Print Email Facebook Twitter Enforcing context-awareness and privacy-by-design in the specification of information systems Title Enforcing context-awareness and privacy-by-design in the specification of information systems Author Shishkov, Boris (Bulgarian Academy of Sciences; Interdisciplinary Institute for Collaboration and Research on Enterprise Systems and Technology (IICREST)) Janssen, M.F.W.H.A. (TU Delft Information and Communication Technology) Contributor Shishkov, Boris (editor) Date 2018 Abstract Networked physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity, allow for run-time acquisition of user data. This in turn can enable information systems which capture the “current” user state and act accordingly. The use of this data would result in context-aware applications that get fueled by user data (and environmental data) to adapt their behavior. Yet the use of data is often restricted by privacy regulations and norms; for example, the location of a person cannot be shared without given consent. In this paper we propose a design approach that allows for weaving context-awareness and privacy-by-design into the specification of information systems. This is to be done since the very early stages of the software development, while the enterprise needs are captured (and understood) and the software features are specified on that basis. In addition to taking into account context-awareness and privacy-sensitivity these two aspects will be balanced, especially if they are conflicting. The presented approach extends the “Software Derived from Business Components” (SDBC) approach. We partially demonstrate our proposed way of modeling, by means of a case example featuring land border security. Our proposed way of modeling would allow developers to smoothly reflect context and privacy features in the application design, supported by methodological guidelines that span over the enterprise modeling and software specification. Those features are captured as technology-independent societal demands and are in the end reflected in technology-specific (software) solutions. Traceability between the two is possible as well as re-use of modeling constructs. Subject Context-awarenessEnterprise modelingPrivacySoftware specification To reference this document use: http://resolver.tudelft.nl/uuid:ef9ddc45-a0c7-435f-841b-58ee4f01214e DOI https://doi.org/10.1007/978-3-319-78428-1_5 Publisher Springer Embargo date 2018-09-20 ISBN 9783319784274 Source Proceedings of 7th International Symposium Business Modeling and Software Design 2017 ( BMSD 2017), 309 Event 7th International Symposium on Business Modeling and Software Design, BMSD 2017, 2017-05-03 → 2017-05-05, Barcelona, Spain Series Lecture Notes in Business Information Processing, 18651348, 309 Bibliographical note Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public. Part of collection Institutional Repository Document type conference paper Rights © 2018 Boris Shishkov, M.F.W.H.A. Janssen Files PDF Shishkov_Janssen2018_Chap ... ssAndP.pdf 2.1 MB Close viewer /islandora/object/uuid:ef9ddc45-a0c7-435f-841b-58ee4f01214e/datastream/OBJ/view