posted by user: ka_ti_bo || 1743 views || tracked by 4 users: [display]

DPTPT 2010 : Special issue “Digital Privacy: Theory, Policies and Technologies” in Requirements Engineering Journal

FacebookTwitterLinkedInGoogle

Link: http://www.springer.com/computer/programming/journal/766
 
When N/A
Where N/A
Submission Deadline Nov 21, 2009
Notification Due Jan 15, 2010
Final Version Due Feb 15, 2010
Categories    privacy   policies
 

Call For Papers

Requirements Engineering
http://www.springer.com/computer/programming/journal/766

Special Issue Call For Papers “Digital Privacy: Theory, Policies and Technologies”


Guest Editors

Annie I. Anton
North Carolina State University, USA
anton@csc.ncsu.edu
http://www4.ncsu.edu/~aianton/

Travis D. Breaux
Institute for Defense Analyses, USA
tbreaux@ida.org
www.ida.org

Stefanos Gritzalis
University of the Aegean, Greece
sgritz@aegean.gr
http://www.icsd.aegean.gr/sgritz

John Mylopoulos
University of Trento, Italy
jm@disi.unitn.it
http://portale.unitn.it/ateneo/persone/john.mylopoulos


Schedule

Submission deadline: November 21, 2009
Author notification - review comments: January 15, 2010
Revised submissions: February 15, 2010
Final decision: March 15, 2010
Final manuscripts due: April 15, 2010
Tentative Publication: Summer 2010


Submission Information

Send your manuscript, following the Springer reviewing system available at:
http://www.editorialmanager.com/REJ/ (“Special Issue: Digital Privacy”). Authors
are invited to submit original high quality manuscripts that should be written in
grammatically correct and coherent English with a very precise and concise presentation. When submitting a manuscript please do not include any of your personal information anywhere in the manuscript or on the cover page; this is to ensure a double-blinded review process.

Aims and Scope

Information and Communication Technologies (ICT) continue to
evolve at a remarkably high pace. As a result, more individuals use
ICT at work and at home, carrying out routine daily tasks such as on-
line shopping, banking, and social interaction. Unfortunately,
increased use of ICT has resulted in increased risk that individuals'
privacy rights will be violated. These risks to privacy include:
violations of user anonymity during sensitive transactions,
unauthorized disclosures of personal data, misuse of personal data
for unauthorized purposes, misrepresentation of personal character,
and more.
To comply with privacy laws, regulations and policies we need to
develop techniques for identifying, documenting and testing privacy
requirements that are feasible and efficient to implement. Moreover,
developers need to update their software processes to ensure that
privacy is not an after-thought whereby privacy measures become an
add-on or employed in an ad hoc or arbitrary fashion. Finally,
organizations that manage personal information must integrate
privacy-enabled technologies and processes into their business
practices to comply with emerging legislation.
This special issue of the Requirements Engineering journal aims at
providing researchers and professionals with insights on the state-of-
the-art in Digital Privacy from the views of Theory, Policies and
Technologies. This special issue will publish novel, unpublished and
high quality research contributions from industry, government,
business, and academia.
The topics of interest include, but are not limited to:
Compliance of system policies to privacy requirements
Methods, tools and techniques for realizing privacy requirements
Alignment of system policies to privacy requirements
Alignment of privacy requirements to privacy laws, regulations and standards
Agent-oriented privacy engineering
Verification and validation of privacy requirements
Integrating privacy requirements in system engineering
Formal methods on privacy
Privacy policies and human rights
Privacy policy enforcement
Privacy policies for companies engaging in eCommerce
Privacy policies in the digital business
Privacy enhancing technologies and systems

Related Resources

MODERN SYSTEMS 2025   International Conference of Modern Systems Engineering Solutions
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
VISAPP 2025   20th International Conference on Computer Vision Theory and Applications
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
CLNLP 2025   2025 2nd International Conference on Computational Linguistics and Natural Language Processing
IJMPICT 2024   International Journal of Managing Public Sector Information and Communication Technologies
COLT 2025   Conference on Learning Theory
CSP 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
CIbSE 2025   CFP: 28th Ibero-American Conference on Software Engineering (CIbSE 2025)
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3