P-STORE: Extension of STORE Methodology to Elicit Privacy Requirements
- 7 March 2021
- journal article
- research article
- Published by Springer Science and Business Media LLC in Arabian Journal for Science and Engineering
- Vol. 46 (9), 8287-8310
- https://doi.org/10.1007/s13369-021-05476-z
Abstract
No abstract availableKeywords
Funding Information
- Taif University (TURSP-2020/107)
This publication has 38 references indexed in Scilit:
- UK schools, CCTV and the Data Protection Act 1998Journal of Education Policy, 2011
- A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirementsRequirements Engineering, 2010
- Launching HITECHThe New England Journal of Medicine, 2010
- A comparison of security requirements engineering methodsRequirements Engineering, 2009
- Paper-based versus computer-based records in the emergency department: Staff preferences, expectations, and concernsHealth Informatics Journal, 2009
- Decision making with the analytic hierarchy processInternational Journal of Services Sciences, 2008
- Security quality requirements engineering (SQUARE) methodologyACM SIGSOFT Software Engineering Notes, 2005
- Dirty laundry: privacy issues for IT professionalsIT Professional, 2000
- Comparing detection methods for software requirements inspections: a replicated experimentIEEE Transactions on Software Engineering, 1995
- Multiparty specificationACM SIGSOFT Software Engineering Notes, 1989