Abstract
The challenges and potential approaches to applying privacy research in engineering practice.
- Brandeis, S.W. The right to privacy. Harvard Law Review 4, 5 (1890).Google ScholarCross Ref
- Dourish, L.P. Unpacking "privacy" for a networked world. In Proceedings of CHI (2003), 129--136. Google ScholarDigital Library
- Nissenbaum, H. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Palo Alto, CA, 2009. Google ScholarDigital Library
- NIST. Privacy Engineering Workshop, 2014; http://www.nist.dov/itl/csd/privacy-engineering-workshop.cfm.Google Scholar
- Solove, D. A taxonomy of privacy. University of Pennsylvania Law Review 154, 3 (2006), 477.Google ScholarCross Ref
- Wang, Y., Leon, P.G., Acquisti, A., Cranor, L.F., Forget, A., and Sadeh, N.M. A field trial of privacy nudges for facebook. In Proceedings of CHI (2014), 2367--2376. Google ScholarDigital Library
- Westin, A. Privacy and Freedom. Altheneum, NY, 1967.Google Scholar
Index Terms
- Can you engineer privacy?
Recommendations
Can the Utility of Anonymized Data be Used for Privacy Breaches?
Group based anonymization is the most widely studied approach for privacy-preserving data publishing. Privacy models/definitions using group based anonymization includes k-anonymity, l-diversity, and t-closeness, to name a few. The goal of this article ...
Why developers cannot embed privacy into software systems?: An empirical investigation
EASE '18: Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering 2018Pervasive use of software applications continue to challenge user privacy when users interact with software systems. Even though privacy practices such as Privacy by Design (PbD), have clear instructions for software developers to embed privacy into ...
Translating Privacy Practices into Privacy Promises—How to Promise What You Can Keep
POLICY '03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and NetworksEnterprises advertise privacy promises using the W3CPlatform for Privacy Preferences (P3P). These privacypromises define what recipients can obtain what collecteddata for what purpose. Internally, enterprises can use fine-grainedprivacy practices such ...
Comments