{"id":"https://openalex.org/W1991449426","doi":"https://doi.org/10.1108/10662240610656483","title":"Incorporating privacy requirements into the system design process","display_name":"Incorporating privacy requirements into the system design process","publication_year":2006,"publication_date":"2006-03-01","ids":{"openalex":"https://openalex.org/W1991449426","doi":"https://doi.org/10.1108/10662240610656483","mag":"1991449426"},"language":"en","primary_location":{"id":"doi:10.1108/10662240610656483","is_oa":false,"landing_page_url":"https://doi.org/10.1108/10662240610656483","pdf_url":null,"source":{"id":"https://openalex.org/S63576417","display_name":"Internet Research","issn_l":"1066-2243","issn":["1066-2243","2054-5657"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Research","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012671144","display_name":"Evangelia Kavakli","orcid":"https://orcid.org/0000-0003-2743-5146"},"institutions":[{"id":"https://openalex.org/I98805295","display_name":"University of the Aegean","ror":"https://ror.org/03zsp3p94","country_code":"GR","type":"education","lineage":["https://openalex.org/I98805295"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Evangelia Kavakli","raw_affiliation_strings":["Department of Cultural Technology and Communication, University of the Aegean, Mytilene, Greece","Dept. of Cultural Technol. & Commun., Univ. of the Aegean, Mytilene, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Cultural Technology and Communication, University of the Aegean, Mytilene, Greece","institution_ids":["https://openalex.org/I98805295"]},{"raw_affiliation_string":"Dept. of Cultural Technol. & Commun., Univ. of the Aegean, Mytilene, Greece","institution_ids":["https://openalex.org/I98805295"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003619823","display_name":"Christos Kalloniatis","orcid":"https://orcid.org/0000-0002-8844-2596"},"institutions":[{"id":"https://openalex.org/I98805295","display_name":"University of the Aegean","ror":"https://ror.org/03zsp3p94","country_code":"GR","type":"education","lineage":["https://openalex.org/I98805295"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Christos Kalloniatis","raw_affiliation_strings":["Department of Cultural Technology and Communication, University of the Aegean, Mytilene, Greece","Dept. of Cultural Technol. & Commun., Univ. of the Aegean, Mytilene, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Cultural Technology and Communication, University of the Aegean, Mytilene, Greece","institution_ids":["https://openalex.org/I98805295"]},{"raw_affiliation_string":"Dept. of Cultural Technol. & Commun., Univ. of the Aegean, Mytilene, Greece","institution_ids":["https://openalex.org/I98805295"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036455837","display_name":"Pericles Loucopoulos","orcid":"https://orcid.org/0000-0003-1395-5001"},"institutions":[{"id":"https://openalex.org/I28407311","display_name":"University of Manchester","ror":"https://ror.org/027m9bs27","country_code":"GB","type":"education","lineage":["https://openalex.org/I28407311"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Pericles Loucopoulos","raw_affiliation_strings":["School of Informatics, University of Manchester, Manchester, UK"],"affiliations":[{"raw_affiliation_string":"School of Informatics, University of Manchester, Manchester, UK","institution_ids":["https://openalex.org/I28407311"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091815745","display_name":"Stefanos Gritzalis","orcid":"https://orcid.org/0000-0002-8037-2191"},"institutions":[{"id":"https://openalex.org/I98805295","display_name":"University of the Aegean","ror":"https://ror.org/03zsp3p94","country_code":"GR","type":"education","lineage":["https://openalex.org/I98805295"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Stefanos Gritzalis","raw_affiliation_strings":["Department of Information and Communications Systems Engineering, University of the Aegean, Samos, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communications Systems Engineering, University of the Aegean, Samos, Greece","institution_ids":["https://openalex.org/I98805295"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5012671144"],"corresponding_institution_ids":["https://openalex.org/I98805295"],"apc_list":null,"apc_paid":null,"fwci":3.1627,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.91575398,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"16","issue":"2","first_page":"140","last_page":"158"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7753450870513916},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.7118123173713684},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.7036188840866089},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.5687791109085083},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5305032730102539},{"id":"https://openalex.org/keywords/requirements-engineering","display_name":"Requirements engineering","score":0.4955676794052124},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.43891599774360657},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43056678771972656},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4247106909751892},{"id":"https://openalex.org/keywords/design-science-research","display_name":"Design science research","score":0.4241662323474884},{"id":"https://openalex.org/keywords/information-system","display_name":"Information system","score":0.34033381938934326},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11199557781219482}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7753450870513916},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.7118123173713684},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.7036188840866089},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.5687791109085083},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5305032730102539},{"id":"https://openalex.org/C6604083","wikidata":"https://www.wikidata.org/wiki/Q376937","display_name":"Requirements engineering","level":3,"score":0.4955676794052124},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43891599774360657},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43056678771972656},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4247106909751892},{"id":"https://openalex.org/C2777655877","wikidata":"https://www.wikidata.org/wiki/Q3475740","display_name":"Design science research","level":3,"score":0.4241662323474884},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.34033381938934326},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11199557781219482},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/10662240610656483","is_oa":false,"landing_page_url":"https://doi.org/10.1108/10662240610656483","pdf_url":null,"source":{"id":"https://openalex.org/S63576417","display_name":"Internet Research","issn_l":"1066-2243","issn":["1066-2243","2054-5657"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Research","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W17971971","https://openalex.org/W72871095","https://openalex.org/W106918705","https://openalex.org/W604493865","https://openalex.org/W653005558","https://openalex.org/W1517234342","https://openalex.org/W1525616187","https://openalex.org/W1552489700","https://openalex.org/W1558430934","https://openalex.org/W1562199962","https://openalex.org/W1594674973","https://openalex.org/W1655958391","https://openalex.org/W1875598785","https://openalex.org/W1898015721","https://openalex.org/W1902515908","https://openalex.org/W1918077612","https://openalex.org/W1948417575","https://openalex.org/W1978884755","https://openalex.org/W2005708967","https://openalex.org/W2009172815","https://openalex.org/W2031618446","https://openalex.org/W2034727308","https://openalex.org/W2054716579","https://openalex.org/W2065554061","https://openalex.org/W2087811006","https://openalex.org/W2093988169","https://openalex.org/W2103647628","https://openalex.org/W2110157102","https://openalex.org/W2117818414","https://openalex.org/W2159269282","https://openalex.org/W2163022780","https://openalex.org/W2301605390","https://openalex.org/W2341111334","https://openalex.org/W2478602967","https://openalex.org/W2517638768","https://openalex.org/W2605401897","https://openalex.org/W2616332126","https://openalex.org/W3184218770","https://openalex.org/W6701979811"],"related_works":["https://openalex.org/W2101582069","https://openalex.org/W2127814706","https://openalex.org/W2994243660","https://openalex.org/W1622013556","https://openalex.org/W2719120829","https://openalex.org/W3157284269","https://openalex.org/W2118333568","https://openalex.org/W2675231964","https://openalex.org/W3161670349","https://openalex.org/W2182490965"],"abstract_inverted_index":{"Purpose":[0],"To":[1,128],"present":[2],"a":[3,32,42,60,90,101,135,139,155,185],"new":[4,156],"methodology":[5,35,157,183],"for":[6,25,46,63,142,158,176],"incorporating":[7],"privacy":[8,38,48,87,160,180],"requirements":[9,49,66,88,145,161],"into":[10,67],"the":[11,22,56,79,98,119,147,163,171,178],"system":[12,24,68,122],"design":[13,123,164],"process":[14],"called":[15],"PriS,":[16],"and":[17,53,59,125],"describe":[18],"its":[19],"applicability":[20,189],"in":[21,55,74],"e\u2010VOTE":[23],"presenting":[26],"methodology's":[27],"way\u2010of\u2010working.":[28],"Design/methodology/approach":[29],"PriS":[30,75,85,131,182],"is":[31,76,132],"requirement":[33,113],"engineering":[34,114],"focused":[36],"on":[37,78,97,190],"issues.":[39,181],"It":[40,166],"provides":[41],"set":[43],"of":[44,93,100,103,110,188],"concepts":[45],"modelling":[47],"(anonymity,":[50],"pseudonymity,":[51],"unlinkability":[52],"unobservability)":[54],"organisation":[57],"domain":[58],"systematic":[61],"way\u2010of\u2010working":[62],"translating":[64],"these":[65],"models.":[69],"The":[70],"conceptual":[71],"model":[72],"used":[73],"based":[77],"Enterprise":[80],"Knowledge":[81],"Development":[82],"(EKD)":[83],"framework.":[84],"models":[86],"as":[89,107,109,203],"special":[91],"type":[92],"goal.":[94],"Findings":[95],"Based":[96],"analysis":[99],"number":[102],"well\u2010known":[104],"privacy\u2010enhancing":[105],"technologies":[106],"well":[108],"existing":[111],"security":[112],"methodologies,":[115],"this":[116,129],"paper":[117,153],"pinpoints":[118],"gap":[120],"between":[121],"methodologies":[124],"technological":[126],"solutions.":[127],"end,":[130],"suggested,":[133],"with":[134,146],"view":[136],"to":[137,169,195],"providing":[138],"methodological":[140],"framework":[141],"matching":[143],"privacy\u2010related":[144],"proper":[148],"implementation":[149,174],"techniques.":[150],"Originality/value":[151],"This":[152],"proposes":[154],"addressing":[159],"during":[162],"process.":[165],"guides":[167],"developers":[168],"choose":[170],"most":[172],"appropriate":[173],"techniques":[175],"realising":[177],"identified":[179],"has":[184],"high":[186],"degree":[187],"Internet":[191],"systems":[192],"that":[193,198],"wish":[194],"provide":[196],"services":[197],"ensure":[199],"users":[200],"privacy,":[201],"such":[202],"anonymous":[204],"browsing,":[205],"untraceable":[206],"transactions,":[207],"etc.":[208]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
