown Bag Robert T Rolfs, MD, MPH.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Access Control Policy Extraction from Unconstrained Natural Language Text John Slankas and Laurie Williams 5th ASE/IEEE International Conference on Information.
Problem Solving Methodology
Lecture 14 Policy, Legal, and Regulatory Issues in HIS (Chapters 18,19,20)
Query Health Operations Workgroup HQMF & QRDA Query Format - Results Format February 9, :00am – 12:00am ET.
©2010 John Wiley and Sons Chapter 12 Research Methods in Human-Computer Interaction Chapter 12- Automated Data Collection.
Use of Hierarchical Keywords for Easy Data Management on HUBzero HUBbub Conference 2013 September 6 th, 2013 Gaurav Nanda, Jonathan Tan, Peter Auyeung,
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
A semantic based methodology to classify and protect sensitive data in medical records Flora Amato, Valentina Casola, Antonino Mazzeo, Sara Romano Dipartimento.
Problem solving methodology Information Technology Units Adapted from VCAA Study Design - Information Technology Byron Mitchell, November.
Privacy Engineering for Digital Rights Management Systems By XiaoYu Chen.
Developing Policy and Procedure Management System إعداد برنامج سياسات وإجراءات العمل 8 Safar February 2007 HERA GENERAL HOSPITAL.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Archival Workshop on Ingest, Identification, and Certification Standards Certification (Best Practices) Checklist Does the archive have a written plan.
CISC Machine Learning for Solving Systems Problems Presented by: Ashwani Rao Dept of Computer & Information Sciences University of Delaware Learning.
1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,
1 Topic# 7 – Auditing with Technology Readings, Chapter 10 A – COMPUTERIZED AUDIT TOOLS –Electronic Spreadsheets –Automated Working Papers –Generalized.
Creating Subjective and Objective Sentence Classifier from Unannotated Texts Janyce Wiebe and Ellen Riloff Department of Computer Science University of.
1 Towards Improved Security Criteria for Certification of Electronic Health Record Systems Andrew Austin Ben Smith Laurie Williams North Carolina State.
HIPAA Security John Parmigiani Director HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Data Coordinators Conference – 2014 Laura Marroquin CASEWORKER/JCMS Specialist Everything New Data Coordinators Should Know.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
ABBYY Platform for BPO.
Classifications of Software Requirements
Master thesis: Automatic Extraction of Design Decision Relationships from a Task Management System Kick-Off Matthias Ruppel, 8th of May 2017, Munich.
Data Security Policies
SKILL ASSESSMENT OF SOFTWARE TESTERS Case Study
Chapter 12: Automated data collection methods
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
What is UiPATH? For more details visit this link online-training.
Presentation transcript:

Automated Extraction of Non-functional Requirements in Available Documentation John Slankas and Laurie Williams 1st Workshop on Natural Language Analysis in Software Engineering May 25 th, 2013

Motivation Research Solution Method Evaluation Future Relevant Documentation for Healthcare Systems 2 HIPAA HITECH ACT Meaningful Use Stage 1 Criteria Meaningful Use Stage 2 Criteria Certified EHR (45 CFR Part 170) ASTM HL7 NIST FIPS PUB HIPAA Omnibus NIST Testing Guidelines DEA Electronic Prescriptions for Controlled Substances (EPCS) Industry Guidelines: CCHIT, EHRA, HL7 State-specific requirements North Carolina General Statute § 130A-480 – Emergency Departments Organizational policies and procedures Project requirements, use cases, design, test scripts, … Payment Card Industry: Data Security Standard

Aid analysts in more effectively extracting relevant non- functional requirements (NFRs) in available unconstrained natural language documents through automated natural language processing. 3 Motivation Research Solution Method Evaluation Future Research Goal Research Questions

1.What document types contain NFRs in each of the different categories of NFRs? 2.What characteristics, such as keywords or entities (time period, percentages, etc.), do sentences assigned to each NFR category have in common? 3.What machine learning classification algorithm has the best performance to identify NFRs? 4.What sentence characteristics affect classifier performance? 4 Motivation Research Solution Method Evaluation Future Research Goal Research Questions

1.Parse Natural Language Text 2.Classify Sentences 5 Motivation Research Solution Method Evaluation Future NFR Locator “The system shall terminate a remote session after 30 minutes of inactivity.”

Electronic Health Record (EHR) Domain Why? # of open and closed-source systems Government regulations Industry Standards Included PROMISE NFR Data Set 6 Motivation Research Solution Method Evaluation Future Context Categories Procedure

Started with 9 categories from Cleland-Huang, et al. Availability Look and Feel Legal Maintainability Operational Performance Scalability Security Usability 7 Motivation Research Solution Method Evaluation Future Context Categories Procedure Non-functional Requirement Categories J. Cleland-Huang, R. Settimi, X. Zou, and P. Solc, “Automated Classification of Non-functional Requirements,” Requirements Engineering, vol. 12, no. 2, pp. 103–120, Mar

Combined performance and scalability Separated access control and audit from security Added privacy, recoverability, reliability, and other 8 Motivation Research Solution Method Evaluation Future Context Categories Procedure Non-functional Requirement Categories J. Cleland-Huang, R. Settimi, X. Zou, and P. Solc, “Automated Classification of Non-functional Requirements,” Requirements Engineering, vol. 12, no. 2, pp. 103–120, Mar Access ControlPrivacy AuditRecoverability AvailabilityPerformance & Scalability LegalReliability Look & FeelSecurity MaintenanceUsability OperationalOther

Collected 11 EHR related documents Types: requirements, use cases, DUAs, RFPs, manuals Converted to text via “save as” Manually labeled sentences Validated labels Clustering Iterative classifying using previous results Representative sample of 30 sentences classified by others Executed various machine learning algorithms and factors 9 Motivation Research Solution Method Evaluation Future Context Categories Procedure

10 Motivation Research Solution Method Evaluation Future RQ1: What document types contain what categories of NFRs? All evaluated document contained NFRs RFPs had a wide variety of NFRs except look and feel DUAs contained high frequencies of legal and privacy Access control and/or security NFRs appeared in all of the documents. Low frequency of functional and NFRs with CFRs exemplifies why tool support is critical to efficiently extract requirements from those documents.

11 Motivation Research Solution Method Evaluation Future RQ2: What characteristics to the requirements have in common? Performance & Scalability fast, simultaneous, 0, second, scale, capable, increase, peak, longer, average, acceptable, lead, handle, flow, response, capacity, 10, maximum, cycle, distribution Reliability (RL) reliable, dependent, validate, validation, input, query, accept, loss, failure, operate, alert, laboratory, prevent, database, product, appropriate, event, application, capability, ability Security (SC) cookie, encrypted, ephi, http, predetermined, strong, vulnerability, username, inactivity, portal, ssl, deficiency, uc3, authenticate, certificate, session, path, string, password, incentive Usability (US) easy, enterer, wrong, learn, word, community, drop, realtor, help, symbol, voice, collision, training, conference, easily, successfully, let, map, estimator, intuitive

12 Motivation Research Solution Method Evaluation Future RQ3: What ML Algorithm Should I Use? ClassifierPrecisionRecall Weighted Random % Random Naïve Bayes SMO NFR Locator k-NN

13 Motivation Research Solution Method Evaluation Future RQ4: What sentence characteristics affect classifier performance? ModelWord FormStop Words Naïve BayesOriginalDeterminers Naïve BayesPorterDeterminers Naïve BayesLemmaDeterminers Naïve BayesLemmaFrakes Naïve BayesCasamayorGlasgow SMOOriginalDeterminers SMOLemmaDeterminers SMOLemmaFrakes

14 Motivation Research Solution Method Evaluation Future So, What’s Next? Improve classification performance Other domains Finance Conference Management Systems Getting the text is a start, but … Semantic relation extraction Access control