IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Addressing Privacy in Traditional and Cloud-Based Systems

Addressing Privacy in Traditional and Cloud-Based Systems
View Sample PDF
Author(s): Christos Kalloniatis (University of the Aegean, Greece), Evangelia Kavakli (University of the Aegean, Greece)and Stefanos Gritzalis (University of the Aegean, Greece)
Copyright: 2015
Pages: 29
Source title: Cloud Technology: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-6539-2.ch075

Purchase

View Addressing Privacy in Traditional and Cloud-Based Systems on the publisher's website for pricing and purchasing information.

Abstract

A major challenge in the field of software engineering is to make users trust the software that they use in their everyday activities for professional or recreational reasons. Amid the main criteria that formulate users' trust is the way that that their privacy is protected. Indeed, privacy violation is an issue of great importance for active online users that daily accomplish several transactions that may convey personal data, sensitive personal data, employee data, credit card data and so on. In addition, the appearance of cloud computing has elevated the number of personally identifiable information that users provide in order to gain access to various services, further raising user concerns as to how and to what extend information about them is communicated to others. The aim of this work is to elevate the modern practices for ensuring privacy during software systems design. To this end, the basic privacy requirements that should be considered during system analysis are introduced. Additionally, a number of well-known methods that have been introduced in the research area of requirements engineering which aim on eliciting and modeling privacy requirements during system design are introduced and critically analyzed. The work completes with a discussion of the additional security and privacy concepts that should be considered in the context of cloud-based information systems and how these affect current research.

Related Content

Dina Darwish. © 2024. 43 pages.
Kassim Kalinaki, Musau Abdullatif, Sempala Abdul-Karim Nasser, Ronald Nsubuga, Julius Kugonza. © 2024. 23 pages.
Yogita Yashveer Raghav, Ramesh Kait. © 2024. 17 pages.
Renuka Devi Saravanan, Shyamala Loganathan, Saraswathi Shunmuganathan. © 2024. 21 pages.
Veera Talukdar, Ardhariksa Zukhruf Kurniullah, Palak Keshwani, Huma Khan, Sabyasachi Pramanik, Ankur Gupta, Digvijay Pandey. © 2024. 30 pages.
Dharmesh Dhabliya, Sukhvinder Singh Dari, Nitin N. Sakhare, Anish Kumar Dhablia, Digvijay Pandey, Balakumar Muniandi, A. Shaji George, A. Shahul Hameed, Pankaj Dadheech. © 2024. 9 pages.
Avtar Singh, Shobhana Kashyap. © 2024. 11 pages.
Body Bottom