A risk‐based methodology for privacy requirements elicitation and control selection

2021 ◽  
Author(s):  
Asmita Manna ◽  
Anirban Sengupta ◽  
Chandan Mazumdar
Author(s):  
Seiya Miyazaki ◽  
Nancy Mead ◽  
Justin Zhan

2021 ◽  
Vol 3 (2) ◽  
pp. 28-45
Author(s):  
Young B. Choi ◽  
Christopher E. Williams

Data breaches have a profound effect on businesses associated with industries like the US healthcare system. This task extends more pressure on healthcare providers as they continue to gain unprecedented access to patient data, as the US healthcare system integrates further into the digital realm. Pressure has also led to the creation of the Health Insurance Portability and Accountability Act, Omnibus Rule, and Health Information Technology for Economic and Clinical Health laws. The Defense Information Systems Agency also develops and maintains security technical implementation guides that are consistent with DoD cybersecurity policies, standards, architectures, security controls, and validation procedures. The objective is to design a network (physician's office) in order to meet the complexity standards and unpredictable measures posed by attackers. Additionally, the network must adhere to HIPAA security and privacy requirements required by law. Successful implantation of network design will articulate comprehension requirements of information assurance security and control.


Author(s):  
Gabriela Aranda ◽  
Aurora Vizcaíno ◽  
Alejandra Cechich ◽  
Mario Piattini

This chapter introduces a model based on techniques from cognitive psychology as a means to improve the requirement elicitation in global software development projects. Since distance negatively affects communication and control, distributed development processes that are crucially based on communication, such as requirements elicitation, have to be specially rethought in order to minimize critical situations. This chapter proposes reducing problems in communication by selecting a suite of appropriate elicitation techniques and groupware tools according to stakeholders’ cognitive styles. It also shows how information about stakeholders’ personalities can be used to make them feel comfortable and to improve their performances when working in a group.


2021 ◽  
Author(s):  
Edna Dias Canedo ◽  
Angelica Toffano Seidel Calazans ◽  
Anderson Jefferson Cerqueira ◽  
Pedro Henrique Teixeira Costa ◽  
Eloisa Toffano Seidel Masson

PLoS ONE ◽  
2008 ◽  
Vol 3 (7) ◽  
pp. e2551 ◽  
Author(s):  
Kai Yu ◽  
Zhaoming Wang ◽  
Qizhai Li ◽  
Sholom Wacholder ◽  
David J. Hunter ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document