Skip to main content
Erschienen in:
Buchtitelbild

2020 | OriginalPaper | Buchkapitel

pQUANT: A User-Centered Privacy Risk Analysis Framework

verfasst von : Welderufael B. Tesfay, Dimitra Nastouli, Yannis C. Stamatiou, Jetzabel M. Serna

Erschienen in: Risks and Security of Internet and Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The last few decades have entertained a fast digital transformation of our daily activities. This has brought about numerous benefits as well as unanticipated consequences. As such, on the consequences side, information privacy incidents have become prevalent. This has further raised the concern of users and data protection bodies alike. Thus, quantifying and communicating privacy risks plays paramount role in raising user awareness, designing appropriate technical solutions, and enacting legal frameworks. However, previous research in privacy risk quantification has not considered the user’s heterogeneously subjective perceptions of privacy, and her right to informational self determination since, often, the privacy risk analysis and prevention takes place once the data is out of her control. In this paper, we present a user-centered privacy risk quantification framework coupled with granular and usable privacy risk warnings. The framework takes a new approach in that it empowers users to take informed privacy protection decisions prior to unintended data disclosure.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
CNIL, How to implement the data protection act, (2012). URL http://​goo.​gl/​jdlw5O, last access, May 2, 2017.
 
3
Data philanthropy is a newly emerging concept in which private sector, or citizens participate in donating data for the public good, cf. http://​corporatecitizen​ship.​bc.​edu/​data-philanthropy.
 
Literatur
2.
Zurück zum Zitat Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347(6221), 509–514 (2015)CrossRef Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347(6221), 509–514 (2015)CrossRef
3.
Zurück zum Zitat Bal, G., Rannenberg, K., Hong, J.: Styx: design and evaluation of a new privacy risk communication method for smartphones. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IAICT, vol. 428, pp. 113–126. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-55415-5_10CrossRef Bal, G., Rannenberg, K., Hong, J.: Styx: design and evaluation of a new privacy risk communication method for smartphones. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IAICT, vol. 428, pp. 113–126. Springer, Heidelberg (2014). https://​doi.​org/​10.​1007/​978-3-642-55415-5_​10CrossRef
5.
Zurück zum Zitat Biega, J., Mele, I., Weikum, G.: Probabilistic prediction of privacy risks in user search histories. In: Proceedings of the First International Workshop on Privacy and Security of Big Data, pp. 29–36. ACM (2014) Biega, J., Mele, I., Weikum, G.: Probabilistic prediction of privacy risks in user search histories. In: Proceedings of the First International Workshop on Privacy and Security of Big Data, pp. 29–36. ACM (2014)
6.
Zurück zum Zitat Christin, D., Michalak, M., Hollick, M.: Raising user awareness about privacy threats in participatory sensing applications through graphical warnings. In: Proceedings of International Conference on Advances in Mobile Computing & #38; Multimedia, MoMM 2013, pp. 445:445–445:454. ACM, New York (2013) Christin, D., Michalak, M., Hollick, M.: Raising user awareness about privacy threats in participatory sensing applications through graphical warnings. In: Proceedings of International Conference on Advances in Mobile Computing & #38; Multimedia, MoMM 2013, pp. 445:445–445:454. ACM, New York (2013)
8.
Zurück zum Zitat de Montjoye, Y.-A., Radaelli, L., Singh, V.K., Pentland, A.: Unique in the shopping mall: on the reidentifiability of credit card metadata. Science 347(6221), 536–539 (2015)CrossRef de Montjoye, Y.-A., Radaelli, L., Singh, V.K., Pentland, A.: Unique in the shopping mall: on the reidentifiability of credit card metadata. Science 347(6221), 536–539 (2015)CrossRef
9.
Zurück zum Zitat Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A., Sgandurra, D.: Risk analysis of android applications: a user-centric solution. Future Gener. Comput. Syst. 80, 505–518 (2016)CrossRef Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A., Sgandurra, D.: Risk analysis of android applications: a user-centric solution. Future Gener. Comput. Syst. 80, 505–518 (2016)CrossRef
10.
Zurück zum Zitat Du, W., Teng, Z., Zhu, Z.: Privacy-maxent: integrating background knowledge in privacy quantification. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 459–472. ACM (2008) Du, W., Teng, Z., Zhu, Z.: Privacy-maxent: integrating background knowledge in privacy quantification. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 459–472. ACM (2008)
11.
Zurück zum Zitat Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI 2010, pp. 1–6. USENIX Association, Berkeley (2010) Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI 2010, pp. 1–6. USENIX Association, Berkeley (2010)
12.
Zurück zum Zitat Fawaz, K., Shin, K.G.: Location privacy protection for smartphone users. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 239–250. ACM, New York (2014) Fawaz, K., Shin, K.G.: Location privacy protection for smartphone users. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 239–250. ACM, New York (2014)
13.
Zurück zum Zitat Hansen, M., Berlich, P., Camenisch, J., Clauß, S., Pfitzmann, A., Waidner, M.: Privacy-enhancing identity management. Inf. Secur. Tech. Rep. 9(1), 35–44 (2004)CrossRef Hansen, M., Berlich, P., Camenisch, J., Clauß, S., Pfitzmann, A., Waidner, M.: Privacy-enhancing identity management. Inf. Secur. Tech. Rep. 9(1), 35–44 (2004)CrossRef
14.
Zurück zum Zitat Hogganvik, I., Stølen, K.: A graphical approach to risk identification, motivated by empirical investigations. In: Nierstrasz, O., Whittle, J., Harel, D., Reggio, G. (eds.) MODELS 2006. LNCS, vol. 4199, pp. 574–588. Springer, Heidelberg (2006). https://doi.org/10.1007/11880240_40CrossRef Hogganvik, I., Stølen, K.: A graphical approach to risk identification, motivated by empirical investigations. In: Nierstrasz, O., Whittle, J., Harel, D., Reggio, G. (eds.) MODELS 2006. LNCS, vol. 4199, pp. 574–588. Springer, Heidelberg (2006). https://​doi.​org/​10.​1007/​11880240_​40CrossRef
15.
Zurück zum Zitat Hong, W., Thong, J.Y.: Internet privacy concerns: an integrated conceptualization and four empirical studies. MIS Q. 37, 275–298 (2013) CrossRef Hong, W., Thong, J.Y.: Internet privacy concerns: an integrated conceptualization and four empirical studies. MIS Q. 37, 275–298 (2013) CrossRef
16.
Zurück zum Zitat Ngoc, T.H., Echizen, I., Komei, K., Yoshiura, H.: New approach to quantification of privacy on social network sites. In: 2010 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 556–564. IEEE (2010) Ngoc, T.H., Echizen, I., Komei, K., Yoshiura, H.: New approach to quantification of privacy on social network sites. In: 2010 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 556–564. IEEE (2010)
18.
Zurück zum Zitat Rotenberg, M., Jacobs, D.: Updating the law of information privacy: the new framework of the European Union. Harv. JL Pub. Pol’y 36, 605 (2013) Rotenberg, M., Jacobs, D.: Updating the law of information privacy: the new framework of the European Union. Harv. JL Pub. Pol’y 36, 605 (2013)
19.
Zurück zum Zitat Sattar, A.S., Li, J., Ding, X., Liu, J., Vincent, M.: A general framework for privacy preserving data publishing. Knowl.-Based Syst. 54, 276–287 (2013)CrossRef Sattar, A.S., Li, J., Ding, X., Liu, J., Vincent, M.: A general framework for privacy preserving data publishing. Knowl.-Based Syst. 54, 276–287 (2013)CrossRef
20.
Zurück zum Zitat Slovic, P., Weber, E.U.: Perception of risk posed by extreme events (2002) Slovic, P., Weber, E.U.: Perception of risk posed by extreme events (2002)
21.
Zurück zum Zitat Tesfay, W.B., Hofmann, P., Nakamura, T., Kiyomoto, S., Serna, J.: I read but don’t agree: privacy policy benchmarking using machine learning and the EU GDPR. In: Companion Proceedings of The Web Conference 2018, pp. 163–166. International World Wide Web Conferences Steering Committee (2018) Tesfay, W.B., Hofmann, P., Nakamura, T., Kiyomoto, S., Serna, J.: I read but don’t agree: privacy policy benchmarking using machine learning and the EU GDPR. In: Companion Proceedings of The Web Conference 2018, pp. 163–166. International World Wide Web Conferences Steering Committee (2018)
22.
Zurück zum Zitat Tesfay, W.B., Hofmann, P., Nakamura, T., Kiyomoto, S., Serna, J.: PrivacyGuide: towards an implementation of the EU GDPR on internet privacy policy evaluation. In: Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, pp. 15–21. ACM (2018) Tesfay, W.B., Hofmann, P., Nakamura, T., Kiyomoto, S., Serna, J.: PrivacyGuide: towards an implementation of the EU GDPR on internet privacy policy evaluation. In: Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, pp. 15–21. ACM (2018)
23.
Zurück zum Zitat Tuunainen, V.K., Pitkänen, O., Hovi, M.: Users’ awareness of privacy on online social networking sites-case facebook. In: Bled 2009 Proceedings, p. 42 (2009) Tuunainen, V.K., Pitkänen, O., Hovi, M.: Users’ awareness of privacy on online social networking sites-case facebook. In: Bled 2009 Proceedings, p. 42 (2009)
24.
Zurück zum Zitat Wan, Z., et al.: A game theoretic framework for analyzing re-identification risk. PLoS One 10, e0120592 (2015). Supporting information. threshold, 7:9CrossRef Wan, Z., et al.: A game theoretic framework for analyzing re-identification risk. PLoS One 10, e0120592 (2015). Supporting information. threshold, 7:9CrossRef
25.
Zurück zum Zitat Watanabe, C., Amagasa, T., Liu, L.: Privacy risks and countermeasures in publishing and mining social network data. In: 2011 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 55–66. IEEE (2011) Watanabe, C., Amagasa, T., Liu, L.: Privacy risks and countermeasures in publishing and mining social network data. In: 2011 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 55–66. IEEE (2011)
Metadaten
Titel
pQUANT: A User-Centered Privacy Risk Analysis Framework
verfasst von
Welderufael B. Tesfay
Dimitra Nastouli
Yannis C. Stamatiou
Jetzabel M. Serna
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-41568-6_1