10.29327/1298731.22-5
Computing has been revolutionizing the way people communicate, share, and access information. Consequently, concerns about privacy and security are increasing. In this scenario, the literature reports that it is necessary to address privacy and security from the Requirements Engineering (RE) phase. This paper presents the results of a Systematic Literature Mapping, covers the period from 2000 to 2016, whose goal is to understand the current state of approaches concerning privacy and security in RE domain. We divided the results into research topics, research methods, types of study, research problems, and indications of future works regarding the eld of privacy and security in RE.
Privacy; Security; Requirements Engineering; Systematic Literature Mapping
@inproceedings{wer201908, author = {Netto, D. and Peixoto, M. and Silva, C.}, title = {Privacy and Security in Requirements Engineering: Results from a Systematic Literature Mapping}, booktitle = {Proceedings of the WER2019-22th Workshop on Requirements Engineering, Recife, PE - Brazil}, year = {2019}, issn = {2675-0066}, isbn = {978-85-907171-2-6}, doi = {10.29327/1298731.22-5} }