Towards privacy compliance: A design science study in a small organization

被引:12
|
作者
Li, Ze Shi [1 ]
Werner, Colin [1 ]
Ernst, Neil [1 ]
Damian, Daniela [1 ]
机构
[1] Univ Victoria, Victoria, BC, Canada
关键词
Requirements engineering; Continuous software engineering; Privacy; GDPR; Design science; REQUIREMENTS; CHALLENGES; SECURITY; INTERNET;
D O I
10.1016/j.infsof.2022.106868
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: Complying with privacy regulations has taken on new importance with the introduction of the EU's General Data Protection Regulation (GDPR) and other privacy regulations. Privacy measures are becoming a paramount requirement demanding software organizations' attention as recent privacy breaches such as the Capital One data breach affected millions of customers. Software organizations, however, struggle with achieving privacy compliance. In particular, there is a lack of research into the organizational practices and challenges involved in compliance, particularly for small and medium enterprises (SMEs), which represent a sizeable portion of organizations. Many SMEs use a continuous software engineering (CSE) approach, which introduces additional adoption and application challenges. For example, the fast pace of CSE makes it harder for SMEs that are already more resource constrained to prioritize non-functional requirements such as privacy.Objective: This paper aims to fill a gap in the under-researched area of continuous compliance with privacy requirements in practice, by investigating how a continuous practicing SME dealt with GDPR compliance.Method: Using design science, we conducted an in-depth ethnographically informed study over the span of 16 months and iteratively developed two artifacts to help address the organization's challenges in addressing GDPR compliance.Results: We identified 3 main challenges that our collaborating organization experienced when trying to comply with the GDPR. To help mitigate the challenges, we developed two design science artifacts, which include a list of privacy requirements that operationalized the GDPR principles for automated verification, and an automated testing tool that helps to verify these privacy requirements. We validated these artifacts through close collaboration with our partner organization and applying our artifacts to the partner organization's system.Conclusions: We conclude with a discussion of opportunities and obstacles in leveraging CSE to achieve continuous compliance with the GDPR. We also highlight the importance of building a shared understanding of privacy non-functional requirements and how risk management plays an important role in an organization's GDPR compliance.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Towards Inclusive Privacy Consenting for GDPR Compliance in Visual Surveillance: A Survey Study
    Chattopadhayay, Ankur
    Rijal, Isha
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 1287 - 1293
  • [2] Towards privacy-aware software design in small and medium enterprises
    Campanile, Lelio
    Iacono, Mauro
    Mastroianni, Michele
    2022 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2022, : 256 - 263
  • [3] Towards a Privacy Compliance Assessment Toolkit
    Moabalobelo, Terrence
    Ngobeni, Sipho
    Molema, Bokang
    Pantsi, Phumeza
    Dlamini, Moses
    Nelufule, Norman
    2023 IST-AFRICA CONFERENCE, IST-AFRICA, 2023,
  • [4] Design Science Research Towards Ethical and Privacy-Friendly Maritime Surveillance ICT Systems
    Rajamäki J.
    Studies in Big Data, 2021, 84 : 95 - 115
  • [5] Towards Compliance and Accountability: a Framework for Privacy Online
    Peng, Huanchun
    Gu, Jun
    Ye, Xiaojun
    JOURNAL OF COMPUTERS, 2009, 4 (06) : 494 - 501
  • [6] A Study of South Asian Websites on Privacy Compliance
    Javed, Yousra
    Salehin, Khondaker Musfakus
    Shehab, Mohamed
    IEEE ACCESS, 2020, 8 : 156067 - 156083
  • [7] Blockchain privacy and regulatory compliance: Towards a practical equilibrium
    Buterin, Vitalik
    Illum, Jacob
    Nadler, Matthias
    Schar, Fabian
    Soleimani, Ameen
    BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2024, 5 (01):
  • [8] Privacy-by-Design and Minimization within a Small Electronic Health Record: The Health360 Case Study
    Conte, Raffaele
    Sansone, Francesco
    Tonacci, Alessandro
    Pala, Anna Paola
    APPLIED SCIENCES-BASEL, 2022, 12 (17):
  • [9] IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps
    Ahmad, Javaria
    Li, Fengjun
    Luo, Bo
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 589 - 609
  • [10] Towards the Design of Usable Privacy by Design Methodologies
    Pattakou, Argyri
    Mavroeidi, Aikaterini-Georgia
    Kalloniatis, Christos
    Diamantopoulou, Vasiliki
    Gritzalis, Stefanos
    2018 IEEE 5TH INTERNATIONAL WORKSHOP ON EVOLVING SECURITY & PRIVACY REQUIREMENTS ENGINEERING (ESPRE 2018), 2018, : 1 - 8