谷歌浏览器插件
订阅小程序
在清言上使用

On the Current State of Privacy Risks in Software Requirement Elicitation Techniques

Zartasha Saeed,Shahab Haider, Zulfiqar Ali,Muhammad Arshad,Iftikhar Alam

Advances in information security, privacy, and ethics book series(2023)

引用 0|浏览3
暂无评分
摘要
Requirement engineering has gained tremendous popularity among the research and developers communities and comprises five activities, i.e., feasibility study, elicitation, analysis, specification, and validation. In the elicitation phase, the data is collected from different stakeholders. Hence, the overall system, process, and even data may be compromised and sometimes lead to privacy threats if the data is shared with a third party. To this end, this work proposes a comparative analysis of the eminent techniques, including privacy violation factors. The authors targeted 32 techniques for analysis from different project scenarios. This study may help the analysts with adequate knowledge and help project management teams to select the best and most secure elicitation techniques concerning the nature of projects.
更多
查看译文
关键词
privacy risks,elicitation,software
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要