Privacy requirements engineering for trustworthy e-government services

  • Authors:
  • Nikos Vrakas;Christos Kalloniatis;Aggeliki Tsohou;Costas Lambrinoudakis

  • Affiliations:
  • Dept. of Digital Systems, University of Piraeus, Piraeus, Greece;Dept. of Cultural Technology and Communication, University of the Aegean, Lesvos, Greece;Dept. of Information and Communication Systems Engineering, University of the Aegean, Samos, Greece;Dept. of Digital Systems, University of Piraeus, Piraeus, Greece

  • Venue:
  • TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Several research studies have applied information systems acceptance theories in order to examine issues related to the acceptance of e-services by users. Their application in the e-government systems has revealed that trust is a prerequisite for their usage. Moreover, it has been proved that privacy concerns are a main antecedent of trust in e-government systems intention of use. Therefore, information systems that are not privacy aware are not trusted and thus not accepted by users. Currently there are many different attacks that can be realized by malicious users for compromising the confidentiality of private data and thus putting at stake the trustworthiness of the systems. The conventional way for preventing such attacks is mainly the employment of Privacy Enhancing Technologies (PETs). However, PETs are employed as ad hoc technical solutions that are independent from the organizational context in which the system will operate. We argue that we need privacy requirements engineering methods for capturing the context dependent privacy requirements and for selecting the appropriate technical, organizational and procedural countermeasures which will help building privacy aware systems that can offer electronic services which users can trust.