Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners

被引:7
|
作者
Canedo, Edna Dias [1 ]
Bandeira, Ian Nery [1 ]
Seidel Calazans, Angelica Toffano [2 ]
Teixeira Costa, Pedro Henrique [1 ]
Rodrigues Cancado, Emille Catarine [1 ]
Bonifacio, Rodrigo [1 ]
机构
[1] Univ Brasilia UnB, Dept Comp Sci, POB 4466, BR-70910900 Brasilia, DF, Brazil
[2] Univ Ctr UniCEUB, Brasilia, DF, Brazil
关键词
Privacy requirements elicitation; Systematic literature review; Methodologies; Techniques; Tools; SECURITY REQUIREMENTS;
D O I
10.1007/s00766-022-00382-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
During the software development process and throughout the software lifecycle, organizations must guarantee users' privacy by protecting personal data. There are several studies in the literature proposing methodologies, techniques, and tools for privacy requirements elicitation. These studies report that practitioners must use systematic approaches to specify these requirements during initial software development activities to avoid users' data privacy breaches. The main goal of this study is to identify which methodologies, techniques, and tools are used in privacy requirements elicitation in the literature. We have also investigated Information Technology (IT) practitioners' perceptions regarding the methodologies, techniques, and tools identified in the literature. We have carried out a systematic literature review (SLR) to identify the methodologies, techniques, and tools used for privacy requirements elicitation. Besides, we have surveyed IT practitioners to understand their perception of using these techniques and tools in the software development process. We have found several methodologies, techniques, and tools proposed in the literature to carry out privacy requirements elicitation. Out of 78 studies cataloged within the SLR, most of them did not verify their methodologies and techniques in a practical case study or illustrative contexts (38 studies), and less than 35% of them (26 studies) experimented with their propositions within an industry context. The Privacy Safeguard method (PriS) is the best known among the 198 practitioners in the industry who participated in the survey. Moreover, use cases and user story are their most-used techniques. This qualitative and quantitative study shows a perception of IT practitioners different from those presented in other research papers and suggests that methodologies, techniques, and tools play an important role in IT practitioners' perceptions about privacy requirements elicitation.
引用
收藏
页码:177 / 194
页数:18
相关论文
共 50 条
  • [1] Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners
    Edna Dias Canedo
    Ian Nery Bandeira
    Angelica Toffano Seidel Calazans
    Pedro Henrique Teixeira Costa
    Emille Catarine Rodrigues Cançado
    Rodrigo Bonifácio
    [J]. Requirements Engineering, 2023, 28 : 177 - 194
  • [2] A systematic literature review of stakeholder identification methods in requirements elicitation
    Pacheco, Carla
    Garcia, Ivan
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (09) : 2171 - 2181
  • [3] Requirements Elicitation Techniques in Mobile Applications: A Systematic Literature Review
    Bahurmuz, Naela
    Alnajim, Rishaa
    Al-Mutairi, Rasha
    Al-Shingiti, Zainab
    Saleem, Farrukh
    Fakieh, Bahjat
    [J]. INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY PROJECT MANAGEMENT, 2021, 12 (03) : 1 - 18
  • [4] Requirements elicitation techniques for software development: a systematic review of literature
    Alflen, Naiara Crislaine
    Vasques Prado, Edmir Parada
    [J]. ATOZ-NOVAS PRATICAS EM INFORMACAO E CONHECIMENTO, 2021, 10 (01): : 39 - 49
  • [5] Data-Driven Requirements Elicitation: A Systematic Literature Review
    Lim S.
    Henriksson A.
    Zdravkovic J.
    [J]. SN Computer Science, 2021, 2 (1)
  • [6] An Ontology for Privacy Requirements via a Systematic Literature Review
    Gharib, Mohamad
    Giorgini, Paolo
    Mylopoulos, John
    [J]. JOURNAL ON DATA SEMANTICS, 2020, 9 (04) : 123 - 149
  • [7] Requirements elicitation techniques: a systematic literature review based on the maturity of the techniques
    Pacheco, Carla
    Garcia, Ivan
    Reyes, Miryam
    [J]. IET SOFTWARE, 2018, 12 (04) : 365 - 378
  • [8] Towards an Ontology for Privacy Requirements via a Systematic Literature Review
    Gharib, Mohamad
    Giorgini, Paolo
    Mylopoulos, John
    [J]. CONCEPTUAL MODELING, ER 2017, 2017, 10650 : 193 - 208
  • [9] Requirements Elicitation Approaches: A Systematic Review
    Franco, Aldrin Jaramillo
    [J]. 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2015, : 520 - 521
  • [10] Intelligent Requirements Elicitation and Modeling: A Literature Review
    Wang, Ye
    Chen, Junwu
    Xia, Xin
    Jiang, Bo
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (04): : 683 - 705