Helping Software Architects Familiarize with the General Data Protection Regulation

@article{Colesky2019HelpingSA,
  title={Helping Software Architects Familiarize with the General Data Protection Regulation},
  author={Michael Colesky and Katerina Demetzou and Lothar Fritsch and Sebastian Herold},
  journal={2019 IEEE International Conference on Software Architecture Companion (ICSA-C)},
  year={2019},
  pages={226-229}
}
The General Data Protection Regulation (GDPR) impacts any information systems that process personal data in or from the European Union. Yet its enforcement is still recent. Organizations under its effect are slow to adopt its principles. One particular difficulty is the low familiarity with the regulation among software architects and designers. The difficulty to interpret the content of the legal regulation at a technical level adds to that. This results in problems in understanding the impact… 

Figures from this paper

Mitigation lost in translation: leveraging threat information to improve privacy solution selection

This paper focuses on hard privacy threats such as identifiability, and applies the approach on the LINDDUN threat trees to construct selection-support methods to guide users from the threat tree nodes to the most appropriate mitigation countermeasures.

An Intelligent Systems Approach for Supporting Privacy Awareness in Agile Software Development

This research intends to contribute to the advancement of privacy engineering in an agile environment by providing a system that allows better integration of privacy protection with currently used development processes, such as Scrum.

References

SHOWING 1-10 OF 14 REFERENCES

Software Systems Architecture: Working with Stakeholders Using Viewpoints and Perspectives

This book shows why the role of the architect is central to any successful information-systems development project, and, by presenting a set of architectural viewpoints and perspectives, provides specific direction for improving your own and your organization's approach to software systems architecture.

Software architecture in practice

This second edition of this book reflects the new developments in the field and new understanding of the important underpinnings of software architecture with new case studies and the new understanding both through new chapters and through additions to and elaboration of the existing chapters.

Privacy and Data Protection by Design - from policy to engineering

The report sketches a method to map legal obligations to design strategies, which allow the system designer to select appropriate techniques for implementing the identified privacy requirements, and concludes with recommendations on how to overcome and mitigate these limits.

Software architecture: foundations, theory, and practice

This tutorial affords the participant an extensive treatment of the field of software architecture, its foundation, principles, and elements, including those mentioned above, and looks at emerging and likely future trends in this field.

Privacy by designers: software developers' privacy mindset

For PbD to be a viable option, it is important to understand developers' perceptions, interpretation and practices as to informational privacy.

Privacy Design Strategies

These strategies help IT architects to support privacy by design early in the software development life cycle, during concept development and analysis and provide a useful classification of privacy design patterns and the underlying privacy enhancing technologies.

Pattern-Oriented Software Architecture

This study uses design patterns to present platform independent architecture to help extend the usability of any software system and provide structural notations for anySoftware system.

Common privacy patterns in video surveillance and smart energy

  • C. BierE. Krempel
  • Computer Science
    2012 7th International Conference on Computing and Convergence Technology (ICCCT)
  • 2012
This work evaluates established privacy approaches in video surveillance and smart energy, and a general structure for a privacy pattern language is proposed.

Privacy By Design

Nigel Davies and Marc Langheinrich explore one of the greatest challenges in ubiquitous systemsa#x2014;how to provide smart, context-aware systems that can realize Weiser's vision while protecting

Foundations of Mixed Methods Research: Integrating Quantitative and Qualitative Approaches in the Social and Behavioral Sciences

This chapter discusses methodology issues in Mixed Methods Research, as well as the inference process in mixed methods research, and some of the strategies used in the development of mixed methodologies.