A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study
暂无分享,去创建一个
Haralambos Mouratidis | Paolo Giorgini | Michalis Pavlidis | Elda Paja | Mohamad Gharib | Jose Fran. Ruiz | Mattia Salnitri | P. Giorgini | M. Gharib | Elda Paja | J. Ruiz | H. Mouratidis | Mattia Salnitri | Michalis Pavlidis | E. Paja
[1] Pericles Loucopoulos,et al. System Requirements Engineering , 1995, System Requirements Engineering.
[2] John Mylopoulos,et al. Towards an Ontology for Privacy Requirements via a Systematic Literature Review , 2017, ER.
[3] José F. Ruiz,et al. Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform , 2016, 2016 IEEE 24th International Requirements Engineering Conference (RE).
[4] Kristian Beckers,et al. A Serious Game for Eliciting Social Engineering Security Requirements , 2016, 2016 IEEE 24th International Requirements Engineering Conference (RE).
[5] Paolo Giorgini,et al. Modelling and reasoning about security requirements in socio-technical systems , 2015, Data Knowl. Eng..
[6] Paolo Giorgini,et al. Modeling and Reasoning About Information Quality Requirements , 2015, REFSQ.
[7] Agusti Solanas,et al. Interoperable Privacy-Aware E-Participation within Smart Cities , 2015, Computer.
[8] Paolo Giorgini,et al. STS-Tool 3.0: Maintaining Security in Socio-Technical Systems , 2015, CAiSE Forum.
[9] Miguel Mira da Silva,et al. Gamifying requirement elicitation: Practical implications and outcomes in improving stakeholders collaboration , 2014, Entertain. Comput..
[10] Nikolay Mehandjiev,et al. Modeling of privacy-aware business processes in BPMN to protect personal data , 2014, SAC.
[11] Ying Liang,et al. A Security Ontology with MDA for Software Development , 2013, 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[12] Dennis G. Kafura,et al. Preprocess before You Build: Introducing a Framework for Privacy Requirements Engineering , 2013, 2013 International Conference on Social Computing.
[13] Agusti Solanas,et al. The pursuit of citizens' privacy: a privacy-aware smart city is possible , 2013, IEEE Communications Magazine.
[14] Daniel J. Solove. Conceptualizing Privacy , 2013 .
[15] James Robertson,et al. Mastering the Requirements Process: Getting Requirements Right , 2012 .
[16] Claes Wohlin,et al. Experimentation in Software Engineering , 2012, Springer Berlin Heidelberg.
[17] Anthony Finkelstein,et al. Ieee Transactions on Software Engineering, Manuscript Id Stakerare: Using Social Networks and Collaborative Filtering for Large-scale Requirements Elicitation , 2022 .
[18] A. Cavoukian. Privacy by Design: Origins, Meaning, and Prospects for Assuring Privacy and Trust in the Information Era , 2012 .
[19] Miguel Mira da Silva,et al. iThink: A Game-Based Approach Towards Improving Collaboration and Participation in Requirement Elicitation , 2012, VS-GAMES.
[20] Carmela Troncoso,et al. Engineering Privacy by Design , 2011 .
[21] Wouter Joosen,et al. A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.
[22] Benjamin Gerber,et al. Conceptualizing privacy , 2010, CSOC.
[23] Gan Wang,et al. Reuse in Systems Engineering , 2010, IEEE Systems Journal.
[24] Daniele Quercia,et al. StakeNet: using social networks to analyse the stakeholders of large-scale software projects , 2010, 2010 ACM/IEEE 32nd International Conference on Software Engineering.
[25] Duminda Wijesekera,et al. Ontologies for modeling enterprise level security metrics , 2010, CSIIRW '10.
[26] Nicolas Mayer,et al. Model-based Management of Information System Security Risk , 2012 .
[27] Julio Cesar Sampaio do Prado Leite,et al. On Non-Functional Requirements in Software Engineering , 2009, Conceptual Modeling: Foundations and Applications.
[28] Bart De Decker,et al. Linking Privacy Solutions to Developer Goals , 2009, 2009 International Conference on Availability, Reliability and Security.
[29] Lorrie Faith Cranor,et al. Engineering Privacy , 2009, IEEE Transactions on Software Engineering.
[30] Per Runeson,et al. Guidelines for conducting and reporting case study research in software engineering , 2009, Empirical Software Engineering.
[31] A. Herrmann,et al. Requirements Prioritization Based on Benefit and Cost Prediction: An Agenda for Future Research , 2008, 2008 16th IEEE International Requirements Engineering Conference.
[32] Stefanos Gritzalis,et al. Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.
[33] George Duncan,et al. Privacy By Design , 2007, Science.
[34] Haralambos Mouratidis,et al. Secure Tropos: a Security-Oriented Extension of the Tropos Methodology , 2007, Int. J. Softw. Eng. Knowl. Eng..
[35] Nicola Zannone. A requirements engineering methodology for trust, security, and privacy , 2007 .
[36] Dimitris Gritzalis,et al. Towards an Ontology-based Security Management , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[37] Daniel J. Solove. A Taxonomy of Privacy , 2006 .
[38] Alessandro Acquisti,et al. Is There a Cost to Privacy Breaches? An Event Study , 2006, WEIS.
[39] Didar Zowghi,et al. Requirements Elicitation: A Survey of Techniques, Approaches, and Tools , 2005 .
[40] Zahir Irani,et al. E-government adoption: architecture and barriers , 2005, Bus. Process. Manag. J..
[41] K. Pripuzic,et al. Implementing web-surveys for software requirements elicitation , 2005, Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005..
[42] Claes Wohlin,et al. Requirements Engineering: Setting the Context , 2005 .
[43] A. Terry Bahill,et al. Requirements development, verification, and validation exhibited in famous failures , 2005, Syst. Eng..
[44] Fabio Massacci,et al. Security and Trust Requirements Engineering , 2005, FOSAD.
[45] Axel van Lamsweerde,et al. Elaborating security requirements by construction of intentional anti-models , 2004, Proceedings. 26th International Conference on Software Engineering.
[46] Alan M. Davis,et al. A Unified Model of Requirements Elicitation , 2004, J. Manag. Inf. Syst..
[47] Annie I. Antón,et al. A requirements taxonomy for reducing Web site privacy vulnerabilities , 2004, Requirements Engineering.
[48] John Mylopoulos,et al. Security and privacy requirements analysis within a social setting , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..
[49] Dietmar Pfahl,et al. Trade-off Analysis for Requirements Selection , 2003, Int. J. Softw. Eng. Knowl. Eng..
[50] Alan M. Davis,et al. Requirements elicitation and elicitation technique selection: model for two knowledge-intensive software development processes , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[51] R. P. Srivastava,et al. A conceptual framework and belief‐function approach to assessing overall information quality , 2003, Int. J. Intell. Syst..
[52] Luiz Marcio Cysneiros,et al. Designing for privacy and other competing requirements , 2002 .
[53] Annie I. Antón,et al. Analyzing Website privacy requirements using a privacy goal taxonomy , 2002, Proceedings IEEE Joint International Conference on Requirements Engineering.
[54] Soren Lauesen,et al. Software Requirements: Styles & Techniques , 2002 .
[55] Markus Helfert,et al. Proactive data quality management for data warehouse systems , 2002, DMDW.
[56] Björn Regnell,et al. An industrial survey of requirements interdependencies in software product release planning , 2001, Proceedings Fifth IEEE International Symposium on Requirements Engineering.
[57] Jungwoo Lee,et al. Developing fully functional E-government: A four stage model , 2001, Gov. Inf. Q..
[58] Martin Höst,et al. An Industrial Case Study on Distributed Prioritisation in Market-Driven Requirements Engineering for Packaged Software , 2001, Requirements Engineering.
[59] William M. K. Trochim,et al. Research methods knowledge base , 2001 .
[60] Linden J. Ball,et al. Putting ethnography to work: the case for a cognitive ethnography of design , 2000, Int. J. Hum. Comput. Stud..
[61] Bashar Nuseibeh,et al. Requirements engineering: a roadmap , 2000, ICSE '00.
[62] Dean Leffingwell,et al. Managing software requirements: a unified approach , 1999 .
[63] Ian Sommerville,et al. Requirements Engineering: Processes and Techniques , 1998 .
[64] Claes Wohlin,et al. An evaluation of methods for prioritizing software requirements , 1998, Inf. Softw. Technol..
[65] Pete Sawyer,et al. Requirements Engineering: A Good Practice Guide , 1997 .
[66] Karen Holtzblatt,et al. Apprenticing with the customer , 1995, CACM.
[67] David Garlan,et al. Architectural Mismatch or Why it's hard to build systems out of existing parts , 1995, 1995 17th International Conference on Software Engineering.
[68] Michael Jackson,et al. The World and the Machine , 1995, 1995 17th International Conference on Software Engineering.
[69] Joseph A. Goguen,et al. Techniques for requirements elicitation , 1993, [1993] Proceedings of the IEEE International Symposium on Requirements Engineering.
[70] John Mylopoulos,et al. Representing and Using Nonfunctional Requirements: A Process-Oriented Approach , 1992, IEEE Trans. Software Eng..
[71] Capers Jones,et al. Applied software measurement: assuring productivity and quality , 1991 .
[72] Ritu Agarwal,et al. Knowledge Acquisition Using Structured Interviewing: An Empirical Investigation , 1990, J. Manag. Inf. Syst..
[73] D. N. Hinkle. The change of personal constructs from the viewpoint of a theory of construct implications , 1965 .