[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2695664.2695788acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

An approach to early evaluation of informational privacy requirements

Published: 13 April 2015 Publication History

Abstract

The widespread availability of information in the digital age places a significant demand on the privacy needs of individuals. However, privacy considerations in requirements management are often treated as non-functional concerns and in particular, early feedback of privacy concerns is not easily embedded into current requirements practice. Luciano Floridi's Ontological Theory of Informational Privacy presents an extensive interpretation of informational privacy using concepts such as ontological friction. This paper first recasts the theory in terms of modelling constructs and then applies the theory in the form of a Bayesian network of beliefs in the context of an existing research project aimed at developing socio-technical system delivered as a mobile app in the UK youth justice system. The operationalisation of the theory and its relationship to value sensitive design creates opportunities for early evaluation of informational privacy concerns in the requirements process.

References

[1]
Balbir S Barn and Tony Clark. A domain specific language for contextual design. In Human-Centred Software Engineering, pages 46--61. Springer, 2010.
[2]
Sally Bean. Rethinking enterprise architecture using systems and complexity approaches. Journal of Enterprise Architecture, 6(4):7--13, 2010.
[3]
G. Bjerknes, P. Ehn, M. Kyng, and K. Nygaard. Computers and democracy: A Scandinavian challenge. Gower Pub Co, 1987.
[4]
Youth Justice Board. Annual report and accounts 2013/14, 2014. http://tinyurl.com/ozxtrz6.
[5]
Barry Boehm. Value-based software engineering: reinventing. ACM SIGSOFT Software Engineering Notes, 28(2):3, 2003.
[6]
Luciano Floridi. Open problems in the philosophy of information. Metaphilosophy, 35(4):554--582, 2004.
[7]
Luciano Floridi. The ontological interpretation of informational privacy. Ethics and Information Technology, 7(4):185--200, 2005.
[8]
Luciano Floridi. Four challenges for a theory of informational privacy. Ethics and Information technology, 8(3):109--119, 2006.
[9]
Batya Friedman. Value-sensitive design. Interactions, 3(6):16--23, 1996.
[10]
Batya Friedman, Peter H Kahn Jr, and Alan Borning. Value sensitive design and information systems. Human-computer interaction in management information systems: Foundations, 5:348--372, 2006.
[11]
Batya Friedman and Helen Nissenbaum. Bias in computer systems. ACM Transactions on Information Systems (TOIS), 14(3):330--347, 1996.
[12]
Joseph Goguen. Towards a social, ethical theory of information. Social science, technical systems and cooperative work: beyond the great divide, pages 27--56, 1997.
[13]
Joseph A Goguen. Semiotics, compassion and value-centered design. Virtual, Distributed and Flexible Organisations: Studies in Organisational Semiotics, Reading, UK, pages 11--12, 2003.
[14]
Nigel Green and Carl Bate. Lost in Translation: A Handbook for Information Systems in the 21st Century. Evolved Technologist Press, New York, 2007.
[15]
Object Management Group. Unified Modeling Language, 2010. http://www.uml.org/.
[16]
Lucas D Introna. Privacy and the computer: why we need privacy in the information society. Metaphilosophy, 28(3):259--275, 1997.
[17]
Finn V Jensen. An introduction to Bayesian networks, volume 210. UCL press London, 1996.
[18]
Michael J Muller. Participatory design: the third space in hci. Human-computer interaction: Development process, pages 165--185, 2003.
[19]
EB-N Sanders. Generative tools for co-designing. In Collaborative design, pages 3--12. Springer, 2000.
[20]
D. Smith, B. Goldson, and J. Muncie. Youth crime and justice: research, evaluation and 'evidence'. Youth, crime and justice: critical issues, page 78, 2006.
[21]
Lucy Suchman. Do categories have politics? the language/action perspective reconsidered. In Human values and the design of computer technology, pages 91--106. Center for the Study of Language and Information, 1997.
[22]
Norbert Wiener. The machine as threat and promise. Norbert Wiener: Collected Works and Commentaries, 4:673--678, 1985.
[23]
Daisy Yoo, Alina Huldtgren, Jill Palzkill Woelfer, David G Hendry, and Batya Friedman. A value sensitive action-reflection model: evolving a co-design space with stakeholder and designer prompts. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 419--428. ACM, 2013.

Cited By

View all
  • (2020)Value-Sensitive Co-Design for Resilient Information SystemsStudies in Logic, Grammar and Rhetoric10.2478/slgr-2020-003263:1(141-164)Online publication date: 4-Nov-2020
  • (2020)“The dearest of our possessions”: Applying Floridi's information privacy concept in models of information behavior and information literacyJournal of the Association for Information Science and Technology10.1002/asi.24367Online publication date: 19-May-2020
  • (2019)Youth Justice in the Digital Age: A Case Study of Practitioners’ Perspectives on the Challenges and Opportunities of Social Technology in Their Techno-Habitat in the United KingdomYouth Justice10.1177/147322541986956819:3(185-205)Online publication date: 18-Aug-2019
  • Show More Cited By

Index Terms

  1. An approach to early evaluation of informational privacy requirements

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SAC '15: Proceedings of the 30th Annual ACM Symposium on Applied Computing
    April 2015
    2418 pages
    ISBN:9781450331968
    DOI:10.1145/2695664
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 April 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. informational privacy
    2. modelling
    3. simulation

    Qualifiers

    • Research-article

    Conference

    SAC 2015
    Sponsor:
    SAC 2015: Symposium on Applied Computing
    April 13 - 17, 2015
    Salamanca, Spain

    Acceptance Rates

    SAC '15 Paper Acceptance Rate 291 of 1,211 submissions, 24%;
    Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

    Upcoming Conference

    SAC '25
    The 40th ACM/SIGAPP Symposium on Applied Computing
    March 31 - April 4, 2025
    Catania , Italy

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)10
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 18 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)Value-Sensitive Co-Design for Resilient Information SystemsStudies in Logic, Grammar and Rhetoric10.2478/slgr-2020-003263:1(141-164)Online publication date: 4-Nov-2020
    • (2020)“The dearest of our possessions”: Applying Floridi's information privacy concept in models of information behavior and information literacyJournal of the Association for Information Science and Technology10.1002/asi.24367Online publication date: 19-May-2020
    • (2019)Youth Justice in the Digital Age: A Case Study of Practitioners’ Perspectives on the Challenges and Opportunities of Social Technology in Their Techno-Habitat in the United KingdomYouth Justice10.1177/147322541986956819:3(185-205)Online publication date: 18-Aug-2019
    • (2016)An Exploration of Resilience and Values in the Co-Design of Sociotechnical SystemsInternational Journal of Systems and Society10.4018/IJSS.20160101013:1(1-17)Online publication date: Jan-2016
    • (2016)A retrospective analysis of SAC requirementsACM SIGAPP Applied Computing Review10.1145/2993231.299323416:2(26-41)Online publication date: 29-Aug-2016
    • (2015)On the role of value sensitive concerns in software engineering practiceProceedings of the 37th International Conference on Software Engineering - Volume 210.5555/2819009.2819086(497-500)Online publication date: 16-May-2015
    • (2015)On the Role of Value Sensitive Concerns in Software Engineering Practice2015 IEEE/ACM 37th IEEE International Conference on Software Engineering10.1109/ICSE.2015.182(497-500)Online publication date: May-2015

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media