Abstract
The Non Functional Requirement (NFR) plays crucial role in creating software, web applications. It is observed that privacy and security requirements are identified and implemented very late in the software development life cycle. One of the NFR -privacy requirements imposes new challenges in managing PII (Person identifiable information). This information need to be preserved from requirement engineering phase to implementation phase. This paper focuses on designing new taxonomy of privacy in Requirement Engineering. This novel taxonomy covers the major properties of privacy which are considered in developing any secured, web based, privacy-preserving apps.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anton A (1997) Goal identification and refinement in the specification of software-based information systems. Georgia Institute of Technology, USA
Institute of Electrical and Electronics Engineers (1998) IEEE 830-1998—IEEE recommended practice for software requirements specifications. New York
Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and ıdentity management
Westlin A (1968) Privacy and freedom. Soc Work 13(4):114–115
ISO/IEC 15408-1:2009—Information technology—Security techniques—Evaluation criteria for IT security (2009)
Chaum DL (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84–90
Abu-Nimeh S, Miyazaki S, Mead N (2009) Integrating privacy requirements into security requirements engineering. In: International conference on software engineering and knowledge engineering, pp 542–547
Kalloniatis C, Kavakli E, Gritzalis S (2008) Addressing privacy requirements in system design: the PriS method. Requir Eng 13(3):241–255
Kalloniatis C, Kavakli E, Kontelis E (2009) Pris tool: a case tool for privacy-oriented requirements engineering. J Inf Syst Secur 6(1)
Deng M, Wuyts K, Scandariato R, Preneel B, Joosen W (2011) A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir Eng 16(1):3–32
Supakkul S, Chung L (2005) Integrating FRs and NFRs: a use case and goal driven approach. Framework 6:7
Lawrence Chung JM, Nixon BA, Yu E (1997) Non-functional requirements in software engineering. Springer, p 78
Galster M, Bucherer E (2008) A taxonomy for identifying and specifying non-functional requirements in service-oriented development. In: Proceedings—2008 IEEE congress on services, SERVICES 2008, Part 1, pp 345–352
Alqassem I, Svetinovic D (2014) A taxonomy of security and privacy requirements for the Internet of Things (IoT). In: IEEE ınternational conference on ındustrial engineering and engineering management, vol 2015, pp 1244–1248
Antón AI, Earp JB (2004) A requirements taxonomy for reducing web site privacy vulnerabilities. Requir Eng 9(3):169–185
Chung ML, Nixon B, Yu E (2000) Non-functional requirements in software engineering, vol 5. Kluwer Academic Publication
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shah, T., Patel, P. (2024). Design of a Privacy Taxonomy in Requirement Engineering. In: Joby, P.P., Alencar, M.S., Falkowski-Gilski, P. (eds) IoT Based Control Networks and Intelligent Systems. ICICNIS 2023. Lecture Notes in Networks and Systems, vol 789. Springer, Singapore. https://doi.org/10.1007/978-981-99-6586-1_47
Download citation
DOI: https://doi.org/10.1007/978-981-99-6586-1_47
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-6585-4
Online ISBN: 978-981-99-6586-1
eBook Packages: EngineeringEngineering (R0)