Skip to main content

Design of a Privacy Taxonomy in Requirement Engineering

  • Conference paper
  • First Online:
IoT Based Control Networks and Intelligent Systems (ICICNIS 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 789))

  • 140 Accesses

Abstract

The Non Functional Requirement (NFR) plays crucial role in creating software, web applications. It is observed that privacy and security requirements are identified and implemented very late in the software development life cycle. One of the NFR -privacy requirements imposes new challenges in managing PII (Person identifiable information). This information need to be preserved from requirement engineering phase to implementation phase. This paper focuses on designing new taxonomy of privacy in Requirement Engineering. This novel taxonomy covers the major properties of privacy which are considered in developing any secured, web based, privacy-preserving apps.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anton A (1997) Goal identification and refinement in the specification of software-based information systems. Georgia Institute of Technology, USA

    Google Scholar 

  2. Institute of Electrical and Electronics Engineers (1998) IEEE 830-1998—IEEE recommended practice for software requirements specifications. New York

    Google Scholar 

  3. Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and ıdentity management

    Google Scholar 

  4. Westlin A (1968) Privacy and freedom. Soc Work 13(4):114–115

    Google Scholar 

  5. ISO/IEC 15408-1:2009—Information technology—Security techniques—Evaluation criteria for IT security (2009)

    Google Scholar 

  6. Chaum DL (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84–90

    Google Scholar 

  7. Abu-Nimeh S, Miyazaki S, Mead N (2009) Integrating privacy requirements into security requirements engineering. In: International conference on software engineering and knowledge engineering, pp 542–547

    Google Scholar 

  8. Kalloniatis C, Kavakli E, Gritzalis S (2008) Addressing privacy requirements in system design: the PriS method. Requir Eng 13(3):241–255

    Article  Google Scholar 

  9. Kalloniatis C, Kavakli E, Kontelis E (2009) Pris tool: a case tool for privacy-oriented requirements engineering. J Inf Syst Secur 6(1)

    Google Scholar 

  10. Deng M, Wuyts K, Scandariato R, Preneel B, Joosen W (2011) A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir Eng 16(1):3–32

    Article  Google Scholar 

  11. Supakkul S, Chung L (2005) Integrating FRs and NFRs: a use case and goal driven approach. Framework 6:7

    Google Scholar 

  12. Lawrence Chung JM, Nixon BA, Yu E (1997) Non-functional requirements in software engineering. Springer, p 78

    Google Scholar 

  13. Galster M, Bucherer E (2008) A taxonomy for identifying and specifying non-functional requirements in service-oriented development. In: Proceedings—2008 IEEE congress on services, SERVICES 2008, Part 1, pp 345–352

    Google Scholar 

  14. Alqassem I, Svetinovic D (2014) A taxonomy of security and privacy requirements for the Internet of Things (IoT). In: IEEE ınternational conference on ındustrial engineering and engineering management, vol 2015, pp 1244–1248

    Google Scholar 

  15. Antón AI, Earp JB (2004) A requirements taxonomy for reducing web site privacy vulnerabilities. Requir Eng 9(3):169–185

    Article  Google Scholar 

  16. Chung ML, Nixon B, Yu E (2000) Non-functional requirements in software engineering, vol 5. Kluwer Academic Publication

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tejas Shah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shah, T., Patel, P. (2024). Design of a Privacy Taxonomy in Requirement Engineering. In: Joby, P.P., Alencar, M.S., Falkowski-Gilski, P. (eds) IoT Based Control Networks and Intelligent Systems. ICICNIS 2023. Lecture Notes in Networks and Systems, vol 789. Springer, Singapore. https://doi.org/10.1007/978-981-99-6586-1_47

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-6586-1_47

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-6585-4

  • Online ISBN: 978-981-99-6586-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics