Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners

ED Canedo, IN Bandeira, ATS Calazans… - Requirements …, 2023 - Springer
During the software development process and throughout the software lifecycle,
organizations must guarantee users' privacy by protecting personal data. There are several …

Awareness requirement and performance management for adaptive systems: a survey

TA Rashid, BA Hassan, A Alsadoon, S Qader… - The Journal of …, 2023 - Springer
Self-adaptive software can assess and modify its behavior when the assessment indicates
that the program is not performing as intended or when improved functionality or …

Blockchain-based ontology driven reference framework for security risk management

M Iqbal, A Kormiltsyn, V Dwivedi… - Data & Knowledge …, 2024 - Elsevier
Security risk management (SRM) is crucial for protecting valuable assets from malicious
harm. While blockchain technology has been proposed to mitigate security threats in …

Optimal event log sanitization for privacy-preserving process mining

SA Fahrenkrog-Petersen, H van der Aa… - Data & Knowledge …, 2023 - Elsevier
Event logs that originate from information systems enable comprehensive analysis of
business processes. These logs serve as the starting point for the discovery of process …

Systematic map** study on requirements engineering for regulatory compliance of software systems

O Kosenkov, P Elahidoost, T Gorschek… - Information and …, 2024 - Elsevier
Context: As the diversity and complexity of regulations affecting Software-Intensive Products
and Services (SIPS) is increasing, software engineers need to address the growing …

Integrated identity and access management metamodel and pattern system for secure enterprise architecture

K Nahar, AQ Gill - Data & Knowledge Engineering, 2022 - Elsevier
Identity and access management (IAM) is one of the key components of the secure
enterprise architecture for protecting the digital assets of the information systems. The …

Designing intelligent agents in normative systems toward data regulation representation

PH Alves, F Correia, I Frajhof, CS De Souza… - IEEE …, 2023 - ieeexplore.ieee.org
Personal data protection regulation plays an important role in defining the rights and
obligations of the agents involved in processing personal data (ie, data subjects, controllers …

Towards privacy-aware exploration of archived personal emails

Z Bartliff, Y Kim, F Hopfgartner - International Journal on Digital Libraries, 2024 - Springer
This paper examines how privacy measures, such as anonymisation and aggregation
processes for email collections, can affect the perceived usefulness of email visualisations …

An approach to formal desription of the user notification scenarios in privacy policies

M Kuznetsov, E Novikova… - 2022 30th Euromicro …, 2022 - ieeexplore.ieee.org
Nowadays the collection and usage of users' personal data have become an extremely
common scenario. The users actively provide their personal data to customize or improve …

Privacy and informational self-determination through informed consent: the way forward

M Gharib - European Symposium on Research in Computer …, 2021 - Springer
Abstract “I have read and agree to the Privacy Policy”. This can be described as one of the
biggest lies in the current times, and that is all what a service provider needs to acquire what …