Loading

Privacy Requirements Classification Method for System Design
Nor Asiakin Hasbullah1, Norulzahrah Mohd Zainudin2, Noor Afiza Mat Razali3, Norshahriah Wahab4

1Nor Asiakin Hasbullah, Department of Computer Science, National Defence University of Malaysia, Kuala Lumpur, Malaysia.

2Norulzahrah Mohd Zainudin, Department of Computer Science, National Defence University of Malaysia, Kuala Lumpur, Malaysia.

3Noor Afiza Mat Razali, Department of Computer Science, National Defence University of Malaysia, Kuala Lumpur, Malaysia.

4Norshahriah Wahab, Department of Computer Science, National Defence University of Malaysia, Kuala Lumpur, Malaysia.

Manuscript received on 11 December 2019 | Revised Manuscript received on 23 December 2019 | Manuscript Published on 31 December 2019 | PP: 713-376 | Volume-8 Issue-12S2 October 2019 | Retrieval Number: L112410812S219/2019©BEIESP | DOI: 10.35940/ijitee.L1124.10812S219

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: It is important to get users’ privacy requirements through data or information classification during the system design. Currently, the citizen-centric perspective of privacy requirement is not well understood. To fill this gap a study with the objectives of to investigate citizens’ privacy requirements and need through their privacy preferences has been done. From the data analysis, the citizen-centric preferences’ set was developed based on the classification of personal and sensitive information that has been obtained through a survey of 350 respondents. The result is configured into a reference table and sensitivity classification tool respectively. Therefore, we suggested the tool to be used as a classifying method to classify sensitive and personal information for system design.

Keywords: Classification Method, Privacy Requirements, Privacy Preferences, Reference Table, Sensitivity Classification Tool.
Scope of the Article: Classification