[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
column
Free access

Can you engineer privacy?

Published: 01 August 2014 Publication History

Abstract

The challenges and potential approaches to applying privacy research in engineering practice.

References

[1]
Brandeis, S.W. The right to privacy. Harvard Law Review 4, 5 (1890).
[2]
Dourish, L.P. Unpacking "privacy" for a networked world. In Proceedings of CHI (2003), 129--136.
[3]
Nissenbaum, H. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Palo Alto, CA, 2009.
[4]
NIST. Privacy Engineering Workshop, 2014; http://www.nist.dov/itl/csd/privacy-engineering-workshop.cfm.
[5]
Solove, D. A taxonomy of privacy. University of Pennsylvania Law Review 154, 3 (2006), 477.
[6]
Wang, Y., Leon, P.G., Acquisti, A., Cranor, L.F., Forget, A., and Sadeh, N.M. A field trial of privacy nudges for facebook. In Proceedings of CHI (2014), 2367--2376.
[7]
Westin, A. Privacy and Freedom. Altheneum, NY, 1967.

Cited By

View all
  • (2024)Buttery Smooth: Privacy’s Bundling with Attention in Web Browser PerformanceScience, Technology, & Human Values10.1177/01622439241245801Online publication date: 23-Apr-2024
  • (2024)Towards Privacy-Preserving Machine Learning in Sovereign Data Spaces: Opportunities and ChallengesPrivacy and Identity Management. Sharing in a Digital World10.1007/978-3-031-57978-3_11(158-174)Online publication date: 23-Apr-2024
  • (2023)Future pHealth Ecosystem-Holistic View on Privacy and TrustJournal of Personalized Medicine10.3390/jpm1307104813:7(1048)Online publication date: 26-Jun-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 57, Issue 8
August 2014
92 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/2632661
  • Editor:
  • Moshe Y. Vardi
Issue’s Table of Contents
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 2014
Published in CACM Volume 57, Issue 8

Check for updates

Qualifiers

  • Column
  • Popular
  • Un-reviewed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)353
  • Downloads (Last 6 weeks)102
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Buttery Smooth: Privacy’s Bundling with Attention in Web Browser PerformanceScience, Technology, & Human Values10.1177/01622439241245801Online publication date: 23-Apr-2024
  • (2024)Towards Privacy-Preserving Machine Learning in Sovereign Data Spaces: Opportunities and ChallengesPrivacy and Identity Management. Sharing in a Digital World10.1007/978-3-031-57978-3_11(158-174)Online publication date: 23-Apr-2024
  • (2023)Future pHealth Ecosystem-Holistic View on Privacy and TrustJournal of Personalized Medicine10.3390/jpm1307104813:7(1048)Online publication date: 26-Jun-2023
  • (2023)NE-GConvComputers and Security10.1016/j.cose.2023.103285130:COnline publication date: 1-Jul-2023
  • (2023)Edge intelligence secure frameworksComputers and Security10.1016/j.cose.2023.103278130:COnline publication date: 13-Jul-2023
  • (2023)A system call-based android malware detection approach with homogeneous & heterogeneous ensemble machine learningComputers and Security10.1016/j.cose.2023.103277130:COnline publication date: 13-Jul-2023
  • (2023)Cyber expert feedbackComputers and Security10.1016/j.cose.2023.103268130:COnline publication date: 1-Jul-2023
  • (2023)C-BEDIM and S-BEDIMComputers and Security10.1016/j.cose.2023.103267130:COnline publication date: 1-Jul-2023
  • (2023)Automated GDPR compliance assessment for cross-border personal data transfers in android applicationsComputers and Security10.1016/j.cose.2023.103262130:COnline publication date: 1-Jul-2023
  • (2023)Why people replace their aging smart devicesComputers and Security10.1016/j.cose.2023.103258130:COnline publication date: 13-Jul-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media