Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners

被引:10
|
作者
Canedo, Edna Dias [1 ]
Bandeira, Ian Nery [1 ]
Seidel Calazans, Angelica Toffano [2 ]
Teixeira Costa, Pedro Henrique [1 ]
Rodrigues Cancado, Emille Catarine [1 ]
Bonifacio, Rodrigo [1 ]
机构
[1] Univ Brasilia UnB, Dept Comp Sci, POB 4466, BR-70910900 Brasilia, DF, Brazil
[2] Univ Ctr UniCEUB, Brasilia, DF, Brazil
关键词
Privacy requirements elicitation; Systematic literature review; Methodologies; Techniques; Tools; SECURITY REQUIREMENTS;
D O I
10.1007/s00766-022-00382-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
During the software development process and throughout the software lifecycle, organizations must guarantee users' privacy by protecting personal data. There are several studies in the literature proposing methodologies, techniques, and tools for privacy requirements elicitation. These studies report that practitioners must use systematic approaches to specify these requirements during initial software development activities to avoid users' data privacy breaches. The main goal of this study is to identify which methodologies, techniques, and tools are used in privacy requirements elicitation in the literature. We have also investigated Information Technology (IT) practitioners' perceptions regarding the methodologies, techniques, and tools identified in the literature. We have carried out a systematic literature review (SLR) to identify the methodologies, techniques, and tools used for privacy requirements elicitation. Besides, we have surveyed IT practitioners to understand their perception of using these techniques and tools in the software development process. We have found several methodologies, techniques, and tools proposed in the literature to carry out privacy requirements elicitation. Out of 78 studies cataloged within the SLR, most of them did not verify their methodologies and techniques in a practical case study or illustrative contexts (38 studies), and less than 35% of them (26 studies) experimented with their propositions within an industry context. The Privacy Safeguard method (PriS) is the best known among the 198 practitioners in the industry who participated in the survey. Moreover, use cases and user story are their most-used techniques. This qualitative and quantitative study shows a perception of IT practitioners different from those presented in other research papers and suggests that methodologies, techniques, and tools play an important role in IT practitioners' perceptions about privacy requirements elicitation.
引用
收藏
页码:177 / 194
页数:18
相关论文
共 50 条
  • [41] A systematic literature review of requirements engineering education
    Daun, Marian
    Grubb, Alicia M.
    Stenkova, Viktoria
    Tenbergen, Bastian
    REQUIREMENTS ENGINEERING, 2023, 28 (02) : 145 - 175
  • [42] Requirements Engineering Visualization: A Systematic Literature Review
    Abad, Zahra Shaken Hossein
    Ruhe, Guenther
    Noaeen, Mohammad
    2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2016, : 6 - 15
  • [43] A Systematic Literature Review of Requirements Volatility Prediction
    Alsalemi, Ahmed Mubark
    Yeoh, Eng-Thiam
    2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 55 - 64
  • [44] A systematic literature review of requirements engineering education
    Marian Daun
    Alicia M. Grubb
    Viktoria Stenkova
    Bastian Tenbergen
    Requirements Engineering, 2023, 28 : 145 - 175
  • [45] A Systematic Literature Review of Requirements Prioritization Criteria
    Riegel, Norman
    Doerr, Joerg
    REQUIREMENTS ENGINEERING: FOUNDATION FOR SOFTWARE QUALITY ( REFSQ 2015), 2015, 9013 : 300 - 317
  • [46] Software Architecture and Requirements: A Systematic Literature Review
    Batool, Dur-e-Benish
    Molta, Yasir Hafeez
    Sarwar, Amber
    Abbasi, Mateen Ahmed
    Jabeen, Javeria
    2015 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT), 2015,
  • [47] Agile Requirements Engineering: A systematic literature review
    Schon, Eva-Maria
    Thomaschewski, Joerg
    Jose Escalona, Maria
    COMPUTER STANDARDS & INTERFACES, 2017, 49 : 79 - 91
  • [48] A Comparative Systematic Analysis of Stakeholder's Identification Methods in Requirements Elicitation
    Khan, Fahim Muhammad
    Khan, Javed Ali
    Assam, Muhammad
    Almasoud, Ahmed S.
    Abdelmaboud, Abdelzahir
    Hamza, Manar Ahmed Mohammed
    IEEE ACCESS, 2022, 10 : 30982 - 31011
  • [49] Early Phase Telemedicine Requirements Elicitation in Collaboration with Medical Practitioners
    Larburu, Nekane
    Widya, Ing
    Bults, Richard G. A.
    Hermens, Hermie J.
    Napolitano, Carlo
    2013 21ST IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2013, : 273 - 278
  • [50] Effectiveness of requirements elicitation techniques: Empirical results derived from a systematic review
    Davis, Alan
    Dieste, Oscar
    Hickey, Ann
    Juristo, Natalia
    Moreno, Ana M.
    RE'06: 14TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, PROCEEDINGS, 2006, : 179 - +