Authors
Duaa Alkubaisy, Luca Piras, Mohammed Ghazi Al-Obeidallah, Karl Cox, Haralambos Mouratidis
Publication date
2021/4/26
Conference
International Conference on Evaluation of Novel Approaches to Software Engineering
Pages
67-87
Publisher
Springer, Cham
Description
Requirements elicitation, analysis, and, above all, early detection of conflicts and resolution, are among the most important, strategic, complex and crucial activities for preventing software system failures, and reducing costs related to reengineering/fixing actions. This is especially important when critical Requirements Classes are involved, such as Privacy and Security Requirements. Recently, organisations have been heavily fined for lack of compliance with data protection regulations, such as the EU General Data Protection Regulation (GDPR). GDPR requires organisations to enforce privacy-by-design activities from the early stages and for the entire software engineering cycle. Accordingly, requirements engineers need methods and tools for systematically identifying privacy and security requirements, detecting and solving related conflicts. Existing techniques support requirements identification without detecting …
Total citations
202220232024152
Scholar articles