2017 IEEE 25th International Requirements Engineering Conference Workshops (REW) 2017
DOI: 10.1109/rew.2017.30
|View full text |Cite
|
Sign up to set email alerts
|

Exploratory Study of the Privacy Extension for System Theoretic Process Analysis (STPA-Priv) to Elicit Privacy Risks in eHealth

Abstract: Abstract-Context: System Theoretic Process Analysis for Privacy (STPA-Priv) is a novel privacy risk elicitation method using a top down approach. It has not gotten very much attention but may offer a convenient structured approach and generation of additional artifacts compared to other methods. Aim: The aim of this exploratory study is to find out what benefits the privacy risk elicitation method STPA-Priv has and to explain how the method can be used. Method: Therefore we apply STPA-Priv to a real world heal… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…With the advancement of ML, in addition to safety, security and privacy have emerged as the two attributes of growing interest, which encompass guarding against external system breaches and noticing the privacy implications of system usage. This is exemplified by the development of STPA-sec [44], [31], [50], [54], [26] and STPA-priv [39], [53], indicating the flexibility of STPA in terms of accommodating attributes beyond safety. STPA-sec focuses on analysing the vulnerability of the system to external attacks, while STPA-priv highlights the data privacy issues in the system.…”
Section: B Survey Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…With the advancement of ML, in addition to safety, security and privacy have emerged as the two attributes of growing interest, which encompass guarding against external system breaches and noticing the privacy implications of system usage. This is exemplified by the development of STPA-sec [44], [31], [50], [54], [26] and STPA-priv [39], [53], indicating the flexibility of STPA in terms of accommodating attributes beyond safety. STPA-sec focuses on analysing the vulnerability of the system to external attacks, while STPA-priv highlights the data privacy issues in the system.…”
Section: B Survey Resultsmentioning
confidence: 99%
“…Collaborative robots [11], [3], [14] and Autonomous Mobile Multi-robots [9], [10], [14], [12] are also active areas of applying STPA. Moreover, STPA-priv was initially implemented for smart televisions [53] before being extended to E-health [39], recognising that privacy is a vital concern for humans. Moreover, STPA-sec has also found use in the Aeronautic industry [44].…”
Section: B Survey Resultsmentioning
confidence: 99%
“…LINDDUN uses a bottom-up approach in analyzing the privacy constraints in the data flow, unlike the STPA-Priv, which uses a topdown approach. Intuitively, tracking data flow in a bottom-up approach becomes much more complex when human interaction through a user interface is involved (Mindermann et al 2017).…”
Section: Attack Rating and System Analysismentioning
confidence: 99%
“…As discussed by Mindermann et al (2017), Shapiro (2016), the control structure is not in our scope of analysis. 4.…”
Section: Identify Adverse Privacy Consequences-thesementioning
confidence: 99%
“…These violations are weaknesses or vulnerabilities in system that allow the loss (accident) to happen [34]. Usually, hazards may also be based on human and system interactions, especially human error [22] which is not acknowledged by STPA-Sec. The UK's National Cyber Security Centre has introduced the application of STAMP/ STPA in various case studies for improving risk framework for cyber security problems.…”
Section: Security and Safety Engineeringmentioning
confidence: 99%