skip to main content
10.1145/3613372.3613375acmotherconferencesArticle/Chapter ViewAbstractPublication PagessbesConference Proceedingsconference-collections
research-article

Adoption of the LGPD Inventory in the User Stories and BDD Scenarios Creation

Authors Info & Claims
Published:25 September 2023Publication History

ABSTRACT

Today's society heavily relies on intelligent technologies that capture and monitor real-time data, necessitating strong measures to ensure personal data privacy and protection. Regulatory frameworks like the General Data Protection Law (LGPD) in Brazil require software development to consider privacy throughout the software life cycle, significantly impacting the Requirements Engineering process. The LGPD mandates all companies to maintain a Personal Data Inventory (PDI) that records the flow of personal data from collection to disposal. This study investigates the feasibility of using the PDI in creating User Stories and Behavior-Driven Development (BDD) Scenarios, commonly used in requirements documentation for agile methodologies. Our research examines the correlation between PDI elements and User Stories/BDD Scenarios to assess their compatibility for representing and documenting software functionalities. The findings propose a mapping between these elements, supporting further research in Software Engineering and Information Security. The IDP shows promise in facilitating the construction of User Stories and BDD Scenarios and serves as a foundational reference for developing the PDI, a crucial legal document.

References

  1. Lei Geral de Proteção de Dados (LGPD), Lei no. 13.709, de 14 de agosto de 2018.Google ScholarGoogle Scholar
  2. General Data Protection Regulation (GDPR), Regulation (EU) 2016/679, 27 April 2016.Google ScholarGoogle Scholar
  3. Alkubaisy, D., Piras, L., Al-Obeidallah, M.G., Cox, K. And Mouratidis, H. 2022. A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design. In Ali, R., Kaindl, H. and Maciaszek, L.A. (eds.). Cham: Springer [online], pages 67-87. Available from: https://doi.org/10.1007/978-3-030-96648-5_4Google ScholarGoogle ScholarCross RefCross Ref
  4. Senarath, A.R., Arachchilage, N.A.G., 2018b. Understanding user privacy expectations: A software developer's perspective. Telemat. Inform. 35, 1845-1862. http://dx.doi.org/10.1016/j.tele.2018.05.012.Google ScholarGoogle ScholarCross RefCross Ref
  5. Senarath, A., Grobler, M., Arachchilage, N.A.G., 2019. Will they use it or not? Investigating software developers' intention to follow privacy engineering methodologies. ACM Trans. Priv. Secur. 22, 1-30. http://dx.doi.org/10.1145/ 3364224.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. ANPD. Guia de Elaboração de Inventário de Dados Pessoais. Brasília, DF: ANPD, [2023]. Disponível em: https://www.gov.br/governodigital/pt-br/seguranca-e-protecao-de-dados/ppsi/guia_inventario_dados_pessoais.pdf. Acesso em: May 01, 2023.Google ScholarGoogle Scholar
  7. A Mihel A, Vrhovec S, Hovelja T. Agile development of secure software for small and medium-sized enterprises. Sustainability. 2023;15(1):801.Google ScholarGoogle Scholar
  8. Georges T, Guiding feature models synthesis from user-stories: an exploratory approach. Synthesis. 2023. 30:31.Google ScholarGoogle Scholar
  9. Parsa S. Acceptance testing and behavior driven development (BDD). In: Software Testing Automation: Testability Evaluation, Refactoring, Test Data Generation and Fault Localization. Cham: Springer International Publishing; 2023. p. 79-158.Google ScholarGoogle ScholarCross RefCross Ref
  10. Peixoto, M., Silva, C., Lima, R., Araújo, J., Gorschek, T., & Silva, J. (2019). PCM Tool: Privacy Requirements Specification in Agile Software Development. In Anais Estendidos do X Congresso Brasileiro de Software: Teoria e Prática, (pp. 108-113). Porto Alegre: SBC. doi:10.5753/cbsoft_estendido.2019.7666Google ScholarGoogle ScholarCross RefCross Ref
  11. Peixoto, Mariana, "The perspective of Brazilian software developers on data privacy." Journal of Systems and Software 195 (2023): 111523.Google ScholarGoogle Scholar
  12. de Melo Filho DR, Metodologia Scrum: Uma aliada na implementação da LGPD. Research, Society and Development. 2023;12(4):e22712441189-e22712441189.Google ScholarGoogle Scholar
  13. Cardoso DL, Cardoso T. Adequação da LGPD via "Projetos Ágeis Scrum". Boletim do Gerenciamento. 2023. 35(35):28-41.Google ScholarGoogle Scholar
  14. Camílio MN, Alves CF. G-Priv: Um Guia para Apoiar a Especificação de Requisitos de Privacidade em Conformidade com a LGPD. iSys-Brazilian Journal of Information Systems. 2023. 16(1):2-1.Google ScholarGoogle Scholar
  15. Pohl K, Rupp C. Requirements Engineering: Fundamentals, Principles, and Techniques. Springer; 2015.Google ScholarGoogle Scholar
  16. R Rose, S.; Wynne, M.; Helles‚àö‚àèy, A. The Cucumber for Java Book: Behaviour-Driven Development for Testers and Developers. Birmingham: Pragmatic Bookshelf, 2015.Google ScholarGoogle Scholar

Index Terms

  1. Adoption of the LGPD Inventory in the User Stories and BDD Scenarios Creation
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              SBES '23: Proceedings of the XXXVII Brazilian Symposium on Software Engineering
              September 2023
              570 pages
              ISBN:9798400707872
              DOI:10.1145/3613372

              Copyright © 2023 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 25 September 2023

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed limited

              Acceptance Rates

              Overall Acceptance Rate147of427submissions,34%
            • Article Metrics

              • Downloads (Last 12 months)30
              • Downloads (Last 6 weeks)1

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format