Addressing Early Life Cycle Privacy Risk
نویسنده
چکیده
This paper adapts System-Theoretic Early Concept Analysis (STECA), an instrumental safety risk management technique, for privacy to better identify and address privacy risks early in the engineering process. The technique, STECAPriv, aims to infer a nominal functional privacy control structure based on a conceptual system description and privacy-related system behavioral constraints. Model-based systems engineering (MBSE) is employed in conjunction with STECA-Priv to validate the projected control structure and to identify privacy risks in the form of constraint violations. To illustrate STECAPriv as supported by MBSE, it is applied to the simplified example of a smart television. Keywords—privacy risk; System-Theoretic Early Concept Analysis; STECA; STECA-Priv; model-based systems engineering; MBSE
منابع مشابه
Addressing the Dilema Between Collaboration and Privacy in Coworking Spaces
This paper aims to inform design strategies for regulating privacy in coworking spaces. Coworking spaces are growing at a high rate, yet studies related to the social, psychological, behavioral and physical needs associated with these environments are limited. The growth of coworking spaces is in greater part facilitated by a drive towards greater interaction and collaboration among the workfor...
متن کاملSecurity and Privacy Requirements Engineering
Security requirements engineering identifies security risks in software in the early stages of the development cycle. In this chapter, the authors present the SQUARE security requirements method. They integrate privacy requirements into SQUARE to identify privacy risks in addition to security risks. They then present a privacy elicitation technique and subsequently combine security risk assessm...
متن کاملEffect of Firm Life Cycle Theory on the relevance of Risk Measures
Risk phenomenon is one of the key characteristics of decision making in the fields of investment, issues associated with financial markets, and various economic activities. The present study was an attempt to evaluate the impact of different periods of life cycle of companies on the relevance of risk measures of companies. In this study, the collected data have been analyzed in three stages. Fi...
متن کاملAnalyzing the Privacy Preserving Using Big Data Techniques
Recently big data has become a hot research topic. The rising amounts of big data also increase the chance of violate the privacy of individuals. Since big data need high computational power and large storage, distributed systems are used. As multiple parties are concerned in these systems, the risk of privacy violation is improved. There have been a number of privacy-preserving methods develop...
متن کاملSecurity Risk Analysis of RFID Technology
Most of the sources of security and privacy issues in RFID technology arise from the violation of the air interface between a tag and its reader. This paper will approach the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage processes, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017