Skip to main content
Erschienen in:
Buchtitelbild

2021 | OriginalPaper | Buchkapitel

Empowering Digital Users Through Design for Privacy

verfasst von : Davide M. Parrilli, Rodrigo Hernández-Ramírez

Erschienen in: Perspectives on Design and Digital Communication II

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The research presented in this paper discusses the challenges and limitations of privacy by design as an effective tool for protecting users’ privacy. The EU data protection legislation requires all products, services, or systems that process personal data to be designed following a “privacy by design”. However, we contend that privacy by design does not have solid foundations to sustain privacy outside of its legal definitions, and it may only work as a legal compliance tool. Provided that the legal approach is not effective in protecting and enhancing users’ and citizens’ privacy, it is necessary to build a designerly understanding of privacy. The paper suggests a definition of privacy for design based on a universally acceptable ethical framework to create a common understanding of privacy for design and designers. Based on the notion of privacy for design, the paper supports creating a new design discipline to enhance users’ and citizens’ privacy: design for privacy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
3
Directive 95/46/EC of the European Parliament and the Council of 24 October 1995 on the protection of individuals concerning the processing of personal data and the free movement of such data, OJ L281, 23/11/1995, p. 31–50.
 
4
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons concerning the processing of personal data and the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation), OJ L119, 04/05/2016, p. 1–88.
 
5
LGPD - Lei Geral de Proteção de Dados Pessoais (General Personal Data Protection Law), Law 13.709 of 14 August 2018, in force since 18 September 2020, O.J. (DOU) 15/08/2018.
 
6
California Consumer Privacy Act of 2018 [1798.100 – 1798.199.100].
 
7
Article 6(1): “Processing shall be lawful only if and to the extent that at least one of the following:
(a) the data subject has given consent to the processing of his or her personal data for one or more specific purposes;
(b) processing is necessary for the performance of a contract to which the data subject is party or in order to take steps at the request of the data subject prior to entering into a contract;
(c) processing is necessary for compliance with a legal obligation to which the controller is subject;
(d) processing is necessary in order to protect the vital interests of the data subject or of another natural person;
(e) processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the controller;
(f) processing is necessary for the purposes of the legitimate interests pursued by the controller or by a third party, except where such interests are overridden by the interests or fundamental rights and freedoms of the data subject which require protection of personal data, in particular where the data subject is a child.
Point (f) of the first subparagraph shall not apply to processing carried out by public authorities in the performance of their tasks”.
 
8
Free translation from Ovid’s Metamorphoses: “I know and approve the best, but I follow the worst”.
 
Literatur
1.
Zurück zum Zitat Waldman AE (2018) Privacy as trust: information privacy for an information age. Cambridge University Press, Cambridge; New YorkCrossRef Waldman AE (2018) Privacy as trust: information privacy for an information age. Cambridge University Press, Cambridge; New YorkCrossRef
2.
Zurück zum Zitat Zuboff S (2019) The age of surveillance capitalism: the fight for a human future at the new frontier of power. PublicAffairs, New York Zuboff S (2019) The age of surveillance capitalism: the fight for a human future at the new frontier of power. PublicAffairs, New York
3.
Zurück zum Zitat Foster JB, McChesney RW (2014) Surveillance capitalism: monopoly-finance capital, the military-industrial complex, and the digital age. Mon Rev 66:1 Foster JB, McChesney RW (2014) Surveillance capitalism: monopoly-finance capital, the military-industrial complex, and the digital age. Mon Rev 66:1
4.
Zurück zum Zitat Véliz C (2020) Privacy is power: reclaiming democracy in the digital age. BANTAM Press (2020) Véliz C (2020) Privacy is power: reclaiming democracy in the digital age. BANTAM Press (2020)
5.
Zurück zum Zitat Pivato S (2013) I comunisti mangiano i bambini: storia di una leggenda. Società editrice il Mulino, Bologna Pivato S (2013) I comunisti mangiano i bambini: storia di una leggenda. Società editrice il Mulino, Bologna
6.
Zurück zum Zitat Bauman Z (2000) Liquid modernity. Polity Press; Blackwell, Cambridge; Malden Bauman Z (2000) Liquid modernity. Polity Press; Blackwell, Cambridge; Malden
7.
Zurück zum Zitat Cohen J (2006) Cyberspace as/and space. Columbia Law Rev 107:210 Cohen J (2006) Cyberspace as/and space. Columbia Law Rev 107:210
9.
Zurück zum Zitat Couldry N, Mejias UA (2020) The costs of connection: how data is colonizing human life and appropriating it for capitalism Couldry N, Mejias UA (2020) The costs of connection: how data is colonizing human life and appropriating it for capitalism
10.
Zurück zum Zitat Pasquale F (2015) The black box society: the secret algorithms that control money and information. Harvard University Press, Cambridge; London Pasquale F (2015) The black box society: the secret algorithms that control money and information. Harvard University Press, Cambridge; London
15.
Zurück zum Zitat Solove DJ (2006) The digital person: technology and privacy in the information age. New York University Press, Fredericksburg Solove DJ (2006) The digital person: technology and privacy in the information age. New York University Press, Fredericksburg
16.
Zurück zum Zitat Bowles C (2018) Future ethics. NowNext Press, London Bowles C (2018) Future ethics. NowNext Press, London
17.
Zurück zum Zitat Taleb NN (2018) Skin in the game: hidden asymmetries in daily life. Random House, New York Taleb NN (2018) Skin in the game: hidden asymmetries in daily life. Random House, New York
19.
Zurück zum Zitat Cross N (2006) Designerly ways of knowing. Springer, London Cross N (2006) Designerly ways of knowing. Springer, London
20.
Zurück zum Zitat Papanek V (2019) Design for the real world. Thames & Hudson, LO Papanek V (2019) Design for the real world. Thames & Hudson, LO
21.
Zurück zum Zitat Monteiro M (2019) Ruined by design: how designers destroyed the world, and what we can do to fix it Monteiro M (2019) Ruined by design: how designers destroyed the world, and what we can do to fix it
22.
Zurück zum Zitat Dunne A, Raby F (2013) Speculative everything: design, fiction, and social dreaming. The MIT Press, Cambridge; London Dunne A, Raby F (2013) Speculative everything: design, fiction, and social dreaming. The MIT Press, Cambridge; London
23.
Zurück zum Zitat Warren S, Brandeis L (1890) The right to privacy. Harv Law Rev 4:193–220CrossRef Warren S, Brandeis L (1890) The right to privacy. Harv Law Rev 4:193–220CrossRef
24.
Zurück zum Zitat Floridi L (2014) The 4th revolution: how the infosphere is reshaping human reality. Oxford University Press, New York; Oxford Floridi L (2014) The 4th revolution: how the infosphere is reshaping human reality. Oxford University Press, New York; Oxford
25.
Zurück zum Zitat Moore AD (2008) Defining privacy. Social Science Research Network, Rochester Moore AD (2008) Defining privacy. Social Science Research Network, Rochester
26.
Zurück zum Zitat Trepte S, Reinecke L (eds) (2011) Privacy online: perspectives on privacy and self-disclosure in the social web. Springer, Heidelberg; New York Trepte S, Reinecke L (eds) (2011) Privacy online: perspectives on privacy and self-disclosure in the social web. Springer, Heidelberg; New York
27.
Zurück zum Zitat van den Hoven J, Blaauw M, Pieters W, Warnier M (2020) Privacy and information technology. In: Zalta EN (ed) The Stanford Encyclopedia of philosophy. Metaphysics Research Lab, Stanford University van den Hoven J, Blaauw M, Pieters W, Warnier M (2020) Privacy and information technology. In: Zalta EN (ed) The Stanford Encyclopedia of philosophy. Metaphysics Research Lab, Stanford University
28.
Zurück zum Zitat Westin AF (1967) Privacy and freedom. Scribner, New York Westin AF (1967) Privacy and freedom. Scribner, New York
29.
Zurück zum Zitat Solove DJ (2009) Understanding privacy. Harvard University Press, Cambridge; London Solove DJ (2009) Understanding privacy. Harvard University Press, Cambridge; London
30.
Zurück zum Zitat Downton P (2005) Design research. RMIT University Press, Melbourne Downton P (2005) Design research. RMIT University Press, Melbourne
33.
Zurück zum Zitat Archer LB (1984) Systematic method for designers. In: Cross N (ed) Developments in design methodology. Wiley, Chichester, pp 68–82 Archer LB (1984) Systematic method for designers. In: Cross N (ed) Developments in design methodology. Wiley, Chichester, pp 68–82
34.
Zurück zum Zitat Buchanan R (2005) Design ethics. In: Mitcham C (ed) Encyclopedia of science, technology, and ethics. Thomson Gale, Farmington, Hills, pp 504–510 Buchanan R (2005) Design ethics. In: Mitcham C (ed) Encyclopedia of science, technology, and ethics. Thomson Gale, Farmington, Hills, pp 504–510
36.
Zurück zum Zitat Privacy Enhancing Technologies (2016) Evolution and State of the Art A Community Approach to PETs Maturity Assessment. ENISA Privacy Enhancing Technologies (2016) Evolution and State of the Art A Community Approach to PETs Maturity Assessment. ENISA
38.
Zurück zum Zitat Drăgnoiu Panait A, Olimid R, Stefanescu A (2020) Identity management on blockchain - privacy and security aspects. Proc Romanian Acad Ser Math Phys Tech Sci Inf Sci 21:45–52 Drăgnoiu Panait A, Olimid R, Stefanescu A (2020) Identity management on blockchain - privacy and security aspects. Proc Romanian Acad Ser Math Phys Tech Sci Inf Sci 21:45–52
Metadaten
Titel
Empowering Digital Users Through Design for Privacy
verfasst von
Davide M. Parrilli
Rodrigo Hernández-Ramírez
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-75867-7_1