Matches in SemOpenAlex for { <https://semopenalex.org/work/W4256222215> ?p ?o ?g. }
Showing items 1 to 92 of
92
with 100 items per page.
- W4256222215 endingPage "418" @default.
- W4256222215 startingPage "390" @default.
- W4256222215 abstract "Pervasiveness of information systems is well underway, redefining our social and economic relationships. This technological revolution has generated enormous capabilities, but also enabled the creation of new vulnerabilities and threats. A major challenge in the field of information systems is therefore, to ensure the trustworthiness of the underlying technologies that make possible the generation, collection, storage, processing and transmission of user data at rates more intensive than ever before. Trust in information systems depends on different aspects, one of which is the security of user's data. Data security is referred as the protection of user's data from corruption and unauthorized access. Another important aspect of trust is the protection of user's privacy. Protecting privacy is about complying with user's desires when it comes to handling personal information. Without security to guarantee data protection, appropriate uses of that data cannot be realized. This implies that security and privacy issues are inherently intertwined and should be viewed synergistically. The aim of this paper is to elevate modern practices for ensuring security and privacy during software systems analysis and design. To this end, the basic security and privacy requirements that should be considered are introduced. Additionally, a number of well known methods in the research area of requirements engineering which focus on eliciting and modeling security and privacy requirements are described. Finally, a comparative analysis between these methods is presented." @default.
- W4256222215 created "2022-05-12" @default.
- W4256222215 creator A5003619823 @default.
- W4256222215 creator A5012671144 @default.
- W4256222215 creator A5012947502 @default.
- W4256222215 creator A5091815745 @default.
- W4256222215 date "2019-01-01" @default.
- W4256222215 modified "2023-09-30" @default.
- W4256222215 title "Designing Secure and Privacy-Aware Information Systems" @default.
- W4256222215 cites W116246279 @default.
- W4256222215 cites W1517234342 @default.
- W4256222215 cites W1558430934 @default.
- W4256222215 cites W1594674973 @default.
- W4256222215 cites W1758108196 @default.
- W4256222215 cites W185673473 @default.
- W4256222215 cites W1898015721 @default.
- W4256222215 cites W1994653022 @default.
- W4256222215 cites W2017739343 @default.
- W4256222215 cites W2019672983 @default.
- W4256222215 cites W2034727308 @default.
- W4256222215 cites W2057864103 @default.
- W4256222215 cites W2080243118 @default.
- W4256222215 cites W2087952459 @default.
- W4256222215 cites W2109026747 @default.
- W4256222215 cites W2110157102 @default.
- W4256222215 cites W2111695375 @default.
- W4256222215 cites W2114334503 @default.
- W4256222215 cites W2116560806 @default.
- W4256222215 cites W2117818414 @default.
- W4256222215 cites W2124472003 @default.
- W4256222215 cites W2131730994 @default.
- W4256222215 cites W2139061144 @default.
- W4256222215 cites W2145561519 @default.
- W4256222215 cites W2147733013 @default.
- W4256222215 cites W2155386176 @default.
- W4256222215 cites W2157437711 @default.
- W4256222215 cites W2159269282 @default.
- W4256222215 cites W2164022737 @default.
- W4256222215 cites W2168409789 @default.
- W4256222215 cites W2171627300 @default.
- W4256222215 cites W2496278397 @default.
- W4256222215 cites W2590810828 @default.
- W4256222215 cites W4242182825 @default.
- W4256222215 cites W4250195845 @default.
- W4256222215 cites W4252960857 @default.
- W4256222215 cites W4254970206 @default.
- W4256222215 cites W72871095 @default.
- W4256222215 doi "https://doi.org/10.4018/978-1-5225-7113-1.ch022" @default.
- W4256222215 hasPublicationYear "2019" @default.
- W4256222215 type Work @default.
- W4256222215 citedByCount "0" @default.
- W4256222215 crossrefType "book-chapter" @default.
- W4256222215 hasAuthorship W4256222215A5003619823 @default.
- W4256222215 hasAuthorship W4256222215A5012671144 @default.
- W4256222215 hasAuthorship W4256222215A5012947502 @default.
- W4256222215 hasAuthorship W4256222215A5091815745 @default.
- W4256222215 hasConcept C108827166 @default.
- W4256222215 hasConcept C123201435 @default.
- W4256222215 hasConcept C137822555 @default.
- W4256222215 hasConcept C169093310 @default.
- W4256222215 hasConcept C193934123 @default.
- W4256222215 hasConcept C38652104 @default.
- W4256222215 hasConcept C41008148 @default.
- W4256222215 hasConcept C509729295 @default.
- W4256222215 hasConcept C527648132 @default.
- W4256222215 hasConceptScore W4256222215C108827166 @default.
- W4256222215 hasConceptScore W4256222215C123201435 @default.
- W4256222215 hasConceptScore W4256222215C137822555 @default.
- W4256222215 hasConceptScore W4256222215C169093310 @default.
- W4256222215 hasConceptScore W4256222215C193934123 @default.
- W4256222215 hasConceptScore W4256222215C38652104 @default.
- W4256222215 hasConceptScore W4256222215C41008148 @default.
- W4256222215 hasConceptScore W4256222215C509729295 @default.
- W4256222215 hasConceptScore W4256222215C527648132 @default.
- W4256222215 hasLocation W42562222151 @default.
- W4256222215 hasOpenAccess W4256222215 @default.
- W4256222215 hasPrimaryLocation W42562222151 @default.
- W4256222215 hasRelatedWork W1996017820 @default.
- W4256222215 hasRelatedWork W2148576854 @default.
- W4256222215 hasRelatedWork W2157513090 @default.
- W4256222215 hasRelatedWork W2160327711 @default.
- W4256222215 hasRelatedWork W2171174366 @default.
- W4256222215 hasRelatedWork W2293688690 @default.
- W4256222215 hasRelatedWork W2371258175 @default.
- W4256222215 hasRelatedWork W4256222215 @default.
- W4256222215 hasRelatedWork W1970814477 @default.
- W4256222215 hasRelatedWork W2914745855 @default.
- W4256222215 isParatext "false" @default.
- W4256222215 isRetracted "false" @default.
- W4256222215 workType "book-chapter" @default.