Privacy Requirements: Present & Future

Pauline Anthonysamy, A. Rashid, R. Chitchyan
{"title":"Privacy Requirements: Present & Future","authors":"Pauline Anthonysamy, A. Rashid, R. Chitchyan","doi":"10.1109/ICSE-SEIS.2017.3","DOIUrl":null,"url":null,"abstract":"Software systems are increasingly open, handle large amounts of personal or other sensitive data and are intricately linked with the daily lives of individuals and communities. This poses a range of privacy requirements. Such privacy requirements are typically treated as instances ofrequirements pertaining to compliance, traceability, access control, verification or usability. Though important, such approaches assume that the scope for the privacy requirements can be established a priori and that such scope does not vary drastically once the system is deployed. User data and information, however, exists in an open, hyper-connected and potentially \"unbounded\" environment. Furthermore, \"privacy requirements - present\"and \"privacy requirements - future\" may differ significantly as the privacy implications are often emergent a posteriori. Effective treatment of privacy requirements, therefore, requires techniques and approaches that fit with the inherent openness and fluidity of the environment through which user data and information flows. This paper surveys state of the art and presents some potential directions in the way privacy requirements should be treated. We reflect on the limitations of existing approaches with regards to unbounded privacy requirements and highlight a set of key challenges for requirements engineering research with regards to managing privacy in such unbounded settings.","PeriodicalId":322017,"journal":{"name":"2017 IEEE/ACM 39th International Conference on Software Engineering: Software Engineering in Society Track (ICSE-SEIS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"35","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE/ACM 39th International Conference on Software Engineering: Software Engineering in Society Track (ICSE-SEIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSE-SEIS.2017.3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 35

Abstract

Software systems are increasingly open, handle large amounts of personal or other sensitive data and are intricately linked with the daily lives of individuals and communities. This poses a range of privacy requirements. Such privacy requirements are typically treated as instances ofrequirements pertaining to compliance, traceability, access control, verification or usability. Though important, such approaches assume that the scope for the privacy requirements can be established a priori and that such scope does not vary drastically once the system is deployed. User data and information, however, exists in an open, hyper-connected and potentially "unbounded" environment. Furthermore, "privacy requirements - present"and "privacy requirements - future" may differ significantly as the privacy implications are often emergent a posteriori. Effective treatment of privacy requirements, therefore, requires techniques and approaches that fit with the inherent openness and fluidity of the environment through which user data and information flows. This paper surveys state of the art and presents some potential directions in the way privacy requirements should be treated. We reflect on the limitations of existing approaches with regards to unbounded privacy requirements and highlight a set of key challenges for requirements engineering research with regards to managing privacy in such unbounded settings.
隐私要求:现在和未来
软件系统越来越开放,处理大量个人或其他敏感数据,并与个人和社区的日常生活紧密相连。这就提出了一系列隐私要求。此类隐私需求通常被视为与遵从性、可追溯性、访问控制、验证或可用性相关的需求实例。虽然这些方法很重要,但它们假设隐私需求的范围可以先验地确定,并且一旦部署系统,这种范围不会发生巨大变化。然而,用户数据和信息存在于一个开放的、超连接的、潜在的“无限”环境中。此外,“隐私要求-现在”和“隐私要求-未来”可能会有很大的不同,因为隐私含义通常是事后出现的。因此,有效地处理隐私要求需要符合用户数据和信息流动环境固有的开放性和流动性的技术和方法。本文调查了目前的技术状况,并提出了处理隐私要求的一些潜在方向。我们反思了现有方法在无界隐私需求方面的局限性,并强调了在这种无界环境中管理隐私方面的需求工程研究的一系列关键挑战。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信