Next Article in Journal
Forecasting Monthly Electricity Demands: An Application of Neural Networks Trained by Heuristic Algorithms
Next Article in Special Issue
A Framework for Systematic Refinement of Trustworthiness Requirements
Previous Article in Journal
Structural and Functional Modeling of Artificial Bioactive Proteins
Article Menu

Export Article

Open AccessArticle

Computer-Aided Identification and Validation of Intervenability Requirements

The Ruhr Institute for Software Technology, University of Duisburg-Essen, Duisburg 47057, Germany
Author to whom correspondence should be addressed.
Academic Editors: Steven Furnell, Sokratis K. Katsikas and Costas Lambrinoudakis
Information 2017, 8(1), 30;
Received: 15 December 2016 / Accepted: 6 March 2017 / Published: 9 March 2017
(This article belongs to the Special Issue Trust, Privacy and Security in Digital Business)
PDF [631 KB, uploaded 13 March 2017]


Privacy as a software quality is becoming more important these days and should not be underestimated during the development of software that processes personal data. The privacy goal of intervenability, in contrast to unlinkability (including anonymity and pseudonymity), has so far received little attention in research. Intervenability aims for the empowerment of end-users by keeping their personal data and how it is processed by the software system under their control. Several surveys have pointed out that the lack of intervenability options is a central privacy concern of end-users. In this paper, we systematically assess the privacy goal of intervenability and set up a software requirements taxonomy that relates the identified intervenability requirements with a taxonomy of transparency requirements. Furthermore, we provide a tool-supported method to identify intervenability requirements from the functional requirements of a software system. This tool-supported method provides the means to elicit and validate intervenability requirements in a computer-aided way. Our combined taxonomy of intervenability and transparency requirements gives a detailed view on the privacy goal of intervenability and its relation to transparency. We validated the completeness of our taxonomy by comparing it to the relevant literature that we derived based on a systematic literature review. The proposed method for the identification of intervenability requirements shall support requirements engineers to elicit and document intervenability requirements in compliance with the EU General Data Protection Regulation. View Full-Text
Keywords: privacy; privacy requirements; intervenability; privacy analysis; requirements engineering; computer-aided software engineering privacy; privacy requirements; intervenability; privacy analysis; requirements engineering; computer-aided software engineering

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Meis, R.; Heisel, M. Computer-Aided Identification and Validation of Intervenability Requirements. Information 2017, 8, 30.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Information EISSN 2078-2489 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top