2011
DOI: 10.1016/j.asoc.2010.10.012
|View full text |Cite
|
Sign up to set email alerts
|

A soft computing approach for privacy requirements engineering: The PriS framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(14 citation statements)
references
References 16 publications
0
14
0
Order By: Relevance
“…According to the literature, privacy satisfaction is based on the analyzation and elicitation of privacy requirements on the systems [50]. Many relevant engineering methodologies have been published which describe these requirements and explain how they can be analyzed within the systems [13,17,18,[50][51][52][53][54][55][56][57][58]. In [58], all requirements that were mentioned and used in [27] for the conduction of the results are described.…”
Section: Examining Privacy In Gamified Servicesmentioning
confidence: 99%
“…According to the literature, privacy satisfaction is based on the analyzation and elicitation of privacy requirements on the systems [50]. Many relevant engineering methodologies have been published which describe these requirements and explain how they can be analyzed within the systems [13,17,18,[50][51][52][53][54][55][56][57][58]. In [58], all requirements that were mentioned and used in [27] for the conduction of the results are described.…”
Section: Examining Privacy In Gamified Servicesmentioning
confidence: 99%
“…According to the literature, privacy can be protected by analysing and eliciting privacy requirements from the early stages of a software lifecycle until the late design phases [29][30][31][32][33][34][35][36][37][38][39]. In addition, several methods have been suggested to software developers for the accomplishment of this task [40][41][42][43][44].…”
Section: Privacy Requirementsmentioning
confidence: 99%
“…According to the results, several research articles define privacy requirements as the main principle to be considered in order to ensure the protection of users' privacy in services [38,39]. Additionally, they mention that their introduction can be accomplished by using corresponding methodologies, with a variety of these methodologies being suggested to software developers [40][41][42][43][44].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to its ability to handle uncertainty or imprecision embedded in the evidence, the DS theory has been increasingly applied in recent years [44][45][46][47]41,[48][49][50][51][52], and applied to multiple attribute decision analysis problems [53][54][55][56][57].…”
Section: Dempster-shafer (Ds) Theory Of Evidencementioning
confidence: 99%