| |||||||||||||||
DPTPT 2010 : Special issue “Digital Privacy: Theory, Policies and Technologies” in Requirements Engineering Journal | |||||||||||||||
Link: http://www.springer.com/computer/programming/journal/766 | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
Requirements Engineering
http://www.springer.com/computer/programming/journal/766 Special Issue Call For Papers “Digital Privacy: Theory, Policies and Technologies” Guest Editors Annie I. Anton North Carolina State University, USA anton@csc.ncsu.edu http://www4.ncsu.edu/~aianton/ Travis D. Breaux Institute for Defense Analyses, USA tbreaux@ida.org www.ida.org Stefanos Gritzalis University of the Aegean, Greece sgritz@aegean.gr http://www.icsd.aegean.gr/sgritz John Mylopoulos University of Trento, Italy jm@disi.unitn.it http://portale.unitn.it/ateneo/persone/john.mylopoulos Schedule Submission deadline: November 21, 2009 Author notification - review comments: January 15, 2010 Revised submissions: February 15, 2010 Final decision: March 15, 2010 Final manuscripts due: April 15, 2010 Tentative Publication: Summer 2010 Submission Information Send your manuscript, following the Springer reviewing system available at: http://www.editorialmanager.com/REJ/ (“Special Issue: Digital Privacy”). Authors are invited to submit original high quality manuscripts that should be written in grammatically correct and coherent English with a very precise and concise presentation. When submitting a manuscript please do not include any of your personal information anywhere in the manuscript or on the cover page; this is to ensure a double-blinded review process. Aims and Scope Information and Communication Technologies (ICT) continue to evolve at a remarkably high pace. As a result, more individuals use ICT at work and at home, carrying out routine daily tasks such as on- line shopping, banking, and social interaction. Unfortunately, increased use of ICT has resulted in increased risk that individuals' privacy rights will be violated. These risks to privacy include: violations of user anonymity during sensitive transactions, unauthorized disclosures of personal data, misuse of personal data for unauthorized purposes, misrepresentation of personal character, and more. To comply with privacy laws, regulations and policies we need to develop techniques for identifying, documenting and testing privacy requirements that are feasible and efficient to implement. Moreover, developers need to update their software processes to ensure that privacy is not an after-thought whereby privacy measures become an add-on or employed in an ad hoc or arbitrary fashion. Finally, organizations that manage personal information must integrate privacy-enabled technologies and processes into their business practices to comply with emerging legislation. This special issue of the Requirements Engineering journal aims at providing researchers and professionals with insights on the state-of- the-art in Digital Privacy from the views of Theory, Policies and Technologies. This special issue will publish novel, unpublished and high quality research contributions from industry, government, business, and academia. The topics of interest include, but are not limited to: Compliance of system policies to privacy requirements Methods, tools and techniques for realizing privacy requirements Alignment of system policies to privacy requirements Alignment of privacy requirements to privacy laws, regulations and standards Agent-oriented privacy engineering Verification and validation of privacy requirements Integrating privacy requirements in system engineering Formal methods on privacy Privacy policies and human rights Privacy policy enforcement Privacy policies for companies engaging in eCommerce Privacy policies in the digital business Privacy enhancing technologies and systems |
|