Computer-Aided Identification and Validation of Privacy Requirements

Privacy is a software quality that is closely related to security. The main difference is that security properties aim at the protection of assets that are crucial for the considered system, and privacy aims at the protection of personal data that are processed by the system. The identification of p...

Full description

Bibliographic Details
Main Authors: Rene Meis, Maritta Heisel
Format: Article
Language:English
Published: MDPI AG 2016-05-01
Series:Information
Subjects:
Online Access:http://www.mdpi.com/2078-2489/7/2/28
id doaj-58ae7fc186494ab9846aa817a08da112
record_format Article
spelling doaj-58ae7fc186494ab9846aa817a08da1122020-11-24T21:02:54ZengMDPI AGInformation2078-24892016-05-01722810.3390/info7020028info7020028Computer-Aided Identification and Validation of Privacy RequirementsRene Meis0Maritta Heisel1paluno—The Ruhr Institute for Software Technology, University of Duisburg-Essen, Duisburg 47057, Germanypaluno—The Ruhr Institute for Software Technology, University of Duisburg-Essen, Duisburg 47057, GermanyPrivacy is a software quality that is closely related to security. The main difference is that security properties aim at the protection of assets that are crucial for the considered system, and privacy aims at the protection of personal data that are processed by the system. The identification of privacy protection needs in complex systems is a hard and error prone task. Stakeholders whose personal data are processed might be overlooked, or the sensitivity and the need of protection of the personal data might be underestimated. The later personal data and the needs to protect them are identified during the development process, the more expensive it is to fix these issues, because the needed changes of the system-to-be often affect many functionalities. In this paper, we present a systematic method to identify the privacy needs of a software system based on a set of functional requirements by extending the problem-based privacy analysis (ProPAn) method. Our method is tool-supported and automated where possible to reduce the effort that has to be spent for the privacy analysis, which is especially important when considering complex systems. The contribution of this paper is a semi-automatic method to identify the relevant privacy requirements for a software-to-be based on its functional requirements. The considered privacy requirements address all dimensions of privacy that are relevant for software development. As our method is solely based on the functional requirements of the system to be, we enable users of our method to identify the privacy protection needs that have to be addressed by the software-to-be at an early stage of the development. As initial evaluation of our method, we show its applicability on a small electronic health system scenario.http://www.mdpi.com/2078-2489/7/2/28privacyprivacy requirementsprivacy analysisrequirements engineeringcomputer-aided software engineering
collection DOAJ
language English
format Article
sources DOAJ
author Rene Meis
Maritta Heisel
spellingShingle Rene Meis
Maritta Heisel
Computer-Aided Identification and Validation of Privacy Requirements
Information
privacy
privacy requirements
privacy analysis
requirements engineering
computer-aided software engineering
author_facet Rene Meis
Maritta Heisel
author_sort Rene Meis
title Computer-Aided Identification and Validation of Privacy Requirements
title_short Computer-Aided Identification and Validation of Privacy Requirements
title_full Computer-Aided Identification and Validation of Privacy Requirements
title_fullStr Computer-Aided Identification and Validation of Privacy Requirements
title_full_unstemmed Computer-Aided Identification and Validation of Privacy Requirements
title_sort computer-aided identification and validation of privacy requirements
publisher MDPI AG
series Information
issn 2078-2489
publishDate 2016-05-01
description Privacy is a software quality that is closely related to security. The main difference is that security properties aim at the protection of assets that are crucial for the considered system, and privacy aims at the protection of personal data that are processed by the system. The identification of privacy protection needs in complex systems is a hard and error prone task. Stakeholders whose personal data are processed might be overlooked, or the sensitivity and the need of protection of the personal data might be underestimated. The later personal data and the needs to protect them are identified during the development process, the more expensive it is to fix these issues, because the needed changes of the system-to-be often affect many functionalities. In this paper, we present a systematic method to identify the privacy needs of a software system based on a set of functional requirements by extending the problem-based privacy analysis (ProPAn) method. Our method is tool-supported and automated where possible to reduce the effort that has to be spent for the privacy analysis, which is especially important when considering complex systems. The contribution of this paper is a semi-automatic method to identify the relevant privacy requirements for a software-to-be based on its functional requirements. The considered privacy requirements address all dimensions of privacy that are relevant for software development. As our method is solely based on the functional requirements of the system to be, we enable users of our method to identify the privacy protection needs that have to be addressed by the software-to-be at an early stage of the development. As initial evaluation of our method, we show its applicability on a small electronic health system scenario.
topic privacy
privacy requirements
privacy analysis
requirements engineering
computer-aided software engineering
url http://www.mdpi.com/2078-2489/7/2/28
work_keys_str_mv AT renemeis computeraidedidentificationandvalidationofprivacyrequirements
AT marittaheisel computeraidedidentificationandvalidationofprivacyrequirements
_version_ 1716774963269074944