LINDDUN is a framework to identify privacy threats and elicit privacy requirements from a system. It has complete procedures and strong support on privacy requirements analysis. This research tries to figure out how practically we can apply the LINDDUN methodology in privacy requirements analysis. This thesis studies LINDDUN in a case project name Rin-Tin-Tinder for privacy threats and privacy requirements analysis. The analysis results are compared with the privacy requirement elicited by the project team in a workshop session. The analysis result is verified through a comparison with the Microsoft privacy guideline. The discussions and analysis on comparison implies strengths and weakness of the LINDDUN methodology. Compared to worksh...
Threat modeling involves the systematic identification, elicitation, and analysis of privacy- and/or...
Software systems are increasingly more and more open, handle large amounts of personal or other sens...
We introduce the concept of augmentation methods, methods that complement other methods by addressin...
Privacy is a key issue in today's society. Software systems handle more and more sensitive informati...
This study analyses two state-of-the-art methodologies for eliciting privacy threats in software con...
Privacy is gaining importance in software systems and software design. We therefore proposed the LIN...
Due to advancements in digitization it is increasingly easy to collect personal data, as performed b...
During the software development process and throughout the software lifecycle, organizations must gu...
Privacy requirements elicitation: A systematic literature review and perception analysis of IT pract...
Privacy is a software quality that is closely related to security. The main difference is that secur...
Ready or not, the digitalization of information has come, and privacy is standing out there, possibl...
Part 1: ConferenceInternational audiencePrivacy requirements are difficult to elicit for any given s...
Requirements elicitation, analysis, and, above all, early detection of conflicts and resolution, are...
Privacy threat modeling is difficult. Identifying relevant threats that cause privacy harm requires ...
With privacy becoming a key concern in modern society, it is important that privacy measures are str...
Threat modeling involves the systematic identification, elicitation, and analysis of privacy- and/or...
Software systems are increasingly more and more open, handle large amounts of personal or other sens...
We introduce the concept of augmentation methods, methods that complement other methods by addressin...
Privacy is a key issue in today's society. Software systems handle more and more sensitive informati...
This study analyses two state-of-the-art methodologies for eliciting privacy threats in software con...
Privacy is gaining importance in software systems and software design. We therefore proposed the LIN...
Due to advancements in digitization it is increasingly easy to collect personal data, as performed b...
During the software development process and throughout the software lifecycle, organizations must gu...
Privacy requirements elicitation: A systematic literature review and perception analysis of IT pract...
Privacy is a software quality that is closely related to security. The main difference is that secur...
Ready or not, the digitalization of information has come, and privacy is standing out there, possibl...
Part 1: ConferenceInternational audiencePrivacy requirements are difficult to elicit for any given s...
Requirements elicitation, analysis, and, above all, early detection of conflicts and resolution, are...
Privacy threat modeling is difficult. Identifying relevant threats that cause privacy harm requires ...
With privacy becoming a key concern in modern society, it is important that privacy measures are str...
Threat modeling involves the systematic identification, elicitation, and analysis of privacy- and/or...
Software systems are increasingly more and more open, handle large amounts of personal or other sens...
We introduce the concept of augmentation methods, methods that complement other methods by addressin...