Engineering Privacy Requirements Valuable Lessons from Another

被引:0
|
作者
Martin, Yod-Samuel [1 ]
del Alamo, Jose M. [1 ]
Yelmo, Juan C. [1 ]
机构
[1] Univ Politecn Madrid, Madrid, Spain
来源
2014 IEEE 1ST WORKSHOP ON EVOLVING SECURITY AND PRIVACY REQUIREMENTS ENGINEERING (ESPRE) | 2014年
关键词
Privacy Requirements; Requirement decomposition; Privacy principles; Privacy patterns; Privacy by Design; DESIGN;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Privacy by Design approach to systems engineering introduces privacy requirements in the early stages of development, instead of patching up a built system afterwards. However, 'vague', 'disconnected from technology', or 'aspirational' are some terms employed nowadays to refer to the privacy principles which must lead the development process. Although privacy has become a first-class citizen in the realm of non-functional requirements and some methodological frameworks help developers by providing design guidance, software engineers often miss a solid reference detailing which specific, technical requirements they must abide by, and a systematic methodology to follow. In this position paper, we look into a domain that has already successfully tackled these problems -web accessibility-, and propose translating their findings into the realm of privacy requirements engineering, analyzing as well the gaps not yet covered by current privacy initiatives.
引用
收藏
页码:19 / 24
页数:6
相关论文
共 50 条
  • [1] Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform
    Gharib, Mohamad
    Salnitri, Mattia
    Paja, Elda
    Giorgini, Paolo
    Mouratidis, Haralambos
    Pavlidis, Michalis
    Ruiz, Jose F.
    Fernandez, Sandra
    Della Siria, Andrea
    2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2016, : 256 - 265
  • [2] Engineering Adaptive Privacy: On the Role of Privacy Awareness Requirements
    Omoronyia, Inah
    Cavallaro, Luca
    Salehie, Mazeiar
    Pasquale, Liliana
    Nuseibeh, Bashar
    PROCEEDINGS OF THE 35TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2013), 2013, : 632 - 641
  • [3] Visualising privacy and security for requirements engineering
    Kreeger, MN
    Duncan, I
    SERP'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH AND PRACTICE, VOLS 1 AND 2, 2004, : 813 - 819
  • [4] Comparing Privacy Requirements Engineering Approaches
    Beckers, Kristian
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 574 - 581
  • [5] CIVIL ENGINEERING HISTORY GIVES VALUABLE LESSONS
    WATSON, SR
    CIVIL ENGINEERING, 1975, 45 (05): : 48 - 51
  • [6] Lessons Learned from Persona Usage in Requirements Engineering Practice
    Karolita, Devi
    Grundy, John C.
    Kanij, Tanjila
    McIntosh, Jennifer
    Obie, Humphrey O.
    32ND IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, RE 2024, 2024, : 116 - 128
  • [7] Overcoming requirements engineering challenges: Lessons from offshore outsourcing
    Bhat, Jyati M.
    Gupta, Mayank
    Murthy, Santhosh N.
    IEEE SOFTWARE, 2006, 23 (05) : 38 - +
  • [8] Stakeholders in global requirements engineering: Lessons learned from practice
    Damian, Daniela
    IEEE SOFTWARE, 2007, 24 (02) : 21 - +
  • [9] Automated Identification of Security and Privacy Requirements from Software Engineering Contracts
    Jain, Chirag
    Anish, Preethu Rose
    Ghaisas, Smita
    2023 IEEE 31ST INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS, REW, 2023, : 234 - 238
  • [10] VALUABLE LESSONS FROM WANG
    MANDELL, M
    COMPUTER DECISIONS, 1986, 18 (27): : 8 - 8