Authors
Duaa Alkubaisy, Luca Piras, Mohammed Ghazi Al-Obeidallah, Karl Cox, Haralambos Mouratidis
Publication date
2022/2
Book
Communications in Computer and Information Science
Volume
1556
Publisher
Springer, Cham
Description
Requirements elicitation, analysis, and, above all, early detection of conflicts and resolution, are among the most important, strategic, complex and crucial activities for preventing software system failures, and reducing costs related to reengineering/fixing actions. This is especially important when critical Requirements Classes are involved, such as Privacy and Security Requirements. Recently, organisations have been heavily fined for lack of compliance with data protection regulations, such as the EU General Data Protection Regulation (GDPR). GDPR requires organisations to enforce privacy-by-design activities from the early stages and for the entire software engineering cycle. Accordingly, requirements engineers need methods and tools for systematically identifying privacy and security requirements, detecting and solving related conflicts. Existing techniques support requirements identification without detecting …
Total citations
202220232024153