Proceedings of the 4th International Conference on Information Systems Security and Privacy 2018
DOI: 10.5220/0006606200740082
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Needs for a Holistic Modelling Approach to Privacy Aspects in Enterprise Software Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…However, in each case, the individual set of models can be created. Alpers et al, 2018 Authors focus on modeling privacy from business and software engineering perspective. Petrikina, Drews, Schirmer, & Zimmermann, 2014 Authors analyze the possibilities for integrating the enterprise architecture and business model.…”
Section: Vernadat 2020mentioning
confidence: 99%
“…However, in each case, the individual set of models can be created. Alpers et al, 2018 Authors focus on modeling privacy from business and software engineering perspective. Petrikina, Drews, Schirmer, & Zimmermann, 2014 Authors analyze the possibilities for integrating the enterprise architecture and business model.…”
Section: Vernadat 2020mentioning
confidence: 99%
“…One solution that allows to identify the application from a log might be the linguistic analysis of activity labels [36]. The development of privacy-aware event-activity mappings might be inspirited by privacy-aware modeling approaches [44] where privacy policies or privacy restrictions are considered. We are convinced that in the further mapping approaches will emerge addressing these context properties.…”
Section: Context Dimension Property Sourcementioning
confidence: 99%
“…According to Gartner [8], EA requires a holistic approach that does not only focus on technical solutions but involves stakeholders and business people. Alpers et al [1] point out that this holds true with respect to privacy-aware modeling approaches for EAs in particular. To the best of our knowledge, there is no such approach to analyze whether EAs comply with access control requirements of IT security and privacy stemming from the business level.…”
Section: Introductionmentioning
confidence: 97%