Engineering Privacy Requirements Valuable Lessons from Another

被引:0
作者
Martin, Yod-Samuel [1 ]
del Alamo, Jose M. [1 ]
Yelmo, Juan C. [1 ]
机构
[1] Univ Politecn Madrid, Madrid, Spain
来源
2014 IEEE 1ST WORKSHOP ON EVOLVING SECURITY AND PRIVACY REQUIREMENTS ENGINEERING (ESPRE) | 2014年
关键词
Privacy Requirements; Requirement decomposition; Privacy principles; Privacy patterns; Privacy by Design; DESIGN;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Privacy by Design approach to systems engineering introduces privacy requirements in the early stages of development, instead of patching up a built system afterwards. However, 'vague', 'disconnected from technology', or 'aspirational' are some terms employed nowadays to refer to the privacy principles which must lead the development process. Although privacy has become a first-class citizen in the realm of non-functional requirements and some methodological frameworks help developers by providing design guidance, software engineers often miss a solid reference detailing which specific, technical requirements they must abide by, and a systematic methodology to follow. In this position paper, we look into a domain that has already successfully tackled these problems -web accessibility-, and propose translating their findings into the realm of privacy requirements engineering, analyzing as well the gaps not yet covered by current privacy initiatives.
引用
收藏
页码:19 / 24
页数:6
相关论文
共 50 条
  • [31] Process and Tool Support for Integration of Privacy Aspects in Agile Software Engineering
    Huth, Dominik
    Both, Andreas
    Ahmad, Jeffrey
    Sauer, Gerhard
    Yilmaz, Fatih
    Matthes, Florian
    AMCIS 2020 PROCEEDINGS, 2020,
  • [32] Early Lessons From the Application of Systems Engineering at UKAEA (May 2017)
    Wolff, Dan
    Brown, Richard
    Curson, Paul
    Ellis, Rob
    Galliara, Tanya
    Harris, Matt
    IEEE TRANSACTIONS ON PLASMA SCIENCE, 2018, 46 (05) : 1725 - 1734
  • [33] Hackathons in software engineering education - lessons learned from a decade of events
    Porras, Jari
    Khakurel, Jayden
    Ikonen, Jouni
    Happonen, Ari
    Knutas, Antti
    Herala, Antti
    Droegehorn, Olaf
    2018 IEEE/ACM INTERNATIONAL WORKSHOP ON SOFTWARE ENGINEERING EDUCATION FOR MILLENNIALS (SEEM), 2018, : 40 - 47
  • [34] Addressing privacy requirements in system design: the PriS method
    Christos Kalloniatis
    Evangelia Kavakli
    Stefanos Gritzalis
    Requirements Engineering, 2008, 13 : 241 - 255
  • [35] Towards Detecting and Mitigating Conflicts for Privacy and Security Requirements
    Alkubaisy, Duaa
    Cox, Karl
    Mouratidis, Haralambos
    2019 13TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2019, : 39 - 44
  • [36] Computer-Aided Identification and Validation of Privacy Requirements
    Meis, Rene
    Heisel, Maritta
    INFORMATION, 2016, 7 (02)
  • [37] A requirements taxonomy for reducing Web site privacy vulnerabilities
    Annie I. Antón
    Julia B. Earp
    Requirements Engineering, 2004, 9 : 169 - 185
  • [38] A requirements taxonomy for reducing Web site privacy vulnerabilities
    Antón, AI
    Earp, JB
    REQUIREMENTS ENGINEERING, 2004, 9 (03) : 169 - 185
  • [39] Modeling and Reasoning About Privacy-Consent Requirements
    Robol, Marco
    Paja, Elda
    Salnitri, Mattia
    Giorgini, Paolo
    PRACTICE OF ENTERPRISE MODELING (POEM 2018), 2018, 335 : 238 - 254
  • [40] A Framework Managing Conflicts between Security and Privacy Requirements
    Alkubaisy, Duaa
    2017 11TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2017, : 427 - 432