To Comply Software and IT System Development with Related Laws
dc.cclicence | CC-BY-NC | en |
dc.contributor.author | Zarrabi, Jorshari Fatemeh | |
dc.contributor.author | Islam, S. | |
dc.contributor.author | Mouratidis, H. | |
dc.date.acceptance | 2010-11 | |
dc.date.accessioned | 2020-06-17T14:14:54Z | |
dc.date.available | 2020-06-17T14:14:54Z | |
dc.date.issued | 2011-01-09 | |
dc.description.abstract | . Accretion procedure of crimes and security breaches against the privacy of individual’s information and their maintenance information systems has cost huge amount of financial and other resources loose. Consequently governments take serious actions toward approving protective legislation against cyber crimes and it will be duty of software developers to adopt policies and measures to ensure that their designed systems are compatible with existing laws and their amendments. Since information technology and legislation are two quite distinct sciences, existence of a mechanism to do this adjustment and satisfy security and legal requirements of a designing software system is very essential. This paper is representing a framework that will help IT professionals to extract security requirements from relevant rules and use them in design of a system which is in accordance with those rules. It is giving brief discussion of the framework’s methodology and design of a simulating computer-aided system of this framework. It also reports the research progress and new discovered conclusions. | en |
dc.exception.ref2021codes | 254a | |
dc.funder | No external funder | en |
dc.identifier.citation | Zarrabi, F., Islam, S. and Mouratidis, H. (2011) To Comply Software and IT System Development with Related Laws. International Conference on Advanced Information Systems Engineering (CAiSE) (Doctoral Consortium), January 2011. | en |
dc.identifier.uri | https://dora.dmu.ac.uk/handle/2086/19792 | |
dc.language.iso | en | en |
dc.researchinstitute | Cyber Technology Institute (CTI) | en |
dc.subject | goal modelling Language | en |
dc.subject | Security Touch-points | en |
dc.subject | SDLC (System Development Life Cycle) | en |
dc.title | To Comply Software and IT System Development with Related Laws | en |
dc.type | Conference | en |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- 8fcf56535d2cb35a88d662c746face1e961a.pdf
- Size:
- 547.14 KB
- Format:
- Adobe Portable Document Format
- Description:
- https://pdfs.semanticscholar.org/6327/8fcf56535d2cb35a88d662c746face1e961a.pdf
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 4.2 KB
- Format:
- Item-specific license agreed upon to submission
- Description: