1 Department of Computing Sciences, Cybersecurity Programme, Admiralty University of Nigeria.
2 Department of Computer Science, Federal Cooperative College, Oji, Nigeria
3Department of Computer Science, Federal Polytechnic Oko, Anambra State, Nigeria
World Journal of Advanced Research and Reviews, 2025, 26(01), 1233-1240
Article DOI: 10.30574/wjarr.2025.26.1.0538
Received on 27 February 2025; revised on 05 April 2025; accepted on 07 April 2025
Globally, the increase in cyber-attacks and data breaches in the coming years has been predicted by reputable sources. The latest statistics from Cybersecurity Ventures project successful cyber-attacks could cost businesses over $10.5 trillion annually by 2025. In this context, information systems and software solutions have to change, as traditional practices, by incorporating security controls at later stages of development. 'Privacy by Design' (PbD) is attracting considerable resources, focus, and logically encouraging data protection as best practice applicable across the data lifecycle. However, the implementation of the PbD principle remains a challenge. Numerous developers cannot strike equilibrium between ‘functionality’ and privacy due to insufficient guidelines and resources. Many organizations with appropriate leadership have achieved higher levels within the boundaries of IT that effectively integrate PbD, while others are constantly trying to catch up. This paper aims to fill these gaps by incorporating different research outcomes, statistics, and best practices for incorporating privacy in information systems design practice. This contribution will assist IT practitioners in mitigating data breaches and adherence to the changing privacy laws which in the long run improve user confidence and data security in the systems being used
Privacy-By-Design; SDLC; Data Security; Pbd Strategies; Privacy-Regulations
Preview Article PDF
Ifeyinwa Nkemdilim Obiokafor, Michael Ebere Ajonuma and Felix Chukwuma Aguboshim. Integrating Privacy by Design (PbD) in the system development life cycle for enhanced data protection. World Journal of Advanced Research and Reviews, 2025, 26(01), 1233-1240. Article DOI: https://doi.org/10.30574/wjarr.2025.26.1.0538.
Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0