Protecting Personal Information in Enterprise Applications

Tolga T. Yilmaz, Süleyman Muhammed Arikan, F. Su, Özgür Yürekten
{"title":"Protecting Personal Information in Enterprise Applications","authors":"Tolga T. Yilmaz, Süleyman Muhammed Arikan, F. Su, Özgür Yürekten","doi":"10.1109/UYMS50627.2020.9247020","DOIUrl":null,"url":null,"abstract":"In the digital environment, personal information gets stored by various service providers and in some situations can be used out of its purpose and without permission. These violations led to various legislation in the world and The Law for Protecting Personal Information (KVKK) in Turkey. Software that collects personal information needs to comply with the legislation as well. However, a model and sets of requirements for transforming the software development process for protecting personal information do not exist for the use of software developers and analysts. In this work, we report the experience we had while preparing a guide for software developers that includes a transformation model and a set of requirements based on KVKK. The relevant guide to this study is used as an input to the Turkish Presidency Digital Transformation Office Information and Communication Security Guide.","PeriodicalId":358654,"journal":{"name":"2020 Turkish National Software Engineering Symposium (UYMS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Turkish National Software Engineering Symposium (UYMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UYMS50627.2020.9247020","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

In the digital environment, personal information gets stored by various service providers and in some situations can be used out of its purpose and without permission. These violations led to various legislation in the world and The Law for Protecting Personal Information (KVKK) in Turkey. Software that collects personal information needs to comply with the legislation as well. However, a model and sets of requirements for transforming the software development process for protecting personal information do not exist for the use of software developers and analysts. In this work, we report the experience we had while preparing a guide for software developers that includes a transformation model and a set of requirements based on KVKK. The relevant guide to this study is used as an input to the Turkish Presidency Digital Transformation Office Information and Communication Security Guide.
保护企业应用程序中的个人信息
在数字环境中,个人信息被各种服务提供商存储,在某些情况下,可以未经许可而非其目的使用。这些违规行为导致了世界各地的各种立法,以及土耳其的个人信息保护法(KVKK)。收集个人信息的软件也需要遵守法律。然而,为保护个人信息而转换软件开发过程的模型和需求集并不存在,以供软件开发人员和分析人员使用。在这项工作中,我们报告了我们在为软件开发人员准备指南时的经验,该指南包括一个转换模型和一组基于KVKK的需求。本研究的相关指南被用作土耳其总统数字转型办公室信息和通信安全指南的输入。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信