2017 IEEE/ACM 39th International Conference on Software Engineering: Software Engineering in Society Track (ICSE-SEIS) 2017
DOI: 10.1109/icse-seis.2017.3
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Requirements: Present & Future

Abstract: Software systems are increasingly open, handle large amounts of personal or other sensitive data and are intricately linked with the daily lives of individuals and communities. This poses a range of privacy requirements. Such privacy requirements are typically treated as instances of requirements pertaining to compliance, traceability, access control, verification or usability. Though important, such approaches assume that the scope for the privacy requirements can be established a priori and that such scope d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0
4

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(23 citation statements)
references
References 51 publications
0
19
0
4
Order By: Relevance
“…Recent Table 1 AI/ML algorithm application for descriptive, predictive, and prescriptive risk analytics in edge computing literature confirms diverse cyber risks from IoT systems (Maple 2017), including risks in IoT ecosystems (Tanczer et al 2018) and IoT environments (Breza et al 2018), such as risk from smart homes (Eirini Anthi et al 2019;Ghirardello et al 2018), the Industrial IoT (Boyes et al 2018), and challenges in security metrics (Agyepong et al 2019). Cybersecurity solutions for specific IoT risks are also emerging at a fast rate, such as new models on opportunities and motivations for reducing cyber risk (Safa et al 2018), adaptive intrusion detection (E. Anthi et al 2018), security economic by design (Craggs and Rashid 2017), highlighting the privacy requirements (Anthonysamy et al 2017) and strategies for achieving privacy (Van Kleek et al 2018). Therefore, our methodology is based on mathematical principles and quantitative data.…”
Section: Methodsmentioning
confidence: 99%
“…Recent Table 1 AI/ML algorithm application for descriptive, predictive, and prescriptive risk analytics in edge computing literature confirms diverse cyber risks from IoT systems (Maple 2017), including risks in IoT ecosystems (Tanczer et al 2018) and IoT environments (Breza et al 2018), such as risk from smart homes (Eirini Anthi et al 2019;Ghirardello et al 2018), the Industrial IoT (Boyes et al 2018), and challenges in security metrics (Agyepong et al 2019). Cybersecurity solutions for specific IoT risks are also emerging at a fast rate, such as new models on opportunities and motivations for reducing cyber risk (Safa et al 2018), adaptive intrusion detection (E. Anthi et al 2018), security economic by design (Craggs and Rashid 2017), highlighting the privacy requirements (Anthonysamy et al 2017) and strategies for achieving privacy (Van Kleek et al 2018). Therefore, our methodology is based on mathematical principles and quantitative data.…”
Section: Methodsmentioning
confidence: 99%
“…This could be supported by standardisation of design (Nurse et al 2017) but risk assessing is still a key problem (Petar Radanliev et al 2020). The reason for this is that digital cyber supply chain networks need to be: secure, vigilant, resilient and fully integrated (Craggs and Rashid 2017) and encompass the security and privacy (Anthonysamy et al 2017).…”
Section: How To Integrate Modern Technological Concepts Into Supply Cmentioning
confidence: 99%
“…The SME's digital supply chains need to: e) Encompass the security and privacy (Anthonysamy et al 2017), along with electronic and physical security of real-time data (Agyepong et al 2019).…”
Section: Cloud Integration Of Cps and Iiot Of Sme's In The I40 Supplmentioning
confidence: 99%
“…This requires a dynamic understanding of the network risk. In addition, new risk elements that require cognitive analytics also need to be quantified, such as intellectual property of digital information (Anthonysamy et al 2017) and the impact of media coverage (Tanczer et al 2018).…”
Section: Argument For Cognitive Analyticsmentioning
confidence: 99%