TY - GEN
T1 - Supporting Privacy by Design using Privacy Process Patterns
AU - Diamantopoulou, Vasiliki
AU - Kalloniatis, Christos
AU - Gritzalis, Stefanos
AU - Mouratidis, Haralambos
N1 - The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-58469-0_33
PY - 2017/5/4
Y1 - 2017/5/4
N2 - Advances in Information and Communication Technology (ICT) have had significant impact on every-day life and have allowed us to share, store and manipulate information easily and at any time. On the other hand, such situation also raises important privacy concerns. To deal with such concerns, the literature has identified the need to introduce a Privacy by Design (PbD) approach to support the elicitation and analysis of privacy requirements and their implementation through appropriate Privacy Enhancing Technologies. However, and despite all the work presented in the literature, there is still a gap between privacy design and implementation. This paper presents a set of Privacy Process Patterns that can be used to bridge that gap. To demonstrate the practical application of such patterns, we instantiate them in JavaScript Object Notation (JSON), we use them in conjunction with the Privacy Safeguard (PriS) methodology and we apply them to a real case study.
AB - Advances in Information and Communication Technology (ICT) have had significant impact on every-day life and have allowed us to share, store and manipulate information easily and at any time. On the other hand, such situation also raises important privacy concerns. To deal with such concerns, the literature has identified the need to introduce a Privacy by Design (PbD) approach to support the elicitation and analysis of privacy requirements and their implementation through appropriate Privacy Enhancing Technologies. However, and despite all the work presented in the literature, there is still a gap between privacy design and implementation. This paper presents a set of Privacy Process Patterns that can be used to bridge that gap. To demonstrate the practical application of such patterns, we instantiate them in JavaScript Object Notation (JSON), we use them in conjunction with the Privacy Safeguard (PriS) methodology and we apply them to a real case study.
KW - Privacy Process Patterns
KW - Requirements Engineering
KW - Information Security Modelling
U2 - 10.1007/978-3-319-58469-0_33
DO - 10.1007/978-3-319-58469-0_33
M3 - Conference contribution with ISSN or ISBN
SN - 9783319584683
T3 - IFIP Advances in Information and Communication Technology
SP - 491
EP - 505
BT - IFIP SEC 2017 32nd IFIP International Information Security Conference
PB - Springer LNCS
CY - Rome, Italy
T2 - IFIP SEC 2017 32nd IFIP International Information Security Conference
Y2 - 4 May 2017
ER -