Systematic mapping study on requirements engineering for regulatory compliance of software systems

O Kosenkov, P Elahidoost, T Gorschek… - Information and …, 2024 - Elsevier
Context: As the diversity and complexity of regulations affecting Software-Intensive Products
and Services (SIPS) is increasing, software engineers need to address the growing …

[HTML][HTML] Models of socio-cyber-physical systems security

S Yevseiev, Y Khokhlachova, S Ostapov, O Laptiev… - 2023 - monograph.com.ua
The development of technologies and computing resources has not only expanded the
range of digital services in all spheres of human activity, but also determined the range of …

Development of the concept for determining the level of critical business processes security

S Yevseiev, O Milov, Y Pribyliev… - … -European Journal of …, 2023 - papers.ssrn.com
The development of technologies and computing resources not only expanded the spectrum
of digital services in all areas of human activity, but also defined the spectrum of targeted …

[HTML][HTML] GDPR compliance via software evolution: Weaving security controls in software design

V Ayala-Rivera, AO Portillo-Dominguez… - Journal of Systems and …, 2024 - Elsevier
Software should comply with international privacy laws, like the General Data Protection
Regulation (GDPR). However, implementing appropriate technical controls is often an error …

Privacy and Security Documents for Agile Software Engineering: An Experiment of LGPD Inventory Adoption

J Saraiva, S Soares - 2023 ACM/IEEE International …, 2023 - ieeexplore.ieee.org
Context: Society 5.0 depends on intelligent technologies that capture and monitor data in
real-time. Software development needs to guarantee the privacy and protection of personal …

Bridging the gap between GPDR and software development: the MATERIALIST framework

M Saltarella, G Desolda, A Esposito, F Greco… - Multimedia Tools and …, 2024 - Springer
As software production evolves, privacy is becoming an increasingly important
consideration. This is especially true as national and supranational regulations, such as …

Adoption of the LGPD inventory in the user stories and BDD scenarios creation

J Saraiva, S Soares - Proceedings of the XXXVII Brazilian Symposium …, 2023 - dl.acm.org
Today's society heavily relies on intelligent technologies that capture and monitor real-time
data, necessitating strong measures to ensure personal data privacy and protection …

A Focus Area Maturity Model for Privacy-by-Design

M Muszynski - 2023 - studenttheses.uu.nl
The privacy-by-design (PbD) paradigm was formulated to embed privacy throughout the
entire lifecycle of systems, processing activities, and data. However, existing research …

[PDF][PDF] Human Factors and Cybersecurity in NHS Virtual Wards

T Fotis, K Kioskli, H Mouratidis - 15th International Conference on …, 2024 - researchgate.net
Human Factors and Cybersecurity in NHS Virtual Wards Page 1 Human Factors in
Cybersecurity, Vol. 127, 2024, 1–11 https://doi.org/10.54941/xxxxxx Human Factors and …

Ethical Considerations in the Use of AI for Auditing: Balancing Innovation and Integrity

BO Adelakun - European Journal of Accounting, Auditing and Finance …, 2022 - tudr.org
The integration of Artificial Intelligence (AI) into auditing practices presents both significant
opportunities and ethical challenges. This research explores the ethical considerations in …