Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
A framework for requirements analysis is proposed that accounts for individual and personal goals, and the effect of time and context on personal requirements. The implications of...
Alistair G. Sutcliffe, Stephen Fickas, McKay Moore...
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Cross-organizational information systems projects, such as ERP, imply an expensive requirements engineering (RE) cycle. Little is known yet about how to carry it out with more pre...