The challenges of privacy by design

@article{Spiekermann2012TheCO,
  title={The challenges of privacy by design},
  author={Sarah Spiekermann},
  journal={Cybersecurity},
  year={2012}
}
Heralded by regulators, Privacy by Design holds the promise to solve the digital world's privacy problems. But there are immense challenges, including management commitment and step-by-step methods to integrate privacy into systems. 

Topics from this paper

A Strategy for Operationalizing Privacy by Design
TLDR
This article addresses the gap between the abstract principles of PbD and their operationalization into more concrete implementation guidelines for software engineers with a range of best practice examples.
PRIPARE: A New Vision on Engineering Privacy and Security by Design
TLDR
PRIPARE confronts the lack of a truly engineering approach for these concepts by providing a methodology that merges state-of-the-art approaches and complements them with new processes that cover the whole lifecycle of both, personal data and development of ICT systems.
Designing Privacy for You Practical Approach for User-Centric Privacy
Privacy directly concerns the user as the data owner (datasubject) and hence privacy in systems should be implemented in a manner which concerns the user (user-centered). There are many concepts and
Big Data in the workplace: Privacy Due Diligence as a human rights-based approach to employee privacy protection
Data-driven technologies have come to pervade almost every aspect of business life, extending to employee monitoring and algorithmic management. How can employee privacy be protected in the age of
Engineering Privacy by Design: Are engineers ready to live up to the challenge?
TLDR
Six senior engineers interviewed investigated their motivation and ability to comply with privacy regulations point to a lack of perceived responsibility, control, autonomy, and frustrations with interactions with the legal world.
Designing Privacy for You: A Practical Approach for User-Centric Privacy - Practical Approach for User-Centric Privacy
TLDR
Through this research, this research proposes a framework that would enable developers and designers to grasp privacy in a user-centered manner and implement it along with the software development life cycle.
The Third Wave?: Inclusive Privacy and Security
  • Yang Wang
  • Computer Science
    NSPW
  • 2017
TLDR
This article proposes and advocate for a third wave of research that is concerned with designing security and privacy mechanisms that are inclusive to people with various characteristics, abilities, needs and values, and presents a preliminary research framework and research agenda for advancing inclusiveSecurity and privacy.
SIED, a Data Privacy Engineering Framework
TLDR
This study proposes SIED (Specification, Implementation, Evaluation, and Dissemination), a conceptual framework that takes a holistic approach to the data privacy engineering procedure by looking at the specifications, implementation, evaluation, and finally, dissemination of the privatized data sets.
Towards a Principled Approach for Engineering Privacy by Design
TLDR
This work analyzes three privacy requirements engineering methods and derives a set of criteria that aid in identifying data-processing activities that may lead to privacy violations and harms and also aid in specifying appropriate design decisions.
Is Privacy by Construction Possible?
TLDR
The main question is how much privacy can you effectively achieve by using PbD, and in particular whether it is possible to achieve Privacy by Construction.
...
1
2
3
4
5
...

References

SHOWING 1-5 OF 5 REFERENCES
Engineering Privacy
TLDR
The paper uses a three-layer model of user privacy concerns to relate them to system operations and examine their effects on user behavior, and develops guidelines for building privacy-friendly systems.
Privacy by design Curriculum
  • http://privacybydesign.ca/publications/
  • 2011
Privacy by design Curriculum 2 http://privacybydesign.ca/publications/. 2. spiekermann, s. and Cranor, l.F. engineering privacy
  • IEEE Transactions on Software Engineering
  • 2009
Copyright held by author
  • Copyright held by author
Sarah Spiekermann (sspieker@wu.ac.at) is the head of the institute for Management information systems at the vienna university of economics and business
  • Sarah Spiekermann (sspieker@wu.ac.at) is the head of the institute for Management information systems at the vienna university of economics and business