Privacy and confidentiality in process mining: Threats and research challenges

G Elkoumy, SA Fahrenkrog-Petersen, MF Sani… - ACM Transactions on …, 2021 - dl.acm.org
Privacy and confidentiality are very important prerequisites for applying process mining to
comply with regulations and keep company secrets. This article provides a foundation for …

Reusable knowledge in security requirements engineering: a systematic mapping study

A Souag, R Mazo, C Salinesi… - Requirements …, 2016 - Springer
Security is a concern that must be taken into consideration starting from the early stages of
system development. Over the last two decades, researchers and engineers have …

Development of an adoption model to assess user acceptance of e-service technology: E-Service Technology Acceptance Model

H Taherdoost - Behaviour & Information Technology, 2018 - Taylor & Francis
With remarkable growth of ICT development and the Internet popularity, the widespread use
of the electronic service is becoming inevitable. Furthermore, as the user adoption plays an …

A security ontology for security requirements elicitation

A Souag, C Salinesi, R Mazo… - … Secure Software and …, 2015 - Springer
Security is an important issue that needs to be taken into account at all stages of information
system development, including early requirements elicitation. Early analysis of security …

Understanding of e-service security dimensions and its effect on quality and intention to use

H Taherdoost - Information & Computer Security, 2017 - emerald.com
Purpose Security has been a critical matter in the development of electronic services. The
purpose of this research is to develop a new model to help e-service practitioners and …

COPri v. 2—A core ontology for privacy requirements

M Gharib, P Giorgini, J Mylopoulos - Data & Knowledge Engineering, 2021 - Elsevier
Nowadays, most enterprises collect, store, and manage personal information of customers to
deliver their services. In such a setting, privacy has emerged as a key concern since …

Towards an ontology for privacy requirements via a systematic literature review

M Gharib, P Giorgini, J Mylopoulos - Conceptual Modeling: 36th …, 2017 - Springer
Privacy has been frequently identified as a main concern for systems that deal with personal
information. However, much of existing work on privacy requirements deals with them as a …

COPri-A core ontology for privacy requirements engineering

M Gharib, J Mylopoulos, P Giorgini - Research Challenges in Information …, 2020 - Springer
In their daily practice, most enterprises collect, store, and manage personal information for
customers in order to deliver their services. In such a setting, privacy has emerged as a key …

An ontology for privacy requirements via a systematic literature review

M Gharib, P Giorgini, J Mylopoulos - Journal on Data Semantics, 2020 - Springer
Privacy has emerged as a key concern for business and social computing as security
breaches have compromised personal data for millions. Despite this, much of existing work …

Ontologies for privacy requirements engineering: A systematic literature review

M Gharib, P Giorgini, J Mylopoulos - arXiv preprint arXiv:1611.10097, 2016 - arxiv.org
Privacy has been frequently identified as a main concern for system developers while
dealing with/managing personal information. Despite this, most existing work on privacy …