A requirements taxonomy for reducing Web site privacy vulnerabilities

被引:81
作者
Antón, AI
Earp, JB
机构
[1] N Carolina State Univ, Coll Engn, Raleigh, NC 27695 USA
[2] N Carolina State Univ, Coll Management, Raleigh, NC 27695 USA
关键词
privacy requirements; security requirements;
D O I
10.1007/s00766-003-0183-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing use of personal information on Web-based applications can result in unexpected disclosures. Consumers often have only the stated Web site policies as a guide to how their information is used, and thus on which to base their browsing and transaction decisions. However, each policy is different, and it is difficult-if not impossible-for the average user to compare and comprehend these policies. This paper presents a taxonomy of privacy requirements for Web sites. Using goal-mining, the extraction of pre-requirements goals from post-requirements text artefacts, we analysed an initial set of Internet privacy policies to develop. the taxonomy. This taxonomy was then validated during a second goal extraction exercise, involving privacy policies from a range of health care related Web sites. This validation effort enabled further refinement to the taxonomy, culminating in two classes of privacy requirements: protection goals and vulnerabilities. Protection goals express the desired protection of consumer privacy rights, whereas vulnerabilities describe requirements that potentially threaten consumer privacy. The identified taxonomy categories are useful for analysing implicit internal conflicts within privacy policies, the corresponding Web sites, and their manner of operation. These categories can be used by Web site designers to reduce Web site privacy vulnerabilities and ensure that their stated and actual policies are consistent with each other. The same categories can be used by customers to evaluate and understand policies and their limitations. Additionally, the policies have potential use by third-party evaluators of site policies and conflicts.
引用
收藏
页码:169 / 185
页数:17
相关论文
共 43 条
[1]   PROGRAM DESIGN BY INFORMAL ENGLISH DESCRIPTIONS [J].
ABBOTT, RJ .
COMMUNICATIONS OF THE ACM, 1983, 26 (11) :882-894
[2]   An integrated scenario management strategy [J].
Alspaugh, TA ;
Antón, AI ;
Barnes, T ;
Mott, BW .
IEEE INTERNATIONAL SYMPOSIUM ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 1999, :142-149
[3]  
ANTON A, 1997, THESIS GEORGIA I TEC
[4]   Deriving goals from a use-case based requirements specification [J].
Antón A.I. ;
Carter R.A. ;
Dagnino A. ;
Dempster J.H. ;
Siege D.F. .
Requirements Engineering, 2001, 6 (1) :63-73
[5]   Precluding incongruous behavior by aligning software requirements with security and privacy policies [J].
Antón, AI ;
Earp, JB ;
Carter, RA .
INFORMATION AND SOFTWARE TECHNOLOGY, 2003, 45 (14) :967-977
[6]   Goal-based requirements analysis [J].
Anton, AI .
PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON REQUIREMENTS ENGINEERING, 1996, :136-144
[7]  
Antón AI, 2001, FIFTH IEEE INTERNATIONAL SYMPOSIUM ON REQUIREMENTS ENGINEERING, PROCEEDINGS, P138
[8]   Analyzing website privacy requirements using a privacy goal taxonomy [J].
Antón, AI ;
Earp, JB ;
Reese, A .
IEEE JOINT INTERNATIONAL CONFERENCE ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 2002, :23-31
[9]   The use of goals to surface requirements for evolving systems [J].
Anton, AI ;
Potts, C .
PROCEEDINGS OF THE 1998 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 1998, :157-166
[10]  
ANTON AI, 1994, 6 INT C CAISE 94 P U, P94