How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns

Artificial Intelligence and Law 17 (1):1-30 (2009)
  Copy   BIBTEX

Abstract

Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose them to implement minimal precautionary security measures. Several IT solutions (e.g., Privacy Enhancing Technologies, Access Control Infrastructure, etc.) have been proposed to address security and privacy issues. However, understanding why, and when such solutions have to be adopted is often unanswered because the answer comes only from a broader perspective, accounting for legal and organizational issues. Security engineers and legal experts should analyze the business goals of a company and its organizational structure and derive from there the points where security and privacy problems may arise and which solutions best fit such (legal) problems. The paper investigates the methodological support for capturing security and privacy requirements of a concrete health care provider.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,349

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

A multi-agent legal recommender system.Lucas Drumond & Rosario Girardi - 2008 - Artificial Intelligence and Law 16 (2):175-207.
How Does Coherence Matter?Niko Kolodny - 2007 - Proceedings of the Aristotelian Society 107 (1pt3):229 - 263.
Are there process-requirements of rationality?Julian Fink - 2011 - Organon F: Medzinárodný Časopis Pre Analytickú Filozofiu 18 (4):475-488.
Normative requirements.John Broome - 1999 - Ratio 12 (4):398–419.
Might there be legal reasons?Richard Paul Hamilton - 2004 - Res Publica 10 (4):425-447.
Towards inclusive identity management.Lothar Fritsch, Kristin Skeide Fuglerud & Ivar Solheim - 2010 - Identity in the Information Society 3 (3):515-538.
Security and Privacy: Why Privacy Matters. [REVIEW]Stephanie J. Bird - 2013 - Science and Engineering Ethics 19 (3):669-671.
State or process requirements?Niko Kolodny - 2007 - Mind 116 (462):371-385.

Analytics

Added to PP
2009-01-28

Downloads
65 (#244,525)

6 months
10 (#251,846)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

Deontic logic.G. H. von Wright - 1951 - Mind 60 (237):1-15.
I. deontic logic.G. H. von Wright - 1951 - Mind 60 (237):1-15.
Law and logic.Stig Kanger - 1972 - Theoria 38 (3):105-132.

View all 6 references / Add more references