JOURNAL ARTICLE

Designing Secure and Privacy-Aware Information Systems

Christos KalloniatisArgyri PattakouEvangelia KavakliStefanos Gritzalis

Year: 2017 Journal:   International Journal of Secure Software Engineering Vol: 8 (2)Pages: 1-25   Publisher: IGI Global

Abstract

Pervasiveness of information systems is well underway, redefining our social and economic relationships. This technological revolution has generated enormous capabilities, but also enabled the creation of new vulnerabilities and threats. A major challenge in the field of information systems is therefore, to ensure the trustworthiness of the underlying technologies that make possible the generation, collection, storage, processing and transmission of user data at rates more intensive than ever before. Trust in information systems depends on different aspects, one of which is the security of user's data. Data security is referred as the protection of user's data from corruption and unauthorized access. Another important aspect of trust is the protection of user's privacy. Protecting privacy is about complying with user's desires when it comes to handling personal information. Without security to guarantee data protection, appropriate uses of that data cannot be realized. This implies that security and privacy issues are inherently intertwined and should be viewed synergistically. The aim of this paper is to elevate modern practices for ensuring security and privacy during software systems analysis and design. To this end, the basic security and privacy requirements that should be considered are introduced. Additionally, a number of well known methods in the research area of requirements engineering which focus on eliciting and modeling security and privacy requirements are described. Finally, a comparative analysis between these methods is presented.

Keywords:
Computer science Computer security Privacy by Design Privacy software Personally identifiable information Information privacy Information sensitivity Information security Internet privacy Security through obscurity Threat model Field (mathematics) Security information and event management Cloud computing security Cloud computing

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
62
Refs
0.14
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Information and Cyber Security
Physical Sciences →  Computer Science →  Information Systems
Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.