<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A collaborative Tool to Support Junior Developers in Secure Software Development</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Maria</forename><forename type="middle">Teresa</forename><surname>Baldassarre</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Bari Aldo Moro</orgName>
								<address>
									<addrLine>Via Orabona 4</addrLine>
									<postCode>70125</postCode>
									<settlement>Bari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vita</forename><forename type="middle">Santa</forename><surname>Barletta</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Bari Aldo Moro</orgName>
								<address>
									<addrLine>Via Orabona 4</addrLine>
									<postCode>70125</postCode>
									<settlement>Bari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Danilo</forename><surname>Caivano</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Bari Aldo Moro</orgName>
								<address>
									<addrLine>Via Orabona 4</addrLine>
									<postCode>70125</postCode>
									<settlement>Bari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Giovanni</forename><surname>Dimauro</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Bari Aldo Moro</orgName>
								<address>
									<addrLine>Via Orabona 4</addrLine>
									<postCode>70125</postCode>
									<settlement>Bari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Antonio</forename><surname>Piccinno</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">University of Bari Aldo Moro</orgName>
								<address>
									<addrLine>Via Orabona 4</addrLine>
									<postCode>70125</postCode>
									<settlement>Bari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A collaborative Tool to Support Junior Developers in Secure Software Development</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">B02AA888C8F5F35807C62F2DBF03E8A7</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T02:54+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Privacy by Design</term>
					<term>Human-Centered Privacy</term>
					<term>Privacy Software Application</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In today's innovation and transformation scenarios, such as smart cities that transversally invest many technological fields and sectors of intervention, the security factor plays a primary role in software development projects. Currently, existing methodologies support developers only in the early stages of the software development life cycle (SDLC) and not in all of them. Therefore, it is necessary to provide operational guidelines in order to integrate privacy requirements and, consequently security, in software applications. Taking into account these needs, the research work presents a tool that supports team decisions to integrate privacy and security requirements in all software development phases regardless of the development methodology adopted.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Nowadays, organizations are undertaking increasingly complex projects in globalized, uncertain and dynamic environments <ref type="bibr" target="#b0">[1]</ref>. Some of the factors that increase or generate project complexity are the emergence of new technologies <ref type="bibr" target="#b1">[2]</ref>, the growing sophistication of software project scopes characterized by challenging technical, time and cost requirements <ref type="bibr" target="#b2">[3]</ref> and the increasing number of stakeholders involved <ref type="bibr" target="#b3">[4]</ref>. Thus, to assure a successful software project <ref type="bibr" target="#b4">[5]</ref>, it is particularly important to stress concepts such as data and information security in all phases of the software development life cycle (SDLC) <ref type="bibr" target="#b5">[6]</ref>. Software errors can be introduced by disconnections and miscommunications during planning, development, testing and maintenance of the components <ref type="bibr" target="#b6">[7]</ref>.</p><p>So, in order to satisfy security requirements, it becomes necessary to identify the key elements associated to the privacy and security-oriented software development, and to support decision making in all phases of the software life cycle.</p><p>Accordingly, this paper presents the key elements for privacy-oriented software development formalized in a knowledge base and a collaborative tool that integrates these elements. The tool supports decision making in all the software development lifecycle phases in order to integrate privacy and security requirements.</p><p>The paper is organized as follows. Section 2 discusses related works. Section 3 describes the tool and Section 4 reports the evaluation of collaborative tool and the obtained results. Finally, conclusions are given in Section 5.</p><p>SEBD 2021: The 29th Italian Symposium on Advanced Database Systems, September 5-9, 2021, Pizzo Calabro (VV), Italy EMAIL: mariateresa.baldassarre@uniba.it (A. 1); vita.barletta@uniba.it (A. 2); danilo.caivano@uniba.it (A. 3); giovanni.dimauro@uniba.it (A. 4); antonio.piccinno@uniba.it (A. 5) ORCID: 0000-0001-8589-2850 (A. 1); 0000-0002-0163-6786 (A. 2); 0000-0001-5719-7447 (A. 3); 0000-0002-4120-5876 (A. 4); 0000-0003-1561-7073 (A. 5)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Works</head><p>Software development requires integration of security and privacy to address threats related to cyberattack <ref type="bibr" target="#b7">[8]</ref>. So, for secure software development, it is particularly important to stress concepts such as data and information security in project activities which deal with or target aspects such as integrity, availability, and confidentiality <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b9">10]</ref>. This imposes, see for example the provisions on the subject dictated by the GDPR, "General Data Protection Regulation" <ref type="bibr" target="#b10">[11]</ref>, the adoption of processes and tools to mitigate the risks related to security and data privacy.</p><p>Privacy by Design <ref type="bibr" target="#b11">[12]</ref> is a fundamental concept for software development as it requires data protection and the implementation of technical and organizational measures to protect the rights of users <ref type="bibr" target="#b12">[13]</ref>. Confidentiality, integrity, availability, unlikability, transparency and intervenability are considered the six protection goals that provide a common scheme for addressing the legal, technical, economic and social dimension of privacy and data protection in complex IT systems <ref type="bibr" target="#b13">[14]</ref>.</p><p>The methodologies include two categories, Security-based adaptations, i.e., Privacy Engineering methodologies that are based and originated from security engineering methodologies, and Privacy-Friendly systems that aim to embed privacy into every step of the software development life cycle <ref type="bibr" target="#b14">[15]</ref>. Therefore, a number of privacy requirements methodologies have been introduced in order to assist system designers and developers to analyze and elicit privacy requirements for different software systems and in different architectures <ref type="bibr" target="#b15">[16]</ref>.</p><p>LINDDUN <ref type="bibr" target="#b16">[17]</ref> is a privacy threat modeling methodology that supports analysts in systematically eliciting and mitigating privacy threats in software architectures. The identified privacy threats are mapped with the existing privacy-enhancing technologies (PETs) <ref type="bibr" target="#b17">[18]</ref>. PriS methods describes the effect of privacy requirements on business processes and facilitate the identification of the system architecture that best supports the privacy-related business processes <ref type="bibr" target="#b18">[19]</ref>. SQUARE <ref type="bibr" target="#b19">[20]</ref> security quality requirements engineering methodology supports the elicitation of privacy requirements at the early stages of software life cycle. It consists of nine steps which include what techniques will be used to elicit security requirements then categorize, prioritize, and inspect the requirements. STRAP <ref type="bibr" target="#b20">[21]</ref> is a light-weight structured analysis of privacy vulnerabilities into the software development cycle. RBAC <ref type="bibr" target="#b21">[22]</ref> method considers privacy requirements as constraints on permissions and user roles in order to define access control policies. PRIPARE introduces how privacy requirements should be incorporated into the software development life cycle <ref type="bibr" target="#b22">[23]</ref>.</p><p>Reviewing each of these methodologies, privacy requirements are addressed during the first phases of the SDLC, but never in all the phases. Therefore, it is necessary to integrate privacy in all phases of the development. Considering this need, the research work presents a tool to support the development team in all phases of the SDLC.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Collaborative Tool Proposal</head><p>Starting from the work illustrated in <ref type="bibr" target="#b23">[24]</ref>, the tool has been improved to overcome the limitations highlighted in the first experiment. It integrates the formalization of the privacy key elements in order to support decisions and choices in all phases of the software development (Figure <ref type="figure">1</ref>). The five elements identified are Privacy by Design Principles, Privacy Design Strategies, Privacy Patterns, Vulnerabilities and Context. <ref type="bibr" target="#b11">[12]</ref> that describe the privacy model, each of which specify actions and responsibilities:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Privacy by Design Principles</head><p>1. anticipate and prevent privacy-invasive events before they happen (Proactive not Reactive); 2. build privacy measures directly into any given ICT system or business practice by default (Privacy as the Default); 3. embed privacy into the design and architecture (Privacy Embedded in to Design); 4. accommodate all legitimate interests and objectives in a positive-sum manner, not through a zero-sum approach involving unnecessary trade-offs (Full Functionality); 5. ensure secure life-cycle management of information (End-to-End Lifecycle Protection);</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">keep component parts of systems and operations of business practices visible and transparent,</head><p>to user and providers alike (Visibility and Transparency); 7. respect and protect interests of the individual, above all (Respect for User Privacy). <ref type="bibr" target="#b24">[25]</ref> that help IT architects to support Privacy by Design early in the software development life cycle. They are divided in two different categories:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Privacy Design Strategies</head><p>• Data-Oriented Strategies focus on the privacy-friendly processing of the data (Minimize, Hide, Separate, Abstract). • Process-Oriented Strategies focus on the process surrounding the responsible handling of personal data (Inform, Control, Enforce, Demonstrate).</p><p>Privacy Pattern <ref type="bibr" target="#b25">[26]</ref> that underline the concept of pattern and can be used in all those situations where privacy is violated, and a user's personal data is no longer secure. Patterns are a literary format with which to capture the knowledge and experience of security experts, resulting in a structured document in the form of a template to which the security experts' knowledge is transferred <ref type="bibr" target="#b26">[27,</ref><ref type="bibr" target="#b27">28]</ref>.</p><p>Vulnerabilities within the code allow a malicious user to attack the application <ref type="bibr" target="#b6">[7]</ref>.</p><p>Context, that integrates Architectural Requirements to determine the flow of data within the system, components, roles and responsibilities; Use Cases and Scenarios to define all interactions within the system and protect the data from unauthorized reading and manipulation; and Privacy Enhancing Technologies (PETs) to protect the personal information handled by the applications.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1: Privacy Knowledge Base: Key Elements</head><p>The collaborative tool supports the team's choices in all the software development phases in order to integrate security and privacy. At each stage of the SDLC, knowledge and skills are required to be able to develop a product that respects the principles of privacy and security by design. But many times, within the team certain knowledge are not present, such as knowing step by step the basic points of the GDPR <ref type="bibr" target="#b10">[11]</ref> in order to provide a software product that is compliant. In order to overcome this limitation and provide operational guidelines to the development team, the tool allows you to select the necessary elements to be able to introduce privacy and security requirements throughout the software lifecycle. For example, starting from the vulnerabilities identified in the static code analysis the developer in addition to viewing a brief description of the vulnerability and an example, can also look at the privacy by design principles violated and view the privacy patterns that allow to mitigate the vulnerability and implement privacy strategies to correct the architectural flaws.</p><p>In Figure <ref type="figure" target="#fig_0">2</ref> are reported that OWASP Top 10 -2017 <ref type="bibr" target="#b28">[29]</ref>, and the detail of Sensitive Data Exposure vulnerability. In addition, for each pattern identified for a particular vulnerability, it is shown how to implement it within a particular architecture chosen by the developer and on which he is working. If, for example, a privacy pattern or any other element of the knowledge base is not present, the team has the possibility to insert it in order to extend it. Figure <ref type="figure" target="#fig_1">3</ref> shows the addition of a pattern where it requires the title, which privacy strategy it implements, the context, the problem, the solution, the UML diagram, the vulnerability it mitigates, and the architecture.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Evaluation</head><p>To evaluate the potential benefits of the tool in order to integrate privacy and security in software, we conducted a pilot experiment with 8 bachelor students in computer science, software engineering curriculum.</p><p>The students have taken the traditional software engineering course and have no expertise in both software development and in applying privacy oriented methodologies. The average is 22 years old. They were divided into 2 groups and asked to re-engineer a system developed by their colleagues in previous years during the software engineering course.</p><p>The system called "Civic Sense" allows a citizen to report failures, problems, malfunctions and, in general, events relevant to an entity that provides services or manages infrastructure of public interest (electricity, roads and streets, urban safety, etc.).</p><p>As in the previous study in which we involved junior developers <ref type="bibr" target="#b23">[24]</ref>, the tasks assigned to the two groups are the following:</p><p>• Task 1: Identify the principles of Privacy by Design violated by vulnerability.</p><p>• Task 2: Identify the Privacy Design Strategies to be implemented in the system to respect the principles of Privacy by Design. • Task 3: Identify the privacy patterns that substantiate the Privacy Design Strategies.</p><p>• Task 4: Identify the Data Strategies Component to implement in Target Architecture in order to re-engineer the system from a privacy point of view. • Task 5: Identify the Processes Component Strategies to implement in Target Architecture in order to re-engineer the system from a privacy point of view. In order to perform the required tasks, each group was provided with a security report containing the list of vulnerabilities identified during the static code analysis of the system (Issue ID, Category, Severity, Short Description). The following is an example of the Privacy Violation category.</p><p>Abstract: The file loginn.php mishandles confidential information on line 12, which can compromise user privacy and is often illegal. Explanation: Privacy violations occur when: 1. Private user information enters the program. 2. The data is written to an external location, such as the console, file system, or network. Example: The following code contains a logging statement that tracks the contents of records added to a database by storing them in a log file. Among other values that are stored is the return value from the getPassword() function that returns user-supplied plaintext password associated with the account.</p><p>&lt;?php $pass = getPassword(); trigger_error($id . ":" . $pass . ":" . $type . ":" . $tstamp); ?&gt; The code in the example above logs a plaintext password to the application eventlog. Although many developers trust the eventlog as a safe storage location for data, it should not be trusted implicitly, particularly when privacy is a concern. Private data can enter a program in a variety of ways: -Directly from the user in the form of a password or personal information -Accessed from a database or other data store by the application -Indirectly from a partner or other third party Sometimes data that is not labeled as private can have a privacy implication in a different context. For example, student identification numbers are usually not considered private because there is no explicit and publiclyavailable mapping to an individual student's personal information. However, if a school generates identification numbers based on student social security numbers, then the identification numbers should be considered private. Security and privacy concerns often seem to compete with each other. From a security perspective, you should record all important operations so that any anomalous activity can later be identified. However, when private data is involved, this practice can create risk.</p><p>Then, starting from the security report, the students carried out each task in order. Each task was done in different sessions, one for each task, and each session was done in parallel. This was done to prevent the two groups from communicating with each other and knowing in advance the task to be performed. In addition, each group was observed by a researcher.</p><p>Keeping in mind that the research goal is to support the development team in all phases of the security and privacy oriented software lifecycle, we did not set out to investigate the developers' productivity. The focus was to observe the interaction with the tool to operationally implement guidelines in privacy-oriented software development and collect information to improve the tool.</p><p>Table <ref type="table" target="#tab_0">1</ref> and Table <ref type="table">2</ref> present the results obtained using the tool in re-engineering Civic Sense. All tasks were done correctly although Task 4 of Group A was not accomplish by the time limit. In each session, it was critical to observe task execution to understand user behavior in being able to retrieve the information needed in reengineering the system.</p><p>The students' feedback was positive in being able to use a single tool that would allow them to view all the information needed to integrate privacy and security requirements operatively. Figure <ref type="figure" target="#fig_2">4</ref> shows an example of the architecture with the identification of privacy patterns that implement the privacy design strategies.</p><p>And this was confirmed by the SUS <ref type="bibr" target="#b29">[30]</ref> [31] questionnaire conducted after at the end of the five sessions and the execution of the various tasks. The SUS score obtained was 89,9.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions</head><p>In this research work, we analyzed the potential benefits of a collaborative tool that supports developers in order to integrate privacy and security in software development. The tool integrates the key elements identified in privacy-oriented software development (Principles of Privacy Design, Privacy Design Strategies, Privacy Patterns, Vulnerabilities, Context) and formalized in a knowledge base. The knowledge base shows that it is able to translate best practices for both secure application development and data privacy, into operational guidelines, software architectures and code structures to be used.</p><p>The tool allows to provide all the information needed to integrate privacy and security requirements during each stage of the re-engineering process. Students in the experimentation were positively supported despite not having specific skills in security by design and privacy by design. Indeed, the results demonstrate that the proposed tool supports developers in collaborative contexts integrating privacy and security in software development processes.</p><p>The positive results obtained by this study with bachelor students and the previous one with junior developers, encouraged us to plan for further case studies and evaluate developer's productivity with the collaborative tool.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Vulnerabilities in Privacy Knowledge Base</figDesc><graphic coords="4,80.00,109.95,434.90,302.95" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Privacy Patterns in Privacy Knowledge Base</figDesc><graphic coords="4,86.20,464.32,431.37,251.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Target Architecture Result</figDesc><graphic coords="6,72.00,312.33,451.00,315.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="3,188.40,317.69,231.97,222.58" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Task Results Group A</figDesc><table><row><cell>Task</cell><cell>Goal</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Managing a Smart City Integrated Model through Smart Program Management</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Barletta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Caivano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Dimauro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nannavecchia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Scalera</surname></persName>
		</author>
		<idno type="DOI">10.3390/app10020714</idno>
		<ptr target="https://doi.org/10.3390/app10020714" />
	</analytic>
	<monogr>
		<title level="j">Appl. Sci</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page">714</biblScope>
			<date type="published" when="2020">2020. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Digitally enhanced assessment in virtual learning environments</title>
		<author>
			<persName><forename type="first">E</forename><surname>Pesare</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Roselli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Rossano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Di Bitonto</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jvlc.2015.10.021</idno>
		<ptr target="https://doi.org/10.1016/j.jvlc.2015.10.021" />
	</analytic>
	<monogr>
		<title level="j">Journal of Visual Languages &amp; Computing</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="page" from="252" to="259" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A Kohonen SOM Architecture for Intrusion Detection on In-Vehicle Communication Networks</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Barletta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Caivano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nannavecchia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Scalera</surname></persName>
		</author>
		<idno type="DOI">10.3390/app10155062</idno>
		<ptr target="https://doi.org/10.3390/app10155062" />
	</analytic>
	<monogr>
		<title level="j">Appl. Sci</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page">5062</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Project Management: Driving Complexity</title>
		<author>
			<persName><forename type="first">F</forename><surname>Nonino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Annarelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gerosa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Mosca</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Setti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">PMI® Italian Academic Workshop</title>
				<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Privacy Oriented Software Development</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Baldassarre</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Barletta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Caivano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Scalera</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-29238-6_2</idno>
		<ptr target="https://doi.org/10.1007/978-3-030-29238-6_2" />
	</analytic>
	<monogr>
		<title level="j">Communications in Computer and Information Science</title>
		<imprint>
			<biblScope unit="page" from="18" to="32" />
			<date type="published" when="1010">2019. 1010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Security and Project Management</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">J</forename><surname>Ellison</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
		</imprint>
		<respStmt>
			<orgName>Software Engineering Institute -Carnegie Mellon University</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Integrating security and privacy in software development</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Baldassarre</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Barletta</surname></persName>
		</author>
		<author>
			<persName><surname>Caivano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Scalera</surname></persName>
		</author>
		<idno type="DOI">10.1007/s11219-020-09501-6</idno>
		<ptr target="https://doi.org/10.1007/s11219-020-09501-6" />
	</analytic>
	<monogr>
		<title level="j">Software Qual J</title>
		<imprint>
			<date type="published" when="2020">2020. 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Teaching Cyber Security: The Hack-Space Integrated Model</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Baldassarre</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Barletta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Caivano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Raguseo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Scalera</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Third Italian Conference on Cyber Security</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<meeting>the Third Italian Conference on Cyber Security</meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">2315</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">A survey of emerging threats in cybersecurity</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">J</forename><surname>Jaccard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Nepal</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jcss.2014.02.005</idno>
		<ptr target="https://doi.org/10.1016/j.jcss.2014.02.005" />
	</analytic>
	<monogr>
		<title level="j">Journal of computer and System Sciences</title>
		<imprint>
			<biblScope unit="volume">80</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="973" to="993" />
			<date type="published" when="2014-08">2014. August 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Design and Execution of Integrated Clinical Pathway: A Simplified Meta-Model and Associated Methodology</title>
		<author>
			<persName><forename type="first">C</forename><surname>Ardito</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Caivano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Colizzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Dimauro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Verardi</surname></persName>
		</author>
		<idno type="DOI">10.3390/info11070362</idno>
		<ptr target="https://doi.org/10.3390/info11070362" />
	</analytic>
	<monogr>
		<title level="j">Information</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page">362</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data</title>
	</analytic>
	<monogr>
		<title level="m">and on the free movement of such data, and repealing Directive 95</title>
				<imprint/>
	</monogr>
	<note>/46/EC</note>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Privacy by Design: The 7 Foundational Principles</title>
		<author>
			<persName><forename type="first">A</forename><surname>Cavoukian</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Operationalizing Privacy by Design: A Guide to Implementing Strong Privacy Practices</title>
		<author>
			<persName><forename type="first">A</forename><surname>Cavoukian</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="1" to="72" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Protection Goals for Privacy Engineering</title>
		<author>
			<persName><forename type="first">M</forename><surname>Hansen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Jensen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rost</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE Security and Privacy Workshops</title>
				<meeting><address><addrLine>San Jose, CA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">2015. 2015</date>
			<biblScope unit="page" from="159" to="166" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Privacy Engineering Methodologies: A survey</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Al-Slais</surname></persName>
		</author>
		<idno type="DOI">10.1109/3ICT51146.2020.9311949</idno>
	</analytic>
	<monogr>
		<title level="m">International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT)</title>
				<meeting><address><addrLine>Sakheer, Bahrain</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Towards the Design of Usable Privacy by Design Methodologies</title>
		<author>
			<persName><forename type="first">A</forename><surname>Pattakou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mavroeidi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Diamantopoulou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Kalloniatis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gritzalis</surname></persName>
		</author>
		<idno type="DOI">10.1109/ESPRE.2018.00007</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 5th International Workshop on Evolving Security &amp; Privacy Requirements Engineering (ESPRE)</title>
				<meeting><address><addrLine>Banff, AB, Canada</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="1" to="8" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements</title>
		<author>
			<persName><forename type="first">M</forename><surname>Deng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Wuyts</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Scandariato</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Preneel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Joosen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Requirements Engineering</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="3" to="32" />
			<date type="published" when="2011">2011. 2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<title level="m" type="main">Handbook of Privacy and Privacy-Enhancing Technologies. The Case of Intelligent Software Agents</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">W</forename><surname>Van Blarkom</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">J</forename><surname>Borking</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">G E</forename><surname>Olk</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
			<publisher>College Bescherming Bersoonsgegevens</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Addressing privacy requirements in system design: the PriS method</title>
		<author>
			<persName><forename type="first">C</forename><surname>Kallpniatis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Kavakli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gritzalis</surname></persName>
		</author>
		<idno type="DOI">10.1007/s00766-008-0067-3</idno>
		<ptr target="https://doi.org/10.1007/s00766-008-0067-3" />
	</analytic>
	<monogr>
		<title level="j">Requirements Engineering</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="241" to="255" />
			<date type="published" when="2008">2008</date>
			<publisher>Springer-Verlag</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Security quality requirements engineering (SQUARE) methodology</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">R</forename><surname>Mead</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Stehney</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="1" to="7" />
			<date type="published" when="2005">2005. 2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<title level="m" type="main">STRAP: a structured analysis framework for privacy</title>
		<author>
			<persName><forename type="first">C</forename><surname>Jensen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Tullio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Potts</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">D</forename><surname>Mynatt</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2005">2005. 2005</date>
		</imprint>
		<respStmt>
			<orgName>Georgia Institute of Technology</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">A framework for modelling privacy requirements in role engineering</title>
		<author>
			<persName><forename type="first">Q</forename><surname>He</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">I</forename><surname>Anton</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of REFSQ</title>
				<meeting>REFSQ</meeting>
		<imprint>
			<date type="published" when="2003">2003. 2003</date>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="137" to="146" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology</title>
		<author>
			<persName><forename type="first">N</forename><surname>Notario</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Crespo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">S</forename><surname>Martìn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Del Alamo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Le Métayer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Antignac</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kung</surname></persName>
		</author>
		<idno type="DOI">10.1109/SPW.2015.22</idno>
		<ptr target="https://doi.org/10.1109/SPW.2015.22" />
	</analytic>
	<monogr>
		<title level="m">IEEE Security and Privacy Workshops</title>
				<meeting><address><addrLine>San Jose, CA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="151" to="158" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">A Visual Tool for Supporting Decision-Making in Privacy Oriented Software Development</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Baldassarre</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Barletta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Caivano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Piccinno</surname></persName>
		</author>
		<idno type="DOI">10.1145/3399715.3399818</idno>
		<ptr target="https://doi.org/10.1145/3399715.3399818" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Advanced Visual Interfaces (AVI &apos;20)</title>
				<meeting>the International Conference on Advanced Visual Interfaces (AVI &apos;20)<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Association for Computing Machinery</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Privacy Design Strategies</title>
		<author>
			<persName><forename type="first">J.-H</forename><surname>Hoepman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IFIP, ICT Systems Security and Privacy Protection</title>
				<meeting><address><addrLine>Berlin Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="446" to="459" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<ptr target="https://privacypatterns.org.Resourcedocument" />
		<title level="m">Privacy Patterns</title>
				<imprint>
			<date type="published" when="2020-01-10">10 January 2020</date>
		</imprint>
		<respStmt>
			<orgName>UC Berkeley, School of Information</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">Example Security Patterns and Annotations</title>
		<author>
			<persName><forename type="first">M</forename><surname>Schumacher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Security Engineering with Patterns</title>
				<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="171" to="178" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<monogr>
		<title level="m" type="main">A new pattern template to support the design of security architectures</title>
		<author>
			<persName><forename type="first">S</forename><surname>Moral-García</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Ortiz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Moral-Rubio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Vela</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Garzás</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Fernández-Medina</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<title level="m" type="main">The Open Web Application Security Project</title>
		<idno>OWASP Top 10-2017</idno>
		<ptr target="https://www.owasp.org/index.php/Category:OWASP_Top_Ten_2017_Project" />
		<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note>The Ten Most Critical Web Application Security Risks</note>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">SUS -A quick and dirty usability scale</title>
		<author>
			<persName><forename type="first">J</forename><surname>Brooke</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Usability evaluation in industry</title>
				<imprint>
			<publisher>CRC Press</publisher>
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">On the dimensionality of the System Usability Scale: a test of alternative measurement models</title>
		<author>
			<persName><forename type="first">S</forename><surname>Borsci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Federici</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lauriola</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10339-009-0268-9</idno>
	</analytic>
	<monogr>
		<title level="j">Cognitive Processing</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="193" to="197" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
