Designing Privacy Aware Information Systems

Author(s):  
Christos Kalloniatis ◽  
Evangelia Kavakli ◽  
Stefanos Gritzalis

A major challenge in the field of software engineering is to make users trust the software that they use in their everyday activities for professional or recreational reasons. Trusting software depends on various elements, one of which is the protection of user privacy. Protecting privacy is about complying with user’s desires when it comes to handling personal information. Users’ privacy can also be defined as the right to determine when, how and to what extend information about them is communicated to others. Current research stresses the need for addressing privacy issues during the system design rather than during the system implementation phase. The aim of this chapter is to elevate the modern practices for ensuring privacy during the software systems’ design phase. Through the presentation of the modern methods, the basic privacy requirements that should be considered during system analysis are introduced. Additionally, a number of well known methods that have been introduced in the research area of requirements engineering which aim on eliciting and analyzing privacy requirements during system design are introduced and analyzed. Finally, a comparative analysis between these methods is presented.

Author(s):  
Christos Kalloniatis ◽  
Evangelia Kavakli ◽  
Stefanos Gritzalis

A major challenge in the field of software engineering is to make users trust the software that they use in their everyday activities for professional or recreational reasons. Amid the main criteria that formulate users' trust is the way that that their privacy is protected. Indeed, privacy violation is an issue of great importance for active online users that daily accomplish several transactions that may convey personal data, sensitive personal data, employee data, credit card data and so on. In addition, the appearance of cloud computing has elevated the number of personally identifiable information that users provide in order to gain access to various services, further raising user concerns as to how and to what extend information about them is communicated to others. The aim of this work is to elevate the modern practices for ensuring privacy during software systems design. To this end, the basic privacy requirements that should be considered during system analysis are introduced. Additionally, a number of well-known methods that have been introduced in the research area of requirements engineering which aim on eliciting and modeling privacy requirements during system design are introduced and critically analyzed. The work completes with a discussion of the additional security and privacy concepts that should be considered in the context of cloud-based information systems and how these affect current research.


2015 ◽  
pp. 1631-1659
Author(s):  
Christos Kalloniatis ◽  
Evangelia Kavakli ◽  
Stefanos Gritzalis

A major challenge in the field of software engineering is to make users trust the software that they use in their everyday activities for professional or recreational reasons. Amid the main criteria that formulate users' trust is the way that that their privacy is protected. Indeed, privacy violation is an issue of great importance for active online users that daily accomplish several transactions that may convey personal data, sensitive personal data, employee data, credit card data and so on. In addition, the appearance of cloud computing has elevated the number of personally identifiable information that users provide in order to gain access to various services, further raising user concerns as to how and to what extend information about them is communicated to others. The aim of this work is to elevate the modern practices for ensuring privacy during software systems design. To this end, the basic privacy requirements that should be considered during system analysis are introduced. Additionally, a number of well-known methods that have been introduced in the research area of requirements engineering which aim on eliciting and modeling privacy requirements during system design are introduced and critically analyzed. The work completes with a discussion of the additional security and privacy concepts that should be considered in the context of cloud-based information systems and how these affect current research.


2014 ◽  
Vol 2 (1) ◽  
pp. 14-40 ◽  
Author(s):  
Christos Kalloniatis ◽  
Evangelia Kavakli ◽  
Stefanos Gritzalis

A major challenge in the field of software engineering is to make users trust the software that they use in their everyday activities for professional or recreational reasons. Amid the main criteria that formulate users' trust is the way that that their privacy is protected. Indeed, privacy violation is an issue of great importance for active online users that daily accomplish several transactions that may convey personal data, sensitive personal data, employee data, credit card data and so on. In addition, the appearance of cloud computing has elevated the number of personally identifiable information that users provide in order to gain access to various services, further raising user concerns as to how and to what extend information about them is communicated to others. The aim of this work is to elevate the modern practices for ensuring privacy during software systems design. To this end, the basic privacy requirements that should be considered during system analysis are introduced. Additionally, a number of well-known methods that have been introduced in the research area of requirements engineering which aim on eliciting and modeling privacy requirements during system design are introduced and critically analyzed. The work completes with a discussion of the additional security and privacy concepts that should be considered in the context of cloud-based information systems and how these affect current research.


2017 ◽  
Vol 8 (2) ◽  
pp. 1-25
Author(s):  
Christos Kalloniatis ◽  
Argyri Pattakou ◽  
Evangelia Kavakli ◽  
Stefanos Gritzalis

Pervasiveness of information systems is well underway, redefining our social and economic relationships. This technological revolution has generated enormous capabilities, but also enabled the creation of new vulnerabilities and threats. A major challenge in the field of information systems is therefore, to ensure the trustworthiness of the underlying technologies that make possible the generation, collection, storage, processing and transmission of user data at rates more intensive than ever before. Trust in information systems depends on different aspects, one of which is the security of user's data. Data security is referred as the protection of user's data from corruption and unauthorized access. Another important aspect of trust is the protection of user's privacy. Protecting privacy is about complying with user's desires when it comes to handling personal information. Without security to guarantee data protection, appropriate uses of that data cannot be realized. This implies that security and privacy issues are inherently intertwined and should be viewed synergistically. The aim of this paper is to elevate modern practices for ensuring security and privacy during software systems analysis and design. To this end, the basic security and privacy requirements that should be considered are introduced. Additionally, a number of well known methods in the research area of requirements engineering which focus on eliciting and modeling security and privacy requirements are described. Finally, a comparative analysis between these methods is presented.


Author(s):  
Christos Kalloniatis ◽  
Argyri Pattakou ◽  
Evangelia Kavakli ◽  
Stefanos Gritzalis

Pervasiveness of information systems is well underway, redefining our social and economic relationships. This technological revolution has generated enormous capabilities, but also enabled the creation of new vulnerabilities and threats. A major challenge in the field of information systems is therefore, to ensure the trustworthiness of the underlying technologies that make possible the generation, collection, storage, processing and transmission of user data at rates more intensive than ever before. Trust in information systems depends on different aspects, one of which is the security of user's data. Data security is referred as the protection of user's data from corruption and unauthorized access. Another important aspect of trust is the protection of user's privacy. Protecting privacy is about complying with user's desires when it comes to handling personal information. Without security to guarantee data protection, appropriate uses of that data cannot be realized. This implies that security and privacy issues are inherently intertwined and should be viewed synergistically. The aim of this paper is to elevate modern practices for ensuring security and privacy during software systems analysis and design. To this end, the basic security and privacy requirements that should be considered are introduced. Additionally, a number of well known methods in the research area of requirements engineering which focus on eliciting and modeling security and privacy requirements are described. Finally, a comparative analysis between these methods is presented.


2021 ◽  
Author(s):  
Amira KSIKSI

<div>The Ultra-Large-Scale Software (ULSS) systems development challenges today’s software management and development approaches. Northrop et al. (2006) revealed three broad areas of challenges [1]. To deal with those challenges, they propose an interdisciplinary portfolio of research. In particular, we address the design and evolution challenge by focusing on the design area of research. In order to regulate the ULSS systems, the traditional software engineering tools face challenges as they are top-down so they deal with each domain model separately. To address the domain diversity like in the smart city systems, we propose the Framework for Agile Regulated Ultra Large Scale Software System (FARUL3S) to look at the ULSS system from bottom-up. The FARUL3S is a user-centered solution that aims at combining the complex adaptive system, the financial economics as well as the engineering systems design. Our contribution aims to regulate and constrain the ULSS systems by using architectural agreements and other rules. In this paper, we provide a detailed description of the FARUL3S steps. Our Framework generates a system Design Rule Hierarchy (DRH) so it can be used to constrain the entire system design. In the future, we will provide an illustration of the FARUL3S adoption on the management and design of different smart city services to ensure the efficiency of our solution.</div>


2019 ◽  
Vol 6 (1) ◽  
pp. 24-31
Author(s):  
Johanes Fernandes Andry

Many system development consultants nowadays using the XP framework (eXtreme Programming) in software development, This is based on the needs of the era where software can be completed quickly and when user software development is involved. The XP framework does not need too many team members, so it emphasizes effectiveness of work. In software development must begin with good planning to avoid patchwork (software crisis) in software development. The stage in research on the development of rental heavy equipment applications with an XP framework start from planning, designing, coding, testing and releasing software. Studies that do in this research include: literature studies, interviews, observations, document examinations. Next is do the analysis on the application made, and make documentation for system development. That was done as a system analysis and system design in the research. The selection of the right framework at the time of application development is very important, so that the application can be completed on time. The XP framework focuses more on making programs, the system design is enough with the CRC (Class Responsibility Collaborator). In the framework of XP, it always involves users during application development. Each module made by programmers that always tested by the system test section, so the applications that are made can be completed on time, suitable with user needs, and have high quality.


2021 ◽  
Author(s):  
Amira KSIKSI ◽  
Onsa Lazzez ◽  
Adel Khlifi ◽  
Hela Ltifi ◽  
Adel M. Alimi

<div>The Ultra-Large-Scale Software (ULSS) systems development challenges today’s software management and development approaches. Northrop et al. (2006) revealed three broad areas of challenges [1]. To deal with those challenges, they propose an interdisciplinary portfolio of research. In particular, we address the design and evolution challenge by focusing on the design area of research. In order to regulate the ULSS systems, the traditional software engineering tools face challenges as they are top-down so they deal with each domain model separately. To address the domain diversity like in the smart city systems, we propose the Framework for Agile Regulated Ultra Large Scale Software System (FARUL3S) to look at the ULSS system from bottom-up. The FARUL3S is a user-centered solution that aims at combining the complex adaptive system, the financial economics as well as the engineering systems design. Our contribution aims to regulate and constrain the ULSS systems by using architectural agreements and other rules. In this paper, we provide a detailed description of the FARUL3S steps. Our Framework generates a system Design Rule Hierarchy (DRH) so it can be used to constrain the entire system design. In the future, we will provide an illustration of the FARUL3S adoption on the management and design of different smart city services to ensure the efficiency of our solution.</div>


Author(s):  
Vardan Mkrttchian ◽  
Alexander Bershadsky ◽  
Alexander Bozhday ◽  
Tatiana Noskova ◽  
Svetlana Muminova

This chapter brings the sciences of services to a new level, to implementation of embedded systems and networks and is becoming to Sciences of Services with the Cyber Control and Engineering (SSCCE). Purpose of chapter is show possible ways of developing global policy all-pervading e-learning, based on transparency, strategy and model of Cyber Triple H-Avatar. Realization of this purpose is the result of interdisciplinary design, which can be roughly divided into three main components. Stage of solving the problem at the application level, when need to find the right methods and algorithms without implementation details. It is the work of specialists of computer science, it is called an architectural, or high-level system design. The implementation phase, during which engineers, programmers and application specialists provide a previously defined requirements such as functionality required dynamic behavior, reliability and safety of operation, size, power consumption, cost and manufacturability of replication, need people equally well versed in technology and business. Us are offered is use aspects method of the designing.


2021 ◽  
Author(s):  
Amira KSIKSI ◽  
Onsa Lazzez ◽  
Maher Aidi ◽  
Hela Ltifi ◽  
Abdulrahman M. Qahtani ◽  
...  

<div>The Ultra-Large-Scale Software (ULSS) systems development challenges today’s software management and development approaches. Northrop et al. (2006) revealed three broad areas of challenges [1]. To deal with those challenges, they propose an interdisciplinary portfolio of research. In particular, we address the design and evolution challenge by focusing on the design area of research. In order to regulate the ULSS systems, the traditional software engineering tools face challenges as they are top-down so they deal with each domain model separately. To address the domain diversity like in the smart city systems, we propose the Framework for Agile Regulated Ultra Large Scale Software System (FARUL3S) to look at the ULSS system from bottom-up. The FARUL3S is a user-centered solution that aims at combining the complex adaptive system, the financial economics as well as the engineering systems design. Our contribution aims to regulate and constrain the ULSS systems by using architectural agreements and other rules. In this paper, we provide a detailed description of the FARUL3S steps. Our Framework generates a system Design Rule Hierarchy (DRH) so it can be used to constrain the entire system design. In the future, we will provide an illustration of the FARUL3S adoption on the management and design of different smart city services to ensure the efficiency of our solution.</div>


Sign in / Sign up

Export Citation Format

Share Document