Method for Privacy Requirements Elicitation in Ubiquitous Computing

被引:1
作者
da Silva Junior, Deogenes P. [1 ]
de Souza, Patricia Cristiane [1 ]
Maciel, Cristiano [1 ]
机构
[1] Inst Comp, Cuiaba, Mato Grosso, Brazil
来源
SBES'18: PROCEEDINGS OF THE XXXII BRAZILIAN SYMPOSIUM ON SOFTWARE ENGINEERING | 2018年
关键词
Privacy; Ubiquitous Computing; Method;
D O I
10.1145/3266237.3266239
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In today's world, technology is an increasingly greater part of daily life, especially in terms of data collection and sharing practices that may pose a risk to privacy. Users may not understand their privacy completely because within system development there is a gap between users' and software designers' mental models. This paper discusses the main challenges and solutions for establishing privacy in ubiquitous contexts. To do so, we use a theoretical basis to propose a method for eliciting privacy requirements in ubiquitous computing, by involving software designers and users. Through an use example, we verified that the proposed method allowed the designer to recognize the need for privacy in the systems and design jointly with users solutions to inform and protect privacy.
引用
收藏
页码:178 / 183
页数:6
相关论文
共 26 条
[1]  
Abowd G. D., 2000, ACM Transactions on Computer-Human Interaction, V7, P29, DOI 10.1145/344949.344988
[2]   Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online [J].
Acquisti, Alessandro ;
Adjerid, Idris ;
Balebako, Rebecca ;
Brandimarte, Laura ;
Cranor, Lorrie Faith ;
Komanduri, Saranga ;
Giovanni Leon, Pedro ;
Sadeh, Norman ;
Schaub, Florian ;
Sleeper, Manya ;
Wang, Yang ;
Wilson, Shomir .
ACM COMPUTING SURVEYS, 2017, 50 (03)
[3]  
[Anonymous], 2015, 11 S USABLE PRIVACY
[4]  
[Anonymous], 2015, Berkeley Technol Law J
[5]   Persona-and-scenario based requirements engineering for software embedded in digital consumer products [J].
Aoyama, M .
13TH IEEE INTERNATIONAL CONFERENCE ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 2005, :85-94
[6]   Improving App Privacy: Nudging App Developers to Protect User Privacy [J].
Balebako, Rebecca ;
Cranor, Lorrie .
IEEE SECURITY & PRIVACY, 2014, 12 (04) :55-58
[7]  
Banfield Edward C, 1957, DECISION MAKING SCHE
[8]  
Barbosa S., 2010, Interacao humano-computador
[9]  
Bax M., 2015, CIENC INF, V42, P298, DOI [10.18225/ci.inf..v42i2.1388, DOI 10.18225/CI.INF..V42I2.1388]
[10]  
Boscarioli C., 2017, I GranDSI-BR-Grand Research Challenges in Information Systems in Brazil 2016-2026