Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform
PurposeGeneral data protection regulation (GDPR) entered into force in May 2018 for enhancing personal data protection. Even though GDPR leads toward many advantages for the data subjects it turned out to be a significant challenge. Organizations need to implement long and complex changes to become...
Saved in:
Published in | Information and computer security Vol. 28; no. 4; pp. 531 - 553 |
---|---|
Main Authors | , , , , , , , , |
Format | Journal Article |
Language | English |
Published |
Bingley
Emerald Group Publishing Limited
02.10.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | PurposeGeneral data protection regulation (GDPR) entered into force in May 2018 for enhancing personal data protection. Even though GDPR leads toward many advantages for the data subjects it turned out to be a significant challenge. Organizations need to implement long and complex changes to become GDPR compliant. Data subjects are empowered with new rights, which, however, they need to become aware of. GDPR compliance is a challenging matter for the relevant stakeholders calls for a software platform that can support their needs. The aim of data governance for supporting GDPR (DEFeND) EU project is to deliver such a platform. The purpose of this paper is to describe the process, within the DEFeND EU project, for eliciting and analyzing requirements for such a complex platform.Design/methodology/approachThe platform needs to satisfy legal and privacy requirements and provide functionalities that data controllers request for supporting GDPR compliance. Further, it needs to satisfy acceptance requirements, for assuring that its users will embrace and use the platform. In this paper, the authors describe the methodology for eliciting and analyzing requirements for such a complex platform, by analyzing data attained by stakeholders from different sectors.FindingsThe findings provide the process for the DEFeND platform requirements’ elicitation and an indicative sample of those. The authors also describe the implementation of a secondary process for consolidating the elicited requirements into a consistent set of platform requirements.Practical implicationsThe proposed software engineering methodology and data collection tools (i.e. questionnaires) are expected to have a significant impact for software engineers in academia and industry.Social implicationsIt is reported repeatedly that data controllers face difficulties in complying with the GDPR. The study aims to offer mechanisms and tools that can assist organizations to comply with the GDPR, thus, offering a significant boost toward the European personal data protection objectives.Originality/valueThis is the first paper, according to the best of the authors’ knowledge, to provide software requirements for a GDPR compliance platform, including multiple perspectives. |
---|---|
AbstractList | PurposeGeneral data protection regulation (GDPR) entered into force in May 2018 for enhancing personal data protection. Even though GDPR leads toward many advantages for the data subjects it turned out to be a significant challenge. Organizations need to implement long and complex changes to become GDPR compliant. Data subjects are empowered with new rights, which, however, they need to become aware of. GDPR compliance is a challenging matter for the relevant stakeholders calls for a software platform that can support their needs. The aim of data governance for supporting GDPR (DEFeND) EU project is to deliver such a platform. The purpose of this paper is to describe the process, within the DEFeND EU project, for eliciting and analyzing requirements for such a complex platform.Design/methodology/approachThe platform needs to satisfy legal and privacy requirements and provide functionalities that data controllers request for supporting GDPR compliance. Further, it needs to satisfy acceptance requirements, for assuring that its users will embrace and use the platform. In this paper, the authors describe the methodology for eliciting and analyzing requirements for such a complex platform, by analyzing data attained by stakeholders from different sectors.FindingsThe findings provide the process for the DEFeND platform requirements’ elicitation and an indicative sample of those. The authors also describe the implementation of a secondary process for consolidating the elicited requirements into a consistent set of platform requirements.Practical implicationsThe proposed software engineering methodology and data collection tools (i.e. questionnaires) are expected to have a significant impact for software engineers in academia and industry.Social implicationsIt is reported repeatedly that data controllers face difficulties in complying with the GDPR. The study aims to offer mechanisms and tools that can assist organizations to comply with the GDPR, thus, offering a significant boost toward the European personal data protection objectives.Originality/valueThis is the first paper, according to the best of the authors’ knowledge, to provide software requirements for a GDPR compliance platform, including multiple perspectives. |
Author | Gallego-Nicasio Crespo, Beatriz Chrysoloras, George Rotoloni, Marco Magkos, Emmanouil Mouratidis, Haralambos Pavlidis, Michalis Piras, Luca Debussche, Julien Tsohou, Aggeliki |
Author_xml | – sequence: 1 givenname: Aggeliki surname: Tsohou fullname: Tsohou, Aggeliki – sequence: 2 givenname: Emmanouil surname: Magkos fullname: Magkos, Emmanouil – sequence: 3 givenname: Haralambos surname: Mouratidis fullname: Mouratidis, Haralambos – sequence: 4 givenname: George surname: Chrysoloras fullname: Chrysoloras, George – sequence: 5 givenname: Luca surname: Piras fullname: Piras, Luca – sequence: 6 givenname: Michalis surname: Pavlidis fullname: Pavlidis, Michalis – sequence: 7 givenname: Julien surname: Debussche fullname: Debussche, Julien – sequence: 8 givenname: Marco surname: Rotoloni fullname: Rotoloni, Marco – sequence: 9 givenname: Beatriz surname: Gallego-Nicasio Crespo fullname: Gallego-Nicasio Crespo, Beatriz |
BookMark | eNp1kE1LAzEQhoMoWGvvHhe8ujrZ7GY3R6laCwWLH-AthGy2pqTJNknF_nvTVjwInmaYed4ZeM7QsXVWIXSB4RpjaG6m45cccF5AATkAFEdoUEBF85LV78e_PcWnaBTCMhGYYUooHqCvudefQm6vsqDkxuuYOqMWwmTCtllU8sM64xbbTEip-iisVJkyWuqo2j0inQ3O6FbsBl6tN9qrlbIxZJ3zmcgmd_PnBK16o_fh3oiYNqtzdNIJE9Topw7R28P96_gxnz1NpuPbWS5JRWLOSFWzktBGdtDUBSEArAMKpIVSNlAqVjcJkVgKUbeAG8ZouZ9I1UjByBBdHu723q03KkS-dBtv00telGVdYVrRMlFwoKR3IXjV8d7rlfBbjoHvFPOkmAPmO8V8pzhF6J9IkiKidjZ6oc3_wW-B7YGl |
CitedBy_id | crossref_primary_10_1007_s00766_024_00428_z crossref_primary_10_1080_12460125_2022_2073637 crossref_primary_10_1016_j_jisa_2024_103741 crossref_primary_10_1007_s11042_024_20308_6 crossref_primary_10_1016_j_infsof_2024_107622 crossref_primary_10_1108_DPRG_07_2023_0105 crossref_primary_10_1007_s13132_024_02099_1 crossref_primary_10_20473_mi_v7i3_55931 |
Cites_doi | 10.1080/1097198X.2019.1569186 10.1006/ijhc.2001.0503 10.1016/j.clsr.2017.03.027 10.1017/S0269888905000299 10.1016/j.asoc.2010.10.012 10.1007/s00766-009-0094-8 10.1142/S0218194007003240 10.1007/s00766-010-0115-7 10.1080/01972243.2019.1583296 10.1016/j.infoandorg.2006.11.001 |
ContentType | Journal Article |
Copyright | Emerald Publishing Limited 2020 |
Copyright_xml | – notice: Emerald Publishing Limited 2020 |
DBID | AAYXX CITATION 0-V 0U~ 1-H 7SC 7WY 7WZ 7XB 8AO 8FD 8FE 8FG 8FI ABUWG AFKRA ALSLI ARAPS AZQEC BENPR BEZIV BGLVJ BGRYB CCPQU CNYFK DWQXO E3H F2A FYUFA F~G GNUQQ HCIFZ JQ2 K6~ K7- L.- L.0 L7M L~C L~D M0C M0N M0O M0T M1O P5Z P62 PHGZM PHGZT PJZUB PKEHL PPXIY PQBIZ PQEST PQGLB PQQKQ PQUKI PRINS PRQQA PYYUZ Q9U |
DOI | 10.1108/ICS-01-2020-0002 |
DatabaseName | CrossRef ProQuest Social Sciences Premium Collection【Remote access available】 Global News & ABI/Inform Professional Trade PRO Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Hospital Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Social Science Premium Collection Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Business Premium Collection Technology Collection Criminology Collection ProQuest One Community College ProQuest Library & Information Science Collection ProQuest Central Library & Information Sciences Abstracts (LISA) Library & Information Science Abstracts (LISA) Health Research Premium Collection ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced ABI/INFORM Professional Standard Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Criminal Justice Database Healthcare Administration Database ProQuest Library Science Database (NC LIVE) ProQuest Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Business ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest One Social Sciences ABI/INFORM Collection China ProQuest Central Basic |
DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Library and Information Science Abstracts (LISA) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts SciTech Premium Collection Trade PRO ProQuest Central China ABI/INFORM Complete Global News & ABI/Inform Professional ProQuest One Applied & Life Sciences Health Research Premium Collection Health & Medical Research Collection Library & Information Science Collection ProQuest Central (New) Advanced Technologies & Aerospace Collection Business Premium Collection Social Science Premium Collection ABI/INFORM Global ProQuest One Academic Eastern Edition ProQuest Hospital Collection ProQuest Technology Collection ProQuest Business Collection Criminology Collection ProQuest Social Sciences Premium Collection ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ABI/INFORM Global (Corporate) ProQuest One Business Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Pharma Collection ProQuest Central ABI/INFORM Professional Advanced ProQuest Library Science ProQuest Criminal Justice ABI/INFORM Professional Standard ProQuest Central Korea Advanced Technologies Database with Aerospace ProQuest Computing ProQuest One Social Sciences ProQuest Central Basic ProQuest Health Management ABI/INFORM China ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database |
DatabaseTitleList | Computer Science Database |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science Library & Information Science Business |
EISSN | 2056-497X |
EndPage | 553 |
ExternalDocumentID | 10_1108_ICS_01_2020_0002 |
GeographicLocations | United Kingdom--UK Europe |
GeographicLocations_xml | – name: United Kingdom--UK – name: Europe |
GroupedDBID | .WU 0-V 3FY 5VS 7WY 8AO 8FE 8FG 8FI 8FW 9F- AAGBP AAKOT AAMCF AAUDR AAXBI AAYXX ABIJV ABJNI ABSDC ABUWG ABXQL ABYQI ACGFS ACTSA ACZKX ADBBV ADOMW ADQHX ADWNT AFKRA AFNTC AFZLO AGTVX AHMHQ AILOG AJEBP ALIPV ALMA_UNASSIGNED_HOLDINGS ALSLI AODMV AQUVI ARALO ARAPS AUCOK AZQEC BENPR BEZIV BGLVJ BGRYB BPHCQ BVXVI CCPQU CITATION CNYFK DWQXO EBS ECCUG FNNZZ FYUFA GEA GEI GMX GNUQQ GQ. H13 HCIFZ K6V K6~ K7- KBGRL M0C M0O M0T M1O M42 P62 PHGZM PHGZT PJZUB PPXIY PQBIZ PQGLB PQQKQ PROAC PRQQA SCAQC SDURG SLOBJ TEM TGG TMF TMI TMT UKHRP Z11 Z12 Z21 ZYZAG .DC 0U~ 1-H 29I 4.4 5GY 70U 77K 7SC 7XB 8FD 8R4 8R5 9E0 AAPSD ABEAN ACGFO AEBZA AEDOK AEMMR AETHF AFNZV AIAFM AJFKA APPLU ATGMP CS3 DU5 E3H F2A GEB GEC GMM GMN J1Y JI- JL0 JQ2 L.- L.0 L7M L~C L~D M0N P2P PKEHL PQEST PQUKI PRINS Q2X Q3A Q9U RWL TAE TDQ TET TMD TMK TMX Z22 |
ID | FETCH-LOGICAL-c353t-935794368cf087233009f0603d04c804e978357c1caa7d01899648357cce8ca93 |
IEDL.DBID | GEI |
ISSN | 2056-4961 |
IngestDate | Mon Jun 30 14:33:41 EDT 2025 Thu Jul 31 00:45:45 EDT 2025 Thu Apr 24 22:59:30 EDT 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
License | https://www.emerald.com/insight/site-policies |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c353t-935794368cf087233009f0603d04c804e978357c1caa7d01899648357cce8ca93 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
OpenAccessLink | https://rgu-repository.worktribe.com/output/1003519 |
PQID | 2447516564 |
PQPubID | 31135 |
PageCount | 23 |
ParticipantIDs | proquest_journals_2447516564 crossref_primary_10_1108_ICS_01_2020_0002 crossref_citationtrail_10_1108_ICS_01_2020_0002 |
PublicationCentury | 2000 |
PublicationDate | 2020-10-02 |
PublicationDateYYYYMMDD | 2020-10-02 |
PublicationDate_xml | – month: 10 year: 2020 text: 2020-10-02 day: 02 |
PublicationDecade | 2020 |
PublicationPlace | Bingley |
PublicationPlace_xml | – name: Bingley |
PublicationTitle | Information and computer security |
PublicationYear | 2020 |
Publisher | Emerald Group Publishing Limited |
Publisher_xml | – name: Emerald Group Publishing Limited |
References | (key2020100112345107900_ref001) 2019; 35 (key2020100112345107900_ref011) 2019 (key2020100112345107900_ref018) 2008; 4 (key2020100112345107900_ref016) 2018 (key2020100112345107900_ref026) 2019 key2020100112345107900_ref013 key2020100112345107900_ref035 key2020100112345107900_ref012 key2020100112345107900_ref034 (key2020100112345107900_ref037) 2017; 33 (key2020100112345107900_ref011b) 2010; 15 key2020100112345107900_ref036 (key2020100112345107900_ref019) 2001; 55 (key2020100112345107900_ref015) 2011; 11 (key2020100112345107900_ref017) 2019; 22 key2020100112345107900_ref010 (key2020100112345107900_ref031) 2016 (key2020100112345107900_ref029) 2017 (key2020100112345107900_ref039) 2005; 20 (key2020100112345107900_ref022) 2007; 17 (key2020100112345107900_ref009) 2014 (key2020100112345107900_ref024) 2012 key2020100112345107900_ref011c (key2020100112345107900_ref003) 2007 (key2020100112345107900_ref020) 2018 (key2020100112345107900_ref030) 2019 (key2020100112345107900_ref040) 2019 (key2020100112345107900_ref006) 2006 (key2020100112345107900_ref002) 2019 key2020100112345107900_ref005 key2020100112345107900_ref027 key2020100112345107900_ref008 (key2020100112345107900_ref025) 2011 (key2020100112345107900_ref032) 2018; 4 (key2020100112345107900_ref011a) 2015 (key2020100112345107900_ref007) 2011; 16 (key2020100112345107900_ref004) 2008 (key2020100112345107900_ref021) 2007; 17 (key2020100112345107900_ref014) 2006 (key2020100112345107900_ref038) 2019 (key2020100112345107900_ref028) 2017 (key2020100112345107900_ref023) 2015 (key2020100112345107900_ref033) 2018 |
References_xml | – volume: 22 start-page: 1 issue: 1 year: 2019 ident: key2020100112345107900_ref017 article-title: The impact of GDPR on global technology development publication-title: Journal of Global Information Technology Management doi: 10.1080/1097198X.2019.1569186 – volume-title: Four Steps to the Epiphany: Successful Strategies for Products That Win year: 2007 ident: key2020100112345107900_ref003 – volume: 4 issue: 1 year: 2018 ident: key2020100112345107900_ref032 article-title: Forgetting personal data and revoking consent under the GDPR: challenges and proposed solutions publication-title: Journal of Cybersecurity – ident: key2020100112345107900_ref008 – start-page: 311 volume-title: International Conference on Software Technologies year: 2014 ident: key2020100112345107900_ref009 article-title: Problem-based security requirements elicitation and refinement with pressure – ident: key2020100112345107900_ref027 – ident: key2020100112345107900_ref035 – ident: key2020100112345107900_ref010 – ident: key2020100112345107900_ref012 – ident: key2020100112345107900_ref011c – volume-title: 36th International Conference on Conceptual Modeling (ER) year: 2017 ident: key2020100112345107900_ref029 article-title: Goal models for acceptance requirements analysis and gamification design – volume-title: 24th IEEE International Requirements Engineering Conference (RE), IEEE year: 2016 ident: key2020100112345107900_ref031 article-title: Acceptance requirements and their gamification solutions – volume-title: 11th IEEE International Conference on Research Challenges in Information Science (RCIS), IEEE year: 2017 ident: key2020100112345107900_ref028 article-title: Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques – volume: 55 start-page: 587 issue: 4 year: 2001 ident: key2020100112345107900_ref019 article-title: Methods to support human-centred design publication-title: International Journal of Human-Computer Studies doi: 10.1006/ijhc.2001.0503 – start-page: 108 volume-title: 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), IEEE year: 2018 ident: key2020100112345107900_ref020 article-title: Methods and tools for GDPR compliance through privacy and data protection engineering – volume: 33 start-page: 434 issue: 4 year: 2017 ident: key2020100112345107900_ref037 article-title: Enabling valid informed consent for location tracking through privacy awareness of users: a process theory publication-title: Computer Law and Security Review doi: 10.1016/j.clsr.2017.03.027 – start-page: 151 volume-title: 2015 IEEE Security and Privacy Workshop, IEEE year: 2015 ident: key2020100112345107900_ref023 article-title: PRIPARE: integrating privacy best practices into a privacy engineering methodology – volume: 20 start-page: 1 issue: 1 year: 2005 ident: key2020100112345107900_ref039 article-title: Methods and techniques for the evaluation of user-adaptive systems publication-title: The Knowledge Engineering Review doi: 10.1017/S0269888905000299 – ident: key2020100112345107900_ref005 – volume: 11 start-page: 4341 issue: 7 year: 2011 ident: key2020100112345107900_ref015 article-title: A soft computing approach for privacy requirements engineering: the PriS framework publication-title: Applied Soft Computing doi: 10.1016/j.asoc.2010.10.012 – start-page: 89 volume-title: CAiSE Forum year: 2011 ident: key2020100112345107900_ref025 article-title: SecTro: a CASE tool for modelling security in requirements engineering using secure tropos – volume-title: 16th International Conference on Trust, Privacy and Security in Digital Business-TrustBus year: 2019 ident: key2020100112345107900_ref026 article-title: DEFeND architecture: a privacy by design platform for GDPR compliance – volume: 15 start-page: 1 issue: 1 year: 2010 ident: key2020100112345107900_ref011b article-title: Guest editorial: security requirements engineering: past, present and future publication-title: Requirements Engineering doi: 10.1007/s00766-009-0094-8 – volume: 4 start-page: 543 year: 2008 ident: key2020100112345107900_ref018 article-title: The cost of reading privacy policies publication-title: ISJLP – volume: 17 start-page: 285 issue: 2 year: 2007 ident: key2020100112345107900_ref021 article-title: Secure Tropos: a security-oriented extension of the tropos methodology publication-title: International Journal of Software Engineering and Knowledge Engineering doi: 10.1142/S0218194007003240 – volume: 16 start-page: 3 issue: 1 year: 2011 ident: key2020100112345107900_ref007 article-title: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements publication-title: Requirements Engineering doi: 10.1007/s00766-010-0115-7 – ident: key2020100112345107900_ref034 – start-page: 3 volume-title: Nordic Conference on Secure IT Systems year: 2019 ident: key2020100112345107900_ref002 article-title: Privacy impact assessment: comparing methodologies with a focus on practicality – ident: key2020100112345107900_ref013 – volume-title: 13th IEEE International Conference on Research Challenges in Information Science (RCIS), IEEE year: 2019 ident: key2020100112345107900_ref030 article-title: Design thinking and acceptance requirements for designing gamified software – volume: 35 start-page: 122 issue: 3 year: 2019 ident: key2020100112345107900_ref001 article-title: Engineering privacy by design: are engineers ready to live up to the challenge? publication-title: The Information Society doi: 10.1080/01972243.2019.1583296 – year: 2015 ident: key2020100112345107900_ref011a article-title: Privacy and data protection by design – from policy to engineering publication-title: European Union Agency for Network and Information Security (ENISA) – start-page: 179 volume-title: 14th IEEE International Requirements Engineering Conference (RE’06), IEEE year: 2006 ident: key2020100112345107900_ref006 article-title: Effectiveness of requirements elicitation techniques: empirical results derived from a systematic review – year: 2018 ident: key2020100112345107900_ref016 article-title: Privacy by design to comply with GDPR: a review on third-party data processors – start-page: 190 volume-title: 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), IEEE year: 2018 ident: key2020100112345107900_ref033 article-title: Strategy and solution to comply with GDPR: guideline to comply major articles and save a penalty from non-compliance – start-page: 1 year: 2019 ident: key2020100112345107900_ref011 article-title: GDPR compliance in cybersecurity software: a case study of DPIA in information sharing platform – volume: 17 start-page: 2 issue: 1 year: 2007 ident: key2020100112345107900_ref022 article-title: The qualitative interview in is research: examining the craft publication-title: Information and Organization doi: 10.1016/j.infoandorg.2006.11.001 – volume-title: Social Research Methods year: 2008 ident: key2020100112345107900_ref004 – ident: key2020100112345107900_ref036 – start-page: 1 volume-title: 2019 13th International Conference on Research Challenges in Information Science (RCIS) year: 2019 ident: key2020100112345107900_ref038 article-title: GDPR compliance in the design of the INFORM e-learning platform: a case study – volume-title: 3rd International Workshop on SECurity and Privacy Requirements Engineering (SECPRE 2019) year: 2019 ident: key2020100112345107900_ref040 article-title: Privacy, security, legal and technology acceptance requirements for a GDPR compliance platform – start-page: 95 volume-title: International Conference on Advanced Information Systems Engineering year: 2012 ident: key2020100112345107900_ref024 article-title: A CASE tool to support automated modelling and analysis of security requirements, based on secure tropos – start-page: 179 volume-title: 14th IEEE International Requirements Engineering Conference (RE’06)(RE) year: 2006 ident: key2020100112345107900_ref014 article-title: Effectiveness of requirements elicitation techniques: empirical results derived from a systematic review |
SSID | ssj0001916361 ssj0004345 |
Score | 2.3239508 |
Snippet | PurposeGeneral data protection regulation (GDPR) entered into force in May 2018 for enhancing personal data protection. Even though GDPR leads toward many... |
SourceID | proquest crossref |
SourceType | Aggregation Database Enrichment Source Index Database |
StartPage | 531 |
SubjectTerms | Compliance Computer privacy Consent Controllers Data collection Data integrity General Data Protection Regulation Methodology Organizations Personal information Privacy Software engineering Technology utilization User needs User satisfaction |
SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1bS8MwFA46QXwRrzh1kgcRBMvSJmnTJ9F5B2V4Ad9KepLCYMy5VdF_b06WTnzxtU1oyTk5l-_cCDkUaRmbTJtIVQjdCCmjUmuIKpHoTAI4qxcB_fuH9OZF3L3K1wC4TUNaZSMTvaA2b4AYeTfBznTYKkacjt8jnBqF0dUwQmORLDkRrFSLLJ1fPvQffysjuR9TnDg1H4k8jZtAJVPd294TutIJ-k-sgVXmiumvXPbK5mqNrAYrkZ7NyLpOFuxogyw3SeobpBPKDegRDfVEeL40XNRN8tWfDD41fJ_QaZhPd0KH1ikDqkeG1nM4nWrAtBakPLXDAaD96Zc4L9kx5QDhAEMnFtOFPY44pe5rVNPri_4jnaWj-83joa7xP7bIy9Xlc-8mCjMWIuCS11HOJbaISxVUTGUJ587mqljKuGECFBPWQ0MZxKB1Zljs3LNU-CdgFeicb5PW6G1kdwiVRnNZKWEgBSGVzbWSGjKrsaVYWeZt0m0OuIDQgBznYAwL74gwVTiSFCwukCQYFE_a5Hi-YzxrvvHP2v2GZkW4htPil2l2_3-9R1Y8I2BmQLJPWvXkw3actVGXB4GlfgANN9Ju priority: 102 providerName: ProQuest |
Title | Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform |
URI | https://www.proquest.com/docview/2447516564 |
Volume | 28 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT9wwEB4BvfQCbSniufKhl0qETWI7cY68dqES2xUUiXKJnImjrhoC2g2o8OvxOMlKVFUlJC45WLbl2OPxzOfxNwBfRJQFeaxzTxUE3QgpvUxr9AoR6lgiWquXAP2zUXRyKb5dyasFGHVvYVxYZQPHOD09qWbkpPYpcNtq4TnhAGWvOT28IGc4JA-IdnafEOv-r_qmXLSSLuPu6W-HuFhLiDsC1dCe-p5IoqC7t_xHZy_PqZdq2p09gxW47UbdhJz83ruvsz18-ovQ8e1-6wMst2Yq22_k6iMsmOoTrHQpIFirEVbhz3g6edD4uMtmbSK8XVYae-owXeWsnuP2TCPFz5CIMVNOkAxdV8UOzUr_hHCHnE0NxSU7wHLGrDXNNBsejc9ZE_fuGt-VuiY7-zNcDo5_HJ54bTIHD7nktZdwSVx0kcLCV3HIuTXuCj_yee4LVL4wDoOKMUCt49wPrB8YCVeCRqFO-BosVbeVWQcmc81loUSOEQqpTKKV1BgbTdxlWZZsQL9buhRbpnNKuFGmzuPxVWqnOPWDlKaYbt_DDfg6b3HXsHz8p-52Jw1pu99naUi8iURkJDZf0dUWvHerTPEI4TYs1dN7s2NtnDrrwaIaDHvw7uB4ND7vOUG237Pguy27_nm9P3wG70r60w |
linkProvider | Emerald |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwEB4hKpVeUEupyqv1oUVCIlrHsRPngBCCLrvlIdSCxC11xo600mpZdkMLf4rfiMebLOqFG9fEViLPeB7fvAC-ybSMbWZspCuCbqRSUWkMRpUUJlOI3uolQP_sPO1dyZ_X6noBHttaGEqrbGViENT2Bgkj7wjqTEetYuT--DaiqVEUXW1HaMzY4sQ9_PMu23Svf-Tp-12I7o_Lw17UTBWIMFFJHeWJoqZoqcaK60x4f57nFU95YrlEzaULYEiGMRqTWR57hySV4Qk6jYaaL3mR_0YmXpNTZXr3-LkOMwlDkYU3KiKZp3EbFuW60z_8TY67IG-NtyDOXA3-rwWCauu-h-XGJmUHMyb6AAtutAJv25T4FdhqihvYNmuql4iarBELH-H-YjL4a_Bhl02baXi7bOi86mFmZFk9B--ZQUqiIT5jbjhAsnbDEu-T-yswIPDBsomj5OSAWk6Z_xoz7Pjo4hebJb-HzeOhqek_VuHqVc7-EyyObkbuMzBlTaIqLS2mKJV2udHKYOYMNTAry3wNOu0BF9i0O6epG8MiuD1cF54kBY8LIgmF4MUa7Mx3jGetPl5Yu9nSrGgu_bR4ZtH1l19_haXe5dlpcdo_P9mAd4EpKCdBbMJiPblzW97OqcsvgbkY_Hltbn4CcF0K-Q |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Privacy%2C+security%2C+legal+and+technology+acceptance+elicited+and+consolidated+requirements+for+a+GDPR+compliance+platform&rft.jtitle=Information+and+computer+security&rft.au=Tsohou%2C+Aggeliki&rft.au=Magkos%2C+Emmanouil&rft.au=Mouratidis%2C+Haralambos&rft.au=Chrysoloras%2C+George&rft.date=2020-10-02&rft.issn=2056-4961&rft.volume=28&rft.issue=4&rft.spage=531&rft.epage=553&rft_id=info:doi/10.1108%2FICS-01-2020-0002&rft.externalDBID=n%2Fa&rft.externalDocID=10_1108_ICS_01_2020_0002 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon |