Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform

PurposeGeneral data protection regulation (GDPR) entered into force in May 2018 for enhancing personal data protection. Even though GDPR leads toward many advantages for the data subjects it turned out to be a significant challenge. Organizations need to implement long and complex changes to become...

Full description

Saved in:
Bibliographic Details
Published inInformation and computer security Vol. 28; no. 4; pp. 531 - 553
Main Authors Tsohou, Aggeliki, Magkos, Emmanouil, Mouratidis, Haralambos, Chrysoloras, George, Piras, Luca, Pavlidis, Michalis, Debussche, Julien, Rotoloni, Marco, Gallego-Nicasio Crespo, Beatriz
Format Journal Article
LanguageEnglish
Published Bingley Emerald Group Publishing Limited 02.10.2020
Subjects
Online AccessGet full text

Cover

Loading…
Abstract PurposeGeneral data protection regulation (GDPR) entered into force in May 2018 for enhancing personal data protection. Even though GDPR leads toward many advantages for the data subjects it turned out to be a significant challenge. Organizations need to implement long and complex changes to become GDPR compliant. Data subjects are empowered with new rights, which, however, they need to become aware of. GDPR compliance is a challenging matter for the relevant stakeholders calls for a software platform that can support their needs. The aim of data governance for supporting GDPR (DEFeND) EU project is to deliver such a platform. The purpose of this paper is to describe the process, within the DEFeND EU project, for eliciting and analyzing requirements for such a complex platform.Design/methodology/approachThe platform needs to satisfy legal and privacy requirements and provide functionalities that data controllers request for supporting GDPR compliance. Further, it needs to satisfy acceptance requirements, for assuring that its users will embrace and use the platform. In this paper, the authors describe the methodology for eliciting and analyzing requirements for such a complex platform, by analyzing data attained by stakeholders from different sectors.FindingsThe findings provide the process for the DEFeND platform requirements’ elicitation and an indicative sample of those. The authors also describe the implementation of a secondary process for consolidating the elicited requirements into a consistent set of platform requirements.Practical implicationsThe proposed software engineering methodology and data collection tools (i.e. questionnaires) are expected to have a significant impact for software engineers in academia and industry.Social implicationsIt is reported repeatedly that data controllers face difficulties in complying with the GDPR. The study aims to offer mechanisms and tools that can assist organizations to comply with the GDPR, thus, offering a significant boost toward the European personal data protection objectives.Originality/valueThis is the first paper, according to the best of the authors’ knowledge, to provide software requirements for a GDPR compliance platform, including multiple perspectives.
AbstractList PurposeGeneral data protection regulation (GDPR) entered into force in May 2018 for enhancing personal data protection. Even though GDPR leads toward many advantages for the data subjects it turned out to be a significant challenge. Organizations need to implement long and complex changes to become GDPR compliant. Data subjects are empowered with new rights, which, however, they need to become aware of. GDPR compliance is a challenging matter for the relevant stakeholders calls for a software platform that can support their needs. The aim of data governance for supporting GDPR (DEFeND) EU project is to deliver such a platform. The purpose of this paper is to describe the process, within the DEFeND EU project, for eliciting and analyzing requirements for such a complex platform.Design/methodology/approachThe platform needs to satisfy legal and privacy requirements and provide functionalities that data controllers request for supporting GDPR compliance. Further, it needs to satisfy acceptance requirements, for assuring that its users will embrace and use the platform. In this paper, the authors describe the methodology for eliciting and analyzing requirements for such a complex platform, by analyzing data attained by stakeholders from different sectors.FindingsThe findings provide the process for the DEFeND platform requirements’ elicitation and an indicative sample of those. The authors also describe the implementation of a secondary process for consolidating the elicited requirements into a consistent set of platform requirements.Practical implicationsThe proposed software engineering methodology and data collection tools (i.e. questionnaires) are expected to have a significant impact for software engineers in academia and industry.Social implicationsIt is reported repeatedly that data controllers face difficulties in complying with the GDPR. The study aims to offer mechanisms and tools that can assist organizations to comply with the GDPR, thus, offering a significant boost toward the European personal data protection objectives.Originality/valueThis is the first paper, according to the best of the authors’ knowledge, to provide software requirements for a GDPR compliance platform, including multiple perspectives.
Author Gallego-Nicasio Crespo, Beatriz
Chrysoloras, George
Rotoloni, Marco
Magkos, Emmanouil
Mouratidis, Haralambos
Pavlidis, Michalis
Piras, Luca
Debussche, Julien
Tsohou, Aggeliki
Author_xml – sequence: 1
  givenname: Aggeliki
  surname: Tsohou
  fullname: Tsohou, Aggeliki
– sequence: 2
  givenname: Emmanouil
  surname: Magkos
  fullname: Magkos, Emmanouil
– sequence: 3
  givenname: Haralambos
  surname: Mouratidis
  fullname: Mouratidis, Haralambos
– sequence: 4
  givenname: George
  surname: Chrysoloras
  fullname: Chrysoloras, George
– sequence: 5
  givenname: Luca
  surname: Piras
  fullname: Piras, Luca
– sequence: 6
  givenname: Michalis
  surname: Pavlidis
  fullname: Pavlidis, Michalis
– sequence: 7
  givenname: Julien
  surname: Debussche
  fullname: Debussche, Julien
– sequence: 8
  givenname: Marco
  surname: Rotoloni
  fullname: Rotoloni, Marco
– sequence: 9
  givenname: Beatriz
  surname: Gallego-Nicasio Crespo
  fullname: Gallego-Nicasio Crespo, Beatriz
BookMark eNp1kE1LAzEQhoMoWGvvHhe8ujrZ7GY3R6laCwWLH-AthGy2pqTJNknF_nvTVjwInmaYed4ZeM7QsXVWIXSB4RpjaG6m45cccF5AATkAFEdoUEBF85LV78e_PcWnaBTCMhGYYUooHqCvudefQm6vsqDkxuuYOqMWwmTCtllU8sM64xbbTEip-iisVJkyWuqo2j0inQ3O6FbsBl6tN9qrlbIxZJ3zmcgmd_PnBK16o_fh3oiYNqtzdNIJE9Topw7R28P96_gxnz1NpuPbWS5JRWLOSFWzktBGdtDUBSEArAMKpIVSNlAqVjcJkVgKUbeAG8ZouZ9I1UjByBBdHu723q03KkS-dBtv00telGVdYVrRMlFwoKR3IXjV8d7rlfBbjoHvFPOkmAPmO8V8pzhF6J9IkiKidjZ6oc3_wW-B7YGl
CitedBy_id crossref_primary_10_1007_s00766_024_00428_z
crossref_primary_10_1080_12460125_2022_2073637
crossref_primary_10_1016_j_jisa_2024_103741
crossref_primary_10_1007_s11042_024_20308_6
crossref_primary_10_1016_j_infsof_2024_107622
crossref_primary_10_1108_DPRG_07_2023_0105
crossref_primary_10_1007_s13132_024_02099_1
crossref_primary_10_20473_mi_v7i3_55931
Cites_doi 10.1080/1097198X.2019.1569186
10.1006/ijhc.2001.0503
10.1016/j.clsr.2017.03.027
10.1017/S0269888905000299
10.1016/j.asoc.2010.10.012
10.1007/s00766-009-0094-8
10.1142/S0218194007003240
10.1007/s00766-010-0115-7
10.1080/01972243.2019.1583296
10.1016/j.infoandorg.2006.11.001
ContentType Journal Article
Copyright Emerald Publishing Limited 2020
Copyright_xml – notice: Emerald Publishing Limited 2020
DBID AAYXX
CITATION
0-V
0U~
1-H
7SC
7WY
7WZ
7XB
8AO
8FD
8FE
8FG
8FI
ABUWG
AFKRA
ALSLI
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
BGRYB
CCPQU
CNYFK
DWQXO
E3H
F2A
FYUFA
F~G
GNUQQ
HCIFZ
JQ2
K6~
K7-
L.-
L.0
L7M
L~C
L~D
M0C
M0N
M0O
M0T
M1O
P5Z
P62
PHGZM
PHGZT
PJZUB
PKEHL
PPXIY
PQBIZ
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PRQQA
PYYUZ
Q9U
DOI 10.1108/ICS-01-2020-0002
DatabaseName CrossRef
ProQuest Social Sciences Premium Collection【Remote access available】
Global News & ABI/Inform Professional
Trade PRO
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Hospital Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Social Science Premium Collection
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
Technology Collection
Criminology Collection
ProQuest One Community College
ProQuest Library & Information Science Collection
ProQuest Central
Library & Information Sciences Abstracts (LISA)
Library & Information Science Abstracts (LISA)
Health Research Premium Collection
ABI/INFORM Global (Corporate)
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
ABI/INFORM Professional Standard
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
Criminal Justice Database
Healthcare Administration Database
ProQuest Library Science Database (NC LIVE)
ProQuest Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Business
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest One Social Sciences
ABI/INFORM Collection China
ProQuest Central Basic
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Library and Information Science Abstracts (LISA)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
SciTech Premium Collection
Trade PRO
ProQuest Central China
ABI/INFORM Complete
Global News & ABI/Inform Professional
ProQuest One Applied & Life Sciences
Health Research Premium Collection
Health & Medical Research Collection
Library & Information Science Collection
ProQuest Central (New)
Advanced Technologies & Aerospace Collection
Business Premium Collection
Social Science Premium Collection
ABI/INFORM Global
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
ProQuest Technology Collection
ProQuest Business Collection
Criminology Collection
ProQuest Social Sciences Premium Collection
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ABI/INFORM Global (Corporate)
ProQuest One Business
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Pharma Collection
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest Library Science
ProQuest Criminal Justice
ABI/INFORM Professional Standard
ProQuest Central Korea
Advanced Technologies Database with Aerospace
ProQuest Computing
ProQuest One Social Sciences
ProQuest Central Basic
ProQuest Health Management
ABI/INFORM China
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
DatabaseTitleList Computer Science Database
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
Library & Information Science
Business
EISSN 2056-497X
EndPage 553
ExternalDocumentID 10_1108_ICS_01_2020_0002
GeographicLocations United Kingdom--UK
Europe
GeographicLocations_xml – name: United Kingdom--UK
– name: Europe
GroupedDBID .WU
0-V
3FY
5VS
7WY
8AO
8FE
8FG
8FI
8FW
9F-
AAGBP
AAKOT
AAMCF
AAUDR
AAXBI
AAYXX
ABIJV
ABJNI
ABSDC
ABUWG
ABXQL
ABYQI
ACGFS
ACTSA
ACZKX
ADBBV
ADOMW
ADQHX
ADWNT
AFKRA
AFNTC
AFZLO
AGTVX
AHMHQ
AILOG
AJEBP
ALIPV
ALMA_UNASSIGNED_HOLDINGS
ALSLI
AODMV
AQUVI
ARALO
ARAPS
AUCOK
AZQEC
BENPR
BEZIV
BGLVJ
BGRYB
BPHCQ
BVXVI
CCPQU
CITATION
CNYFK
DWQXO
EBS
ECCUG
FNNZZ
FYUFA
GEA
GEI
GMX
GNUQQ
GQ.
H13
HCIFZ
K6V
K6~
K7-
KBGRL
M0C
M0O
M0T
M1O
M42
P62
PHGZM
PHGZT
PJZUB
PPXIY
PQBIZ
PQGLB
PQQKQ
PROAC
PRQQA
SCAQC
SDURG
SLOBJ
TEM
TGG
TMF
TMI
TMT
UKHRP
Z11
Z12
Z21
ZYZAG
.DC
0U~
1-H
29I
4.4
5GY
70U
77K
7SC
7XB
8FD
8R4
8R5
9E0
AAPSD
ABEAN
ACGFO
AEBZA
AEDOK
AEMMR
AETHF
AFNZV
AIAFM
AJFKA
APPLU
ATGMP
CS3
DU5
E3H
F2A
GEB
GEC
GMM
GMN
J1Y
JI-
JL0
JQ2
L.-
L.0
L7M
L~C
L~D
M0N
P2P
PKEHL
PQEST
PQUKI
PRINS
Q2X
Q3A
Q9U
RWL
TAE
TDQ
TET
TMD
TMK
TMX
Z22
ID FETCH-LOGICAL-c353t-935794368cf087233009f0603d04c804e978357c1caa7d01899648357cce8ca93
IEDL.DBID GEI
ISSN 2056-4961
IngestDate Mon Jun 30 14:33:41 EDT 2025
Thu Jul 31 00:45:45 EDT 2025
Thu Apr 24 22:59:30 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License https://www.emerald.com/insight/site-policies
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c353t-935794368cf087233009f0603d04c804e978357c1caa7d01899648357cce8ca93
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://rgu-repository.worktribe.com/output/1003519
PQID 2447516564
PQPubID 31135
PageCount 23
ParticipantIDs proquest_journals_2447516564
crossref_primary_10_1108_ICS_01_2020_0002
crossref_citationtrail_10_1108_ICS_01_2020_0002
PublicationCentury 2000
PublicationDate 2020-10-02
PublicationDateYYYYMMDD 2020-10-02
PublicationDate_xml – month: 10
  year: 2020
  text: 2020-10-02
  day: 02
PublicationDecade 2020
PublicationPlace Bingley
PublicationPlace_xml – name: Bingley
PublicationTitle Information and computer security
PublicationYear 2020
Publisher Emerald Group Publishing Limited
Publisher_xml – name: Emerald Group Publishing Limited
References (key2020100112345107900_ref001) 2019; 35
(key2020100112345107900_ref011) 2019
(key2020100112345107900_ref018) 2008; 4
(key2020100112345107900_ref016) 2018
(key2020100112345107900_ref026) 2019
key2020100112345107900_ref013
key2020100112345107900_ref035
key2020100112345107900_ref012
key2020100112345107900_ref034
(key2020100112345107900_ref037) 2017; 33
(key2020100112345107900_ref011b) 2010; 15
key2020100112345107900_ref036
(key2020100112345107900_ref019) 2001; 55
(key2020100112345107900_ref015) 2011; 11
(key2020100112345107900_ref017) 2019; 22
key2020100112345107900_ref010
(key2020100112345107900_ref031) 2016
(key2020100112345107900_ref029) 2017
(key2020100112345107900_ref039) 2005; 20
(key2020100112345107900_ref022) 2007; 17
(key2020100112345107900_ref009) 2014
(key2020100112345107900_ref024) 2012
key2020100112345107900_ref011c
(key2020100112345107900_ref003) 2007
(key2020100112345107900_ref020) 2018
(key2020100112345107900_ref030) 2019
(key2020100112345107900_ref040) 2019
(key2020100112345107900_ref006) 2006
(key2020100112345107900_ref002) 2019
key2020100112345107900_ref005
key2020100112345107900_ref027
key2020100112345107900_ref008
(key2020100112345107900_ref025) 2011
(key2020100112345107900_ref032) 2018; 4
(key2020100112345107900_ref011a) 2015
(key2020100112345107900_ref007) 2011; 16
(key2020100112345107900_ref004) 2008
(key2020100112345107900_ref021) 2007; 17
(key2020100112345107900_ref014) 2006
(key2020100112345107900_ref038) 2019
(key2020100112345107900_ref028) 2017
(key2020100112345107900_ref023) 2015
(key2020100112345107900_ref033) 2018
References_xml – volume: 22
  start-page: 1
  issue: 1
  year: 2019
  ident: key2020100112345107900_ref017
  article-title: The impact of GDPR on global technology development
  publication-title: Journal of Global Information Technology Management
  doi: 10.1080/1097198X.2019.1569186
– volume-title: Four Steps to the Epiphany: Successful Strategies for Products That Win
  year: 2007
  ident: key2020100112345107900_ref003
– volume: 4
  issue: 1
  year: 2018
  ident: key2020100112345107900_ref032
  article-title: Forgetting personal data and revoking consent under the GDPR: challenges and proposed solutions
  publication-title: Journal of Cybersecurity
– ident: key2020100112345107900_ref008
– start-page: 311
  volume-title: International Conference on Software Technologies
  year: 2014
  ident: key2020100112345107900_ref009
  article-title: Problem-based security requirements elicitation and refinement with pressure
– ident: key2020100112345107900_ref027
– ident: key2020100112345107900_ref035
– ident: key2020100112345107900_ref010
– ident: key2020100112345107900_ref012
– ident: key2020100112345107900_ref011c
– volume-title: 36th International Conference on Conceptual Modeling (ER)
  year: 2017
  ident: key2020100112345107900_ref029
  article-title: Goal models for acceptance requirements analysis and gamification design
– volume-title: 24th IEEE International Requirements Engineering Conference (RE), IEEE
  year: 2016
  ident: key2020100112345107900_ref031
  article-title: Acceptance requirements and their gamification solutions
– volume-title: 11th IEEE International Conference on Research Challenges in Information Science (RCIS), IEEE
  year: 2017
  ident: key2020100112345107900_ref028
  article-title: Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques
– volume: 55
  start-page: 587
  issue: 4
  year: 2001
  ident: key2020100112345107900_ref019
  article-title: Methods to support human-centred design
  publication-title: International Journal of Human-Computer Studies
  doi: 10.1006/ijhc.2001.0503
– start-page: 108
  volume-title: 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), IEEE
  year: 2018
  ident: key2020100112345107900_ref020
  article-title: Methods and tools for GDPR compliance through privacy and data protection engineering
– volume: 33
  start-page: 434
  issue: 4
  year: 2017
  ident: key2020100112345107900_ref037
  article-title: Enabling valid informed consent for location tracking through privacy awareness of users: a process theory
  publication-title: Computer Law and Security Review
  doi: 10.1016/j.clsr.2017.03.027
– start-page: 151
  volume-title: 2015 IEEE Security and Privacy Workshop, IEEE
  year: 2015
  ident: key2020100112345107900_ref023
  article-title: PRIPARE: integrating privacy best practices into a privacy engineering methodology
– volume: 20
  start-page: 1
  issue: 1
  year: 2005
  ident: key2020100112345107900_ref039
  article-title: Methods and techniques for the evaluation of user-adaptive systems
  publication-title: The Knowledge Engineering Review
  doi: 10.1017/S0269888905000299
– ident: key2020100112345107900_ref005
– volume: 11
  start-page: 4341
  issue: 7
  year: 2011
  ident: key2020100112345107900_ref015
  article-title: A soft computing approach for privacy requirements engineering: the PriS framework
  publication-title: Applied Soft Computing
  doi: 10.1016/j.asoc.2010.10.012
– start-page: 89
  volume-title: CAiSE Forum
  year: 2011
  ident: key2020100112345107900_ref025
  article-title: SecTro: a CASE tool for modelling security in requirements engineering using secure tropos
– volume-title: 16th International Conference on Trust, Privacy and Security in Digital Business-TrustBus
  year: 2019
  ident: key2020100112345107900_ref026
  article-title: DEFeND architecture: a privacy by design platform for GDPR compliance
– volume: 15
  start-page: 1
  issue: 1
  year: 2010
  ident: key2020100112345107900_ref011b
  article-title: Guest editorial: security requirements engineering: past, present and future
  publication-title: Requirements Engineering
  doi: 10.1007/s00766-009-0094-8
– volume: 4
  start-page: 543
  year: 2008
  ident: key2020100112345107900_ref018
  article-title: The cost of reading privacy policies
  publication-title: ISJLP
– volume: 17
  start-page: 285
  issue: 2
  year: 2007
  ident: key2020100112345107900_ref021
  article-title: Secure Tropos: a security-oriented extension of the tropos methodology
  publication-title: International Journal of Software Engineering and Knowledge Engineering
  doi: 10.1142/S0218194007003240
– volume: 16
  start-page: 3
  issue: 1
  year: 2011
  ident: key2020100112345107900_ref007
  article-title: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
  publication-title: Requirements Engineering
  doi: 10.1007/s00766-010-0115-7
– ident: key2020100112345107900_ref034
– start-page: 3
  volume-title: Nordic Conference on Secure IT Systems
  year: 2019
  ident: key2020100112345107900_ref002
  article-title: Privacy impact assessment: comparing methodologies with a focus on practicality
– ident: key2020100112345107900_ref013
– volume-title: 13th IEEE International Conference on Research Challenges in Information Science (RCIS), IEEE
  year: 2019
  ident: key2020100112345107900_ref030
  article-title: Design thinking and acceptance requirements for designing gamified software
– volume: 35
  start-page: 122
  issue: 3
  year: 2019
  ident: key2020100112345107900_ref001
  article-title: Engineering privacy by design: are engineers ready to live up to the challenge?
  publication-title: The Information Society
  doi: 10.1080/01972243.2019.1583296
– year: 2015
  ident: key2020100112345107900_ref011a
  article-title: Privacy and data protection by design – from policy to engineering
  publication-title: European Union Agency for Network and Information Security (ENISA)
– start-page: 179
  volume-title: 14th IEEE International Requirements Engineering Conference (RE’06), IEEE
  year: 2006
  ident: key2020100112345107900_ref006
  article-title: Effectiveness of requirements elicitation techniques: empirical results derived from a systematic review
– year: 2018
  ident: key2020100112345107900_ref016
  article-title: Privacy by design to comply with GDPR: a review on third-party data processors
– start-page: 190
  volume-title: 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), IEEE
  year: 2018
  ident: key2020100112345107900_ref033
  article-title: Strategy and solution to comply with GDPR: guideline to comply major articles and save a penalty from non-compliance
– start-page: 1
  year: 2019
  ident: key2020100112345107900_ref011
  article-title: GDPR compliance in cybersecurity software: a case study of DPIA in information sharing platform
– volume: 17
  start-page: 2
  issue: 1
  year: 2007
  ident: key2020100112345107900_ref022
  article-title: The qualitative interview in is research: examining the craft
  publication-title: Information and Organization
  doi: 10.1016/j.infoandorg.2006.11.001
– volume-title: Social Research Methods
  year: 2008
  ident: key2020100112345107900_ref004
– ident: key2020100112345107900_ref036
– start-page: 1
  volume-title: 2019 13th International Conference on Research Challenges in Information Science (RCIS)
  year: 2019
  ident: key2020100112345107900_ref038
  article-title: GDPR compliance in the design of the INFORM e-learning platform: a case study
– volume-title: 3rd International Workshop on SECurity and Privacy Requirements Engineering (SECPRE 2019)
  year: 2019
  ident: key2020100112345107900_ref040
  article-title: Privacy, security, legal and technology acceptance requirements for a GDPR compliance platform
– start-page: 95
  volume-title: International Conference on Advanced Information Systems Engineering
  year: 2012
  ident: key2020100112345107900_ref024
  article-title: A CASE tool to support automated modelling and analysis of security requirements, based on secure tropos
– start-page: 179
  volume-title: 14th IEEE International Requirements Engineering Conference (RE’06)(RE)
  year: 2006
  ident: key2020100112345107900_ref014
  article-title: Effectiveness of requirements elicitation techniques: empirical results derived from a systematic review
SSID ssj0001916361
ssj0004345
Score 2.3239508
Snippet PurposeGeneral data protection regulation (GDPR) entered into force in May 2018 for enhancing personal data protection. Even though GDPR leads toward many...
SourceID proquest
crossref
SourceType Aggregation Database
Enrichment Source
Index Database
StartPage 531
SubjectTerms Compliance
Computer privacy
Consent
Controllers
Data collection
Data integrity
General Data Protection Regulation
Methodology
Organizations
Personal information
Privacy
Software engineering
Technology utilization
User needs
User satisfaction
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1bS8MwFA46QXwRrzh1kgcRBMvSJmnTJ9F5B2V4Ad9KepLCYMy5VdF_b06WTnzxtU1oyTk5l-_cCDkUaRmbTJtIVQjdCCmjUmuIKpHoTAI4qxcB_fuH9OZF3L3K1wC4TUNaZSMTvaA2b4AYeTfBznTYKkacjt8jnBqF0dUwQmORLDkRrFSLLJ1fPvQffysjuR9TnDg1H4k8jZtAJVPd294TutIJ-k-sgVXmiumvXPbK5mqNrAYrkZ7NyLpOFuxogyw3SeobpBPKDegRDfVEeL40XNRN8tWfDD41fJ_QaZhPd0KH1ikDqkeG1nM4nWrAtBakPLXDAaD96Zc4L9kx5QDhAEMnFtOFPY44pe5rVNPri_4jnaWj-83joa7xP7bIy9Xlc-8mCjMWIuCS11HOJbaISxVUTGUJ587mqljKuGECFBPWQ0MZxKB1Zljs3LNU-CdgFeicb5PW6G1kdwiVRnNZKWEgBSGVzbWSGjKrsaVYWeZt0m0OuIDQgBznYAwL74gwVTiSFCwukCQYFE_a5Hi-YzxrvvHP2v2GZkW4htPil2l2_3-9R1Y8I2BmQLJPWvXkw3actVGXB4GlfgANN9Ju
  priority: 102
  providerName: ProQuest
Title Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform
URI https://www.proquest.com/docview/2447516564
Volume 28
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT9wwEB4BvfQCbSniufKhl0qETWI7cY68dqES2xUUiXKJnImjrhoC2g2o8OvxOMlKVFUlJC45WLbl2OPxzOfxNwBfRJQFeaxzTxUE3QgpvUxr9AoR6lgiWquXAP2zUXRyKb5dyasFGHVvYVxYZQPHOD09qWbkpPYpcNtq4TnhAGWvOT28IGc4JA-IdnafEOv-r_qmXLSSLuPu6W-HuFhLiDsC1dCe-p5IoqC7t_xHZy_PqZdq2p09gxW47UbdhJz83ruvsz18-ovQ8e1-6wMst2Yq22_k6iMsmOoTrHQpIFirEVbhz3g6edD4uMtmbSK8XVYae-owXeWsnuP2TCPFz5CIMVNOkAxdV8UOzUr_hHCHnE0NxSU7wHLGrDXNNBsejc9ZE_fuGt-VuiY7-zNcDo5_HJ54bTIHD7nktZdwSVx0kcLCV3HIuTXuCj_yee4LVL4wDoOKMUCt49wPrB8YCVeCRqFO-BosVbeVWQcmc81loUSOEQqpTKKV1BgbTdxlWZZsQL9buhRbpnNKuFGmzuPxVWqnOPWDlKaYbt_DDfg6b3HXsHz8p-52Jw1pu99naUi8iURkJDZf0dUWvHerTPEI4TYs1dN7s2NtnDrrwaIaDHvw7uB4ND7vOUG237Pguy27_nm9P3wG70r60w
linkProvider Emerald
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwEB4hKpVeUEupyqv1oUVCIlrHsRPngBCCLrvlIdSCxC11xo600mpZdkMLf4rfiMebLOqFG9fEViLPeB7fvAC-ybSMbWZspCuCbqRSUWkMRpUUJlOI3uolQP_sPO1dyZ_X6noBHttaGEqrbGViENT2Bgkj7wjqTEetYuT--DaiqVEUXW1HaMzY4sQ9_PMu23Svf-Tp-12I7o_Lw17UTBWIMFFJHeWJoqZoqcaK60x4f57nFU95YrlEzaULYEiGMRqTWR57hySV4Qk6jYaaL3mR_0YmXpNTZXr3-LkOMwlDkYU3KiKZp3EbFuW60z_8TY67IG-NtyDOXA3-rwWCauu-h-XGJmUHMyb6AAtutAJv25T4FdhqihvYNmuql4iarBELH-H-YjL4a_Bhl02baXi7bOi86mFmZFk9B--ZQUqiIT5jbjhAsnbDEu-T-yswIPDBsomj5OSAWk6Z_xoz7Pjo4hebJb-HzeOhqek_VuHqVc7-EyyObkbuMzBlTaIqLS2mKJV2udHKYOYMNTAry3wNOu0BF9i0O6epG8MiuD1cF54kBY8LIgmF4MUa7Mx3jGetPl5Yu9nSrGgu_bR4ZtH1l19_haXe5dlpcdo_P9mAd4EpKCdBbMJiPblzW97OqcsvgbkY_Hltbn4CcF0K-Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Privacy%2C+security%2C+legal+and+technology+acceptance+elicited+and+consolidated+requirements+for+a+GDPR+compliance+platform&rft.jtitle=Information+and+computer+security&rft.au=Tsohou%2C+Aggeliki&rft.au=Magkos%2C+Emmanouil&rft.au=Mouratidis%2C+Haralambos&rft.au=Chrysoloras%2C+George&rft.date=2020-10-02&rft.issn=2056-4961&rft.volume=28&rft.issue=4&rft.spage=531&rft.epage=553&rft_id=info:doi/10.1108%2FICS-01-2020-0002&rft.externalDBID=n%2Fa&rft.externalDocID=10_1108_ICS_01_2020_0002
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon