IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Designing Secure and Privacy-Aware Information Systems

Designing Secure and Privacy-Aware Information Systems
View Sample PDF
Author(s): Christos Kalloniatis (Department of Cultural Technology and Communication, University of the Aegean, Lesvos, Greece), Argyri Pattakou (Department of Cultural Technology and Communication, University of the Aegean, Lesvos, Greece), Evangelia Kavakli (Department of Cultural Technology and Communication, University of the Aegean, Lesvos, Greece)and Stefanos Gritzalis (Department of Information and Communication Systems Engineering, University of the Aegean, Samos, Greece)
Copyright: 2019
Pages: 29
Source title: Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-7113-1.ch022

Purchase

View Designing Secure and Privacy-Aware Information Systems on the publisher's website for pricing and purchasing information.

Abstract

Pervasiveness of information systems is well underway, redefining our social and economic relationships. This technological revolution has generated enormous capabilities, but also enabled the creation of new vulnerabilities and threats. A major challenge in the field of information systems is therefore, to ensure the trustworthiness of the underlying technologies that make possible the generation, collection, storage, processing and transmission of user data at rates more intensive than ever before. Trust in information systems depends on different aspects, one of which is the security of user's data. Data security is referred as the protection of user's data from corruption and unauthorized access. Another important aspect of trust is the protection of user's privacy. Protecting privacy is about complying with user's desires when it comes to handling personal information. Without security to guarantee data protection, appropriate uses of that data cannot be realized. This implies that security and privacy issues are inherently intertwined and should be viewed synergistically. The aim of this paper is to elevate modern practices for ensuring security and privacy during software systems analysis and design. To this end, the basic security and privacy requirements that should be considered are introduced. Additionally, a number of well known methods in the research area of requirements engineering which focus on eliciting and modeling security and privacy requirements are described. Finally, a comparative analysis between these methods is presented.

Related Content

Guru Prasad M. S., Praveen Gujjar, H. N. Naveen Kumar, M. Anand Kumar, S. Chandrappa. © 2023. 14 pages.
Bhawnesh Kumar, Ashwani Kumar, Harendra Singh Negi, Javed Alam. © 2023. 15 pages.
Abhishek Kumar, Karan Singh. © 2023. 21 pages.
Anuj Singh, Somjit Mandal, Kamlesh Chandra Purohit. © 2023. 21 pages.
Muthumanikandan Vanamoorthy. © 2023. 13 pages.
Janmejay Pant, Rakesh Kumar Sharma, Himanshu Pant, Devendra Singh, Durgesh Pant. © 2023. 11 pages.
Siddhardha Kollabathini. © 2023. 9 pages.
Body Bottom