TY - GEN
T1 - On the Integration of Privacy-Enhancing Technologies in the Process of Software Engineering
AU - Klymenko, Alexandra
AU - Meisenbacher, Stephen
AU - Favaro, Luca
AU - Matthes, Florian
N1 - Publisher Copyright:
© 2024 by SCITEPRESS – Science and Technology Publications, Lda.
PY - 2024
Y1 - 2024
N2 - The class of technologies known as Privacy-Enhancing Technologies (PETs) has been receiving rising attention in the academic sphere. In practice, however, the adoption of such technologies remains low. Beyond the actual implementation of a PET, it is not clear where along the process of software engineering PETs should be considered, and which activities must take place to facilitate their implementation. In this light, we aim to investigate the placement of PETs in the software engineering process, specifically from the perspective of privacy requirements engineering. To do this, we conduct a systematic literature review and interview 10 privacy experts, exploring the integration of PETs into the software engineering process, as well as identifying associated challenges along with their potential solutions. We systematize our findings in a unified process diagram that illustrates the roles and activities involved in the implementation of PETs in software systems. In addition, we map the identified solution concepts to the diagram, highlighting which stages of the software engineering process are vital in tackling the corresponding challenges and supporting the adoption of PETs.
AB - The class of technologies known as Privacy-Enhancing Technologies (PETs) has been receiving rising attention in the academic sphere. In practice, however, the adoption of such technologies remains low. Beyond the actual implementation of a PET, it is not clear where along the process of software engineering PETs should be considered, and which activities must take place to facilitate their implementation. In this light, we aim to investigate the placement of PETs in the software engineering process, specifically from the perspective of privacy requirements engineering. To do this, we conduct a systematic literature review and interview 10 privacy experts, exploring the integration of PETs into the software engineering process, as well as identifying associated challenges along with their potential solutions. We systematize our findings in a unified process diagram that illustrates the roles and activities involved in the implementation of PETs in software systems. In addition, we map the identified solution concepts to the diagram, highlighting which stages of the software engineering process are vital in tackling the corresponding challenges and supporting the adoption of PETs.
KW - Privacy Engineering
KW - Privacy Requirements
KW - Privacy-Enhancing Technologies
KW - Requirements Engineering
UR - http://www.scopus.com/inward/record.url?scp=85193980857&partnerID=8YFLogxK
U2 - 10.5220/0012632500003690
DO - 10.5220/0012632500003690
M3 - Conference contribution
AN - SCOPUS:85193980857
T3 - International Conference on Enterprise Information Systems, ICEIS - Proceedings
SP - 41
EP - 52
BT - Proceedings of the 26th International Conference on Enterprise Information Systems, ICEIS 2024
A2 - Filipe, Joaquim
A2 - Smialek, Michal
A2 - Brodsky, Alexander
A2 - Hammoudi, Slimane
PB - Science and Technology Publications, Lda
T2 - 26th International Conference on Enterprise Information Systems, ICEIS 2024
Y2 - 28 April 2024 through 30 April 2024
ER -