[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Engineering Privacy

Published: 01 January 2009 Publication History

Abstract

In this paper we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline's topics. First we discuss privacy requirements grounded in both historic and contemporary perspectives on privacy. We use a three-layer model of user privacy concerns to relate them to system operations (data transfer, storage and processing) and examine their effects on user behavior. In the second part of the paper we develop guidelines for building privacy-friendly systems. We distinguish two approaches: "privacy-by-policy" and "privacy-by-architecture." The privacy-by-policy approach focuses on the implementation of the notice and choice principles of fair information practices (FIPs), while the privacy-by-architecture approach minimizes the collection of identifiable personal data and emphasizes anonymization and client-side data storage and processing. We discuss both approaches with a view to their technical overlaps and boundaries as well as to economic feasibility. The paper aims to introduce engineers and computer scientists to the privacy research domain and provide concrete guidance on how to design privacy-friendly systems.

Cited By

View all
  • (2024)Empowering IoT Developers with Privacy-Preserving End-User Development ToolsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785888:3(1-47)Online publication date: 9-Sep-2024
  • (2024)The Ethics of Mixed Reality GamesGames: Research and Practice10.1145/36758062:3(1-26)Online publication date: 30-Aug-2024
  • (2024)Personal Data-Less Personalized Software ApplicationsCompanion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering10.1145/3663529.3663781(477-481)Online publication date: 10-Jul-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Software Engineering
IEEE Transactions on Software Engineering  Volume 35, Issue 1
January 2009
141 pages

Publisher

IEEE Press

Publication History

Published: 01 January 2009

Author Tags

  1. Legal Aspects of Computing
  2. Privacy
  3. Requirements/Specifications
  4. Security and Protection

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Empowering IoT Developers with Privacy-Preserving End-User Development ToolsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785888:3(1-47)Online publication date: 9-Sep-2024
  • (2024)The Ethics of Mixed Reality GamesGames: Research and Practice10.1145/36758062:3(1-26)Online publication date: 30-Aug-2024
  • (2024)Personal Data-Less Personalized Software ApplicationsCompanion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering10.1145/3663529.3663781(477-481)Online publication date: 10-Jul-2024
  • (2024)Understanding Legal Professionals' Practices and Expectations in Data Breach Incident ReportingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690357(2711-2725)Online publication date: 2-Dec-2024
  • (2024)Following Topics Across All Apps and Media Formats: Mobile Keyword Tracking as a Privacy-Friendly Data Source in Mobile Media ResearchAdjunct Proceedings of the 32nd ACM Conference on User Modeling, Adaptation and Personalization10.1145/3631700.3664879(126-131)Online publication date: 27-Jun-2024
  • (2024)Exploring the Role of Team Security Climate in the Implementation of Security by Design: A Case Study in the Defense SectorIEEE Transactions on Software Engineering10.1109/TSE.2024.337411450:5(1065-1079)Online publication date: 6-Mar-2024
  • (2024)Enhancing privacy protections in national identification systems: an examination of stakeholders’ knowledge, attitudes, and practices of privacy by designInternational Journal of Information Security10.1007/s10207-024-00905-023:6(3665-3689)Online publication date: 3-Sep-2024
  • (2024)Learning to Rank Privacy Design Patterns: A Semantic Approach to Meeting Privacy RequirementsRequirements Engineering: Foundation for Software Quality10.1007/978-3-031-57327-9_4(57-73)Online publication date: 8-Apr-2024
  • (2024)Evolution of secure development lifecycles and maturity models in the context of hosted solutionsJournal of Software: Evolution and Process10.1002/smr.271136:12Online publication date: 10-Dec-2024
  • (2023)Understanding and Mitigating Technology-Facilitated Privacy Violations in the Physical WorldProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3580909(1-16)Online publication date: 19-Apr-2023
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media