A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study

[1]  Pericles Loucopoulos,et al.  System Requirements Engineering , 1995, System Requirements Engineering.

[2]  John Mylopoulos,et al.  Towards an Ontology for Privacy Requirements via a Systematic Literature Review , 2017, ER.

[3]  José F. Ruiz,et al.  Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform , 2016, 2016 IEEE 24th International Requirements Engineering Conference (RE).

[4]  Kristian Beckers,et al.  A Serious Game for Eliciting Social Engineering Security Requirements , 2016, 2016 IEEE 24th International Requirements Engineering Conference (RE).

[5]  Paolo Giorgini,et al.  Modelling and reasoning about security requirements in socio-technical systems , 2015, Data Knowl. Eng..

[6]  Paolo Giorgini,et al.  Modeling and Reasoning About Information Quality Requirements , 2015, REFSQ.

[7]  Agusti Solanas,et al.  Interoperable Privacy-Aware E-Participation within Smart Cities , 2015, Computer.

[8]  Paolo Giorgini,et al.  STS-Tool 3.0: Maintaining Security in Socio-Technical Systems , 2015, CAiSE Forum.

[9]  Miguel Mira da Silva,et al.  Gamifying requirement elicitation: Practical implications and outcomes in improving stakeholders collaboration , 2014, Entertain. Comput..

[10]  Nikolay Mehandjiev,et al.  Modeling of privacy-aware business processes in BPMN to protect personal data , 2014, SAC.

[11]  Ying Liang,et al.  A Security Ontology with MDA for Software Development , 2013, 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[12]  Dennis G. Kafura,et al.  Preprocess before You Build: Introducing a Framework for Privacy Requirements Engineering , 2013, 2013 International Conference on Social Computing.

[13]  Agusti Solanas,et al.  The pursuit of citizens' privacy: a privacy-aware smart city is possible , 2013, IEEE Communications Magazine.

[14]  Daniel J. Solove Conceptualizing Privacy , 2013 .

[15]  James Robertson,et al.  Mastering the Requirements Process: Getting Requirements Right , 2012 .

[16]  Claes Wohlin,et al.  Experimentation in Software Engineering , 2012, Springer Berlin Heidelberg.

[17]  Anthony Finkelstein,et al.  Ieee Transactions on Software Engineering, Manuscript Id Stakerare: Using Social Networks and Collaborative Filtering for Large-scale Requirements Elicitation , 2022 .

[18]  A. Cavoukian Privacy by Design: Origins, Meaning, and Prospects for Assuring Privacy and Trust in the Information Era , 2012 .

[19]  Miguel Mira da Silva,et al.  iThink: A Game-Based Approach Towards Improving Collaboration and Participation in Requirement Elicitation , 2012, VS-GAMES.

[20]  Carmela Troncoso,et al.  Engineering Privacy by Design , 2011 .

[21]  Wouter Joosen,et al.  A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.

[22]  Benjamin Gerber,et al.  Conceptualizing privacy , 2010, CSOC.

[23]  Gan Wang,et al.  Reuse in Systems Engineering , 2010, IEEE Systems Journal.

[24]  Daniele Quercia,et al.  StakeNet: using social networks to analyse the stakeholders of large-scale software projects , 2010, 2010 ACM/IEEE 32nd International Conference on Software Engineering.

[25]  Duminda Wijesekera,et al.  Ontologies for modeling enterprise level security metrics , 2010, CSIIRW '10.

[26]  Nicolas Mayer,et al.  Model-based Management of Information System Security Risk , 2012 .

[27]  Julio Cesar Sampaio do Prado Leite,et al.  On Non-Functional Requirements in Software Engineering , 2009, Conceptual Modeling: Foundations and Applications.

[28]  Bart De Decker,et al.  Linking Privacy Solutions to Developer Goals , 2009, 2009 International Conference on Availability, Reliability and Security.

[29]  Lorrie Faith Cranor,et al.  Engineering Privacy , 2009, IEEE Transactions on Software Engineering.

[30]  Per Runeson,et al.  Guidelines for conducting and reporting case study research in software engineering , 2009, Empirical Software Engineering.

[31]  A. Herrmann,et al.  Requirements Prioritization Based on Benefit and Cost Prediction: An Agenda for Future Research , 2008, 2008 16th IEEE International Requirements Engineering Conference.

[32]  Stefanos Gritzalis,et al.  Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.

[33]  George Duncan,et al.  Privacy By Design , 2007, Science.

[34]  Haralambos Mouratidis,et al.  Secure Tropos: a Security-Oriented Extension of the Tropos Methodology , 2007, Int. J. Softw. Eng. Knowl. Eng..

[35]  Nicola Zannone A requirements engineering methodology for trust, security, and privacy , 2007 .

[36]  Dimitris Gritzalis,et al.  Towards an Ontology-based Security Management , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[37]  Daniel J. Solove A Taxonomy of Privacy , 2006 .

[38]  Alessandro Acquisti,et al.  Is There a Cost to Privacy Breaches? An Event Study , 2006, WEIS.

[39]  Didar Zowghi,et al.  Requirements Elicitation: A Survey of Techniques, Approaches, and Tools , 2005 .

[40]  Zahir Irani,et al.  E-government adoption: architecture and barriers , 2005, Bus. Process. Manag. J..

[41]  K. Pripuzic,et al.  Implementing web-surveys for software requirements elicitation , 2005, Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005..

[42]  Claes Wohlin,et al.  Requirements Engineering: Setting the Context , 2005 .

[43]  A. Terry Bahill,et al.  Requirements development, verification, and validation exhibited in famous failures , 2005, Syst. Eng..

[44]  Fabio Massacci,et al.  Security and Trust Requirements Engineering , 2005, FOSAD.

[45]  Axel van Lamsweerde,et al.  Elaborating security requirements by construction of intentional anti-models , 2004, Proceedings. 26th International Conference on Software Engineering.

[46]  Alan M. Davis,et al.  A Unified Model of Requirements Elicitation , 2004, J. Manag. Inf. Syst..

[47]  Annie I. Antón,et al.  A requirements taxonomy for reducing Web site privacy vulnerabilities , 2004, Requirements Engineering.

[48]  John Mylopoulos,et al.  Security and privacy requirements analysis within a social setting , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..

[49]  Dietmar Pfahl,et al.  Trade-off Analysis for Requirements Selection , 2003, Int. J. Softw. Eng. Knowl. Eng..

[50]  Alan M. Davis,et al.  Requirements elicitation and elicitation technique selection: model for two knowledge-intensive software development processes , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[51]  R. P. Srivastava,et al.  A conceptual framework and belief‐function approach to assessing overall information quality , 2003, Int. J. Intell. Syst..

[52]  Luiz Marcio Cysneiros,et al.  Designing for privacy and other competing requirements , 2002 .

[53]  Annie I. Antón,et al.  Analyzing Website privacy requirements using a privacy goal taxonomy , 2002, Proceedings IEEE Joint International Conference on Requirements Engineering.

[54]  Soren Lauesen,et al.  Software Requirements: Styles & Techniques , 2002 .

[55]  Markus Helfert,et al.  Proactive data quality management for data warehouse systems , 2002, DMDW.

[56]  Björn Regnell,et al.  An industrial survey of requirements interdependencies in software product release planning , 2001, Proceedings Fifth IEEE International Symposium on Requirements Engineering.

[57]  Jungwoo Lee,et al.  Developing fully functional E-government: A four stage model , 2001, Gov. Inf. Q..

[58]  Martin Höst,et al.  An Industrial Case Study on Distributed Prioritisation in Market-Driven Requirements Engineering for Packaged Software , 2001, Requirements Engineering.

[59]  William M. K. Trochim,et al.  Research methods knowledge base , 2001 .

[60]  Linden J. Ball,et al.  Putting ethnography to work: the case for a cognitive ethnography of design , 2000, Int. J. Hum. Comput. Stud..

[61]  Bashar Nuseibeh,et al.  Requirements engineering: a roadmap , 2000, ICSE '00.

[62]  Dean Leffingwell,et al.  Managing software requirements: a unified approach , 1999 .

[63]  Ian Sommerville,et al.  Requirements Engineering: Processes and Techniques , 1998 .

[64]  Claes Wohlin,et al.  An evaluation of methods for prioritizing software requirements , 1998, Inf. Softw. Technol..

[65]  Pete Sawyer,et al.  Requirements Engineering: A Good Practice Guide , 1997 .

[66]  Karen Holtzblatt,et al.  Apprenticing with the customer , 1995, CACM.

[67]  David Garlan,et al.  Architectural Mismatch or Why it's hard to build systems out of existing parts , 1995, 1995 17th International Conference on Software Engineering.

[68]  Michael Jackson,et al.  The World and the Machine , 1995, 1995 17th International Conference on Software Engineering.

[69]  Joseph A. Goguen,et al.  Techniques for requirements elicitation , 1993, [1993] Proceedings of the IEEE International Symposium on Requirements Engineering.

[70]  John Mylopoulos,et al.  Representing and Using Nonfunctional Requirements: A Process-Oriented Approach , 1992, IEEE Trans. Software Eng..

[71]  Capers Jones,et al.  Applied software measurement: assuring productivity and quality , 1991 .

[72]  Ritu Agarwal,et al.  Knowledge Acquisition Using Structured Interviewing: An Empirical Investigation , 1990, J. Manag. Inf. Syst..

[73]  D. N. Hinkle The change of personal constructs from the viewpoint of a theory of construct implications , 1965 .