Privacy Requirements Engineering for Trustworthy e-Government Services

被引:0
作者
Vrakas, Nikos [1 ]
Kalloniatis, Christos [2 ]
Tsohou, Aggeliki [3 ]
Lambrinoudakis, Costas [1 ]
机构
[1] Univ Piraeus, Dept Digital Syst, GR-18532 Piraeus, Greece
[2] Univ Aegean, Dept Cultural Technol & Commun, GR-81100 Lesvos, Greece
[3] Univ Aegean, Dept Informat & Commun Syst Engn, GR-83200 Samos, Greece
来源
TRUST AND TRUSTWORTHY COMPUTING, PROCEEDINGS | 2010年 / 6101卷
关键词
Privacy Requirements Engineering Methods; Trust; Privacy Attacks; Privacy Enhancing Technologies; PERCEIVED USEFULNESS; TRUST; FOUNDATIONS; ACCEPTANCE; SECURITY; ADOPTION; SYSTEMS; RISK;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Several research studies have applied information systems acceptance theories in order to examine issues related to the acceptance of e-services by users Their application in the e-government systems has revealed that trust is a prerequisite for their usage Moreover, it has been proved that privacy concerns are a main antecedent of trust in e-government systems intention of use Therefore. information systems that ale not privacy aware arc not trusted and thus not accepted by users Currently there are many different attacks that can be realized by malicious users for compromising the confidentiality of private data and thus putting at stake the trustworthiness of the systems The conventional way for preventing such attacks is mainly the employment of Privacy Enhancing Technologies (PETs) However. PETs are employed as ad hoc technical solutions that are Independent from the organizational context in which the system will operate We argue that we need privacy requirements engineering methods for capturing the context dependent privacy requirements and for selecting the appropriate technical, organizational and procedural countermeasures which will help building privacy aware Systems that can offer electronic services which users can trust
引用
收藏
页码:298 / +
页数:4
相关论文
共 42 条
[1]   THE THEORY OF PLANNED BEHAVIOR [J].
AJZEN, I .
ORGANIZATIONAL BEHAVIOR AND HUMAN DECISION PROCESSES, 1991, 50 (02) :179-211
[2]  
ANLEY C, 2002, SQL SERVER APPL
[3]  
[Anonymous], 1999, RFC 2617
[4]  
[Anonymous], 1995, Diffusion of innovations
[5]  
[Anonymous], 2004, PRIVACY ENHANCING TE
[6]   Trust and risk in e-government adoption [J].
Belanger, France ;
Carter, Lemuria .
JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 2008, 17 (02) :165-176
[7]  
CANNON J, 2004, DEV IT PROFESSIONAL
[8]  
CAVOUKIA A, PRIVACY DESIGN
[9]  
CERRUDO C, MANIPULATING MICROSF
[10]   An empirical study on the impact of quality antecedents on tax payers' acceptance of Internet tax-filing systems [J].
Chang, IC ;
Li, YC ;
Hung, WF ;
Hwang, HG .
GOVERNMENT INFORMATION QUARTERLY, 2005, 22 (03) :389-410