2020
DOI: 10.1007/978-3-030-42048-2_18
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Automation Potentials in Privacy Impact Assessment Processes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…Another solution for this challenge suggests the advantages of creating automated tools to decrease required time and resources [1]. Nevertheless, in several privacy requirements engineering implementations, this has yet to be explored [75], [76], which presents another challenge.…”
Section: ) Time and Resourcesmentioning
confidence: 99%
See 1 more Smart Citation
“…Another solution for this challenge suggests the advantages of creating automated tools to decrease required time and resources [1]. Nevertheless, in several privacy requirements engineering implementations, this has yet to be explored [75], [76], which presents another challenge.…”
Section: ) Time and Resourcesmentioning
confidence: 99%
“…In the context of automation, its value in the software engineering community is well-recognized [77]. However, automation's application in privacy requirements engineering is still nascent [75], [76]. Automation can effectively describe privacy target systems, set goals, choose technical measures, and evaluate results [75], [76].…”
Section: ) Tools and Automationmentioning
confidence: 99%
“…Some researchers suggest that the automation of some of the repetitive steps in such privacy engineering techniques could turn them into standard everyday practices [91], [92]. Automated testing tools can be used to check the security configuration of servers and communication channels and that the personal data is being collected according to specified purposes, helping organisations achieve "continuous privacy compliance" [93].…”
Section: Evaluating Privacy Engineering Practicesmentioning
confidence: 99%
“…For instance, some well-known methodologies for privacy risk analysis, i.e., LINDDUN [72] and PIAs, are also known for being time-consuming and hard to scale, especially if we think in terms of service-orientated architectures (hundreds of services). Some researchers suggest that the automation of some of the repetitive steps in such privacy engineering techniques could turn them into standard everyday practices [73], [74]. Automated testing tools can be used to check the security configuration of servers and communication channels and that the personal data is being collected according to specified purposes, helping organisations achieve "continuous privacy compliance" [75].…”
Section: Evaluating Privacy Engineering Practicesmentioning
confidence: 99%