posted by user: ka_ti_bo || 1522 views || tracked by 4 users: [display]

DPTPT 2010 : Special issue “Digital Privacy: Theory, Policies and Technologies” in Requirements Engineering Journal

FacebookTwitterLinkedInGoogle

Link: http://www.springer.com/computer/programming/journal/766
 
When N/A
Where N/A
Submission Deadline Nov 21, 2009
Notification Due Jan 15, 2010
Final Version Due Feb 15, 2010
Categories    privacy   policies
 

Call For Papers

Requirements Engineering
http://www.springer.com/computer/programming/journal/766

Special Issue Call For Papers “Digital Privacy: Theory, Policies and Technologies”


Guest Editors

Annie I. Anton
North Carolina State University, USA
anton@csc.ncsu.edu
http://www4.ncsu.edu/~aianton/

Travis D. Breaux
Institute for Defense Analyses, USA
tbreaux@ida.org
www.ida.org

Stefanos Gritzalis
University of the Aegean, Greece
sgritz@aegean.gr
http://www.icsd.aegean.gr/sgritz

John Mylopoulos
University of Trento, Italy
jm@disi.unitn.it
http://portale.unitn.it/ateneo/persone/john.mylopoulos


Schedule

Submission deadline: November 21, 2009
Author notification - review comments: January 15, 2010
Revised submissions: February 15, 2010
Final decision: March 15, 2010
Final manuscripts due: April 15, 2010
Tentative Publication: Summer 2010


Submission Information

Send your manuscript, following the Springer reviewing system available at:
http://www.editorialmanager.com/REJ/ (“Special Issue: Digital Privacy”). Authors
are invited to submit original high quality manuscripts that should be written in
grammatically correct and coherent English with a very precise and concise presentation. When submitting a manuscript please do not include any of your personal information anywhere in the manuscript or on the cover page; this is to ensure a double-blinded review process.

Aims and Scope

Information and Communication Technologies (ICT) continue to
evolve at a remarkably high pace. As a result, more individuals use
ICT at work and at home, carrying out routine daily tasks such as on-
line shopping, banking, and social interaction. Unfortunately,
increased use of ICT has resulted in increased risk that individuals'
privacy rights will be violated. These risks to privacy include:
violations of user anonymity during sensitive transactions,
unauthorized disclosures of personal data, misuse of personal data
for unauthorized purposes, misrepresentation of personal character,
and more.
To comply with privacy laws, regulations and policies we need to
develop techniques for identifying, documenting and testing privacy
requirements that are feasible and efficient to implement. Moreover,
developers need to update their software processes to ensure that
privacy is not an after-thought whereby privacy measures become an
add-on or employed in an ad hoc or arbitrary fashion. Finally,
organizations that manage personal information must integrate
privacy-enabled technologies and processes into their business
practices to comply with emerging legislation.
This special issue of the Requirements Engineering journal aims at
providing researchers and professionals with insights on the state-of-
the-art in Digital Privacy from the views of Theory, Policies and
Technologies. This special issue will publish novel, unpublished and
high quality research contributions from industry, government,
business, and academia.
The topics of interest include, but are not limited to:
Compliance of system policies to privacy requirements
Methods, tools and techniques for realizing privacy requirements
Alignment of system policies to privacy requirements
Alignment of privacy requirements to privacy laws, regulations and standards
Agent-oriented privacy engineering
Verification and validation of privacy requirements
Integrating privacy requirements in system engineering
Formal methods on privacy
Privacy policies and human rights
Privacy policy enforcement
Privacy policies for companies engaging in eCommerce
Privacy policies in the digital business
Privacy enhancing technologies and systems

Related Resources

ICDT 2025   International Conference on Database Theory
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
REFSQ 2024   International Working Conference on Requirements Engineering: Foundation for Software Quality
PrivateNLP 2024   ACL 2024 Workshop on Privacy and Natural Language Processing
ICoCTA 2024   2024 4th International Conference on Control Theory and Applications
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICACTE 2024   IEEE--2024 The 17th International Conference on Advanced Computer Theory and Engineering (ICACTE 2024)
SI on ATD&IS III 2024   Special Issue on Advanced Technologies in Data and Information Security III, Applied Sciences, MDPI
WMEP 2024   Woodside Monash Energy Partnership Energy Leadership conference
WMEP conference 2024   Climate Change and Energy Transition: The Role of Institutions, Technology, and Industry