2022
DOI: 10.1007/s00766-022-00382-8
|View full text |Cite
|
Sign up to set email alerts
|

Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…are the security goals. Security requirements are sometimes added after system design (Canedo et al, 2022). This overfitting of security requirements in the current architecture of the system results in security vulnerabilities (Zareen et al, 2020).…”
Section: Introductionmentioning
confidence: 99%
“…are the security goals. Security requirements are sometimes added after system design (Canedo et al, 2022). This overfitting of security requirements in the current architecture of the system results in security vulnerabilities (Zareen et al, 2020).…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, it is crucial to implement measures that secure this sensitive data. Failure to consider privacy in system design can have severe consequences, including loss of trust, reputational damage, and legal penalties [2]. Therefore, organizations must take necessary measures to ensure that privacy is protected and duly considered in the design and development of systems that collect and process personal data [2].…”
Section: Introductionmentioning
confidence: 99%
“…Failure to consider privacy in system design can have severe consequences, including loss of trust, reputational damage, and legal penalties [2]. Therefore, organizations must take necessary measures to ensure that privacy is protected and duly considered in the design and development of systems that collect and process personal data [2]. To address this challenge, privacy engi-neering has emerged as a research framework that aims to provide methods, tools, and frameworks for incorporating privacy into organizational and technical measures [3].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation