Security problems in the TCP/IP protocol suite
ACM SIGCOMM Computer Communication Review
Metacapitalism: The E-Business Revolution and the Design of 21st-Century Companies and Markets
Metacapitalism: The E-Business Revolution and the Design of 21st-Century Companies and Markets
Privacy: What Developers and IT Professionals Should Know
Privacy: What Developers and IT Professionals Should Know
Trust and risk in e-government adoption
The Journal of Strategic Information Systems
Addressing privacy requirements in system design: the PriS method
Requirements Engineering
Methods for Designing Privacy Aware Information Systems: A Review
PCI '09 Proceedings of the 2009 13th Panhellenic Conference on Informatics
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Integrating security and systems engineering: towards the modelling of secure information systems
CAiSE'03 Proceedings of the 15th international conference on Advanced information systems engineering
Survey of security vulnerabilities in session initiation protocol
IEEE Communications Surveys & Tutorials
Factors influencing intention to use e-government services among citizens in Malaysia
International Journal of Information Management: The Journal for Information Professionals
Hi-index | 0.00 |
Several research studies have applied information systems acceptance theories in order to examine issues related to the acceptance of e-services by users. Their application in the e-government systems has revealed that trust is a prerequisite for their usage. Moreover, it has been proved that privacy concerns are a main antecedent of trust in e-government systems intention of use. Therefore, information systems that are not privacy aware are not trusted and thus not accepted by users. Currently there are many different attacks that can be realized by malicious users for compromising the confidentiality of private data and thus putting at stake the trustworthiness of the systems. The conventional way for preventing such attacks is mainly the employment of Privacy Enhancing Technologies (PETs). However, PETs are employed as ad hoc technical solutions that are independent from the organizational context in which the system will operate. We argue that we need privacy requirements engineering methods for capturing the context dependent privacy requirements and for selecting the appropriate technical, organizational and procedural countermeasures which will help building privacy aware systems that can offer electronic services which users can trust.