Designing Privacy Aware Information Systems

Designing Privacy Aware Information Systems

Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis
ISBN13: 9781615208371|ISBN10: 1615208372|EISBN13: 9781615208388
DOI: 10.4018/978-1-61520-837-1.ch008
Cite Chapter Cite Chapter

MLA

Kalloniatis, Christos, et al. "Designing Privacy Aware Information Systems." Software Engineering for Secure Systems: Industrial and Research Perspectives, edited by H. Mouratidis, IGI Global, 2011, pp. 212-231. https://doi.org/10.4018/978-1-61520-837-1.ch008

APA

Kalloniatis, C., Kavakli, E., & Gritzalis, S. (2011). Designing Privacy Aware Information Systems. In H. Mouratidis (Ed.), Software Engineering for Secure Systems: Industrial and Research Perspectives (pp. 212-231). IGI Global. https://doi.org/10.4018/978-1-61520-837-1.ch008

Chicago

Kalloniatis, Christos, Evangelia Kavakli, and Stefanos Gritzalis. "Designing Privacy Aware Information Systems." In Software Engineering for Secure Systems: Industrial and Research Perspectives, edited by H. Mouratidis, 212-231. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-61520-837-1.ch008

Export Reference

Mendeley
Favorite

Abstract

A major challenge in the field of software engineering is to make users trust the software that they use in their everyday activities for professional or recreational reasons. Trusting software depends on various elements, one of which is the protection of user privacy. Protecting privacy is about complying with user’s desires when it comes to handling personal information. Users’ privacy can also be defined as the right to determine when, how and to what extend information about them is communicated to others. Current research stresses the need for addressing privacy issues during the system design rather than during the system implementation phase. The aim of this chapter is to elevate the modern practices for ensuring privacy during the software systems’ design phase. Through the presentation of the modern methods, the basic privacy requirements that should be considered during system analysis are introduced. Additionally, a number of well known methods that have been introduced in the research area of requirements engineering which aim on eliciting and analyzing privacy requirements during system design are introduced and analyzed. Finally, a comparative analysis between these methods is presented.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.