Proceedings IEEE Joint International Conference on Requirements Engineering
DOI: 10.1109/icre.2002.1048502
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Website privacy requirements using a privacy goal taxonomy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
64
0

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 68 publications
(64 citation statements)
references
References 8 publications
0
64
0
Order By: Relevance
“…This will be explained in further detail below. The privacy policy interpretation and specification troubles are illustrated in a survey article that provides a taxonomy of 'privacy-supporting' and 'privacy-consuming' privacy clauses from real policies [1]. The survey clearly shows that most privacy policies on web pages are carefully drafted to lure the consumers into accepting privacyconsuming clauses.…”
Section: Inadequacy Of Specifying Privacy Policiesmentioning
confidence: 99%
“…This will be explained in further detail below. The privacy policy interpretation and specification troubles are illustrated in a survey article that provides a taxonomy of 'privacy-supporting' and 'privacy-consuming' privacy clauses from real policies [1]. The survey clearly shows that most privacy policies on web pages are carefully drafted to lure the consumers into accepting privacyconsuming clauses.…”
Section: Inadequacy Of Specifying Privacy Policiesmentioning
confidence: 99%
“…Studies following a structured approach to privacy policy analysis led to the development of specific analysis techniques based on goal-oriented requirements engineering practices [1,2,3,4]. These conceptual methods and tools, which are based on goalmining, turned out to be particularly effective for examining website privacy policies.…”
Section: Related Workmentioning
confidence: 99%
“…The predicate requests(a, s) holds if actor a wants service s fulfilled, while provides(a, s) holds if actor a has the capability to fulfill service s. The predicate delegate(exec, a, b, s) holds if actor a delegates 6 Other predicates are used to define properties that will be used during formal analysis. The predicates delegateChain (exec, a, b, s) and trustChain(exec, a, b, s) hold if there is a delegation and a trust chain respectively, between actor a and actor b.…”
Section: Formal Model For Executionmentioning
confidence: 99%
“…The work by Liu et al [41] uses i*/Tropos for dealing with security and privacy requirements by introducing softgoal 1 , as "Security" or "Privacy", to model these notions, and use dependencies analysis to check if the system is secure. In [5,6], general taxonomies for security and privacy are established. These can serve as a general knowledge repository for a knowledge-based goal refinement process.…”
Section: Security Requirements Engineering: a Surveymentioning
confidence: 99%