ABSTRACT
While there has been considerable academic work over the past decade on preserving and enhancing digital privacy, little of this scholarship has influenced practitioners in design or industry. By bringing together leading privacy academics and commercial stakeholders, this workshop builds on previous gatherings at ACM conferences and in the broader privacy community. Workshop attendees will address the 'privacy by design' implementation problem, and will work together to identify actionable methods and design heuristics for closing the gap between academic research and industry solutions for protecting user privacy in the design of systems, digital products and services.
- Acquisti, A., Brandimarte, L., and Loewenstein, G. Privacy and human behavior in the age of information. Science 347, 6221 (2015), 509-514.Google ScholarCross Ref
- Aguirre, A. Laura Poitras on Filming Edward Snowden and Her New Documentary About Him, Citizenfour. Vogue, 2014. http://www.vogue.com/2865709/laurapoitras-edward-snowden-documentarycitzenfour/.Google Scholar
- Braman, S. Privacy by design: Networked computing, 1969-1979. New Media & Society 0, 0 (2011), 1-18.Google Scholar
- Bureau of Consumer Protection. Protecting Consumer Privacy in an Era of Rapid Change. Federal Trade Commission, 2010.Google Scholar
- Burkert, H. Privacy-Enhancing Technologies: Typology, Critique, Vision. In P.E. Agre and M. Rotenberg, eds., Technology and Privacy: The New Landscape. The MIT Press, Cambridge, MA, 1997, 125-142. Google ScholarDigital Library
- Cohen, J.E. What Privacy Is For. Harvard Law Review 126, (2013), 1904-1933.Google Scholar
- Drum, K. The Google Panopticon Is Set to Become Even More Omniscient. Mother Jones, 2013. http://www.motherjones.com/kevindrum/2013/09/google-panopticon.html.Google Scholar
- Dwork, C. and Mulligan, D.K. It's Not Privacy, and It"s Not Fair. Stanford Law Review Online 66, (2013), 35-40.Google Scholar
- Grodzinsky, F.S. and Tavani, H.T. Applying the "Contextual Integrity" Model of Privacy to Personal Blogs in the Blogosphere. International Journal of Internet Research Ethics 3, (2010), 38-47.Google Scholar
- Hoepman, J.-H. Privacy Design Strategies. In N. Cuppens-Boulahia, F. Cuppens, S. Jajodia, A. Abou El Kalam and T. Sans, eds., ICT Systems Security and Privacy Protection. Springer Berlin Heidelberg, Berlin, Heidelberg, 2014, 446-459.Google ScholarCross Ref
- Li, H., Sarathy, R., and Xu, H. The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems 51, 3 (2011), 434-445. Google ScholarDigital Library
- Li, H., Sarathy, R., and Zhang, J. The Role of Emotions in Shaping Consumers' Privacy Beliefs about Unfamiliar Online Vendors. Journal of Information Privacy & Security 4, 3 (2008), 36-62.Google ScholarCross Ref
- Lohr, S. Workplace Surveillance and the "Transparency Paradox." The New York Times, 2014. http://bits.blogs.nytimes.com/2014/06/21/wo rkplace-surveillance-and-the-transparencyparadox/?_r=0.Google Scholar
- Mulligan, D.K. and King, J. Bridging The Gap Between Privacy And Design. University of Pennsylvania Journal of Constitutional Law 14, 4 (2012), 989-1034.Google Scholar
- Nippert-Eng, C. Privacy in the USA: Some Implications for Design. International Journal of Design 1, 2 (2007), 1-11.Google Scholar
- Nissenbaum, H. From Preemption to Circumvention. Berkeley Technology Law Journal 26, 3 (2011), 1367-1386.Google Scholar
- Nissenbaum, H. A Contextual Approach to Privacy Online. Daedalus 140, 4 (2011), 32- 48.Google ScholarCross Ref
- Posner, R.A. An Economic Theory of Privacy. Regulation 2, 3 (1978), 19-26.Google Scholar
- Rainie, L., Kiesler, S., Kang, R., and Madden, M. Anonymity, Privacy, and Security Online. Pew Research Center's Internet & American Life Project, Washington, D.C., 2013.Google Scholar
- Simpson, J.M. Google Tells Court You Cannot Expect Privacy When Sending Messages to Gmail. Consumer Watchdog, 2013, 1-2. http://www.consumerwatchdog.org/newsrelea se/google-tells-court-you-cannot-expectprivacy.html.Google Scholar
- Solove, D.J. A Taxonomy of Privacy. University of Pennsylvania Law Review 154, 3 (2006), 477-564.Google ScholarCross Ref
- Stark, L. The Emotional Context of Information Privacy. The Information Society 32, 1 (2016). Google ScholarDigital Library
- Strandburg, K.J. Social Norms, Self Control, and Privacy in the Online World. 2005, 1-24.Google Scholar
- Tene, O. and Polonetsky, J. Big Data for All: Privacy and User Control in the Age of Analytics. Northwestern Journal of Technology and Intellectual Property 11, 5 (2013), 239- 273.Google Scholar
- Westin, A.F. Social and Political Dimensions of Privacy. Journal of Social Issues 59, 2 (2003), 431-453.Google ScholarCross Ref
- Privacy by Design in the Age of Big Data. 2012.Google Scholar
- Privacy by Design. Computing Community Consortium. http://cra.org/ccc/visioning/visioningactivities/2015-activities/privacy-by-design/.Google Scholar
Index Terms
- Bridging the Gap between Privacy by Design and Privacy in Practice
Recommendations
Bringing Design to the Privacy Table: Broadening “Design” in “Privacy by Design” Through the Lens of HCI
CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing SystemsIn calls for privacy by design (PBD), regulators and privacy scholars have investigated the richness of the concept of "privacy." In contrast, "design" in HCI is comprised of rich and complex concepts and practices, but has received much less attention ...
Privacy transparency patterns
EuroPLoP '15: Proceedings of the 20th European Conference on Pattern Languages of ProgramsThis paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of ...
Privacy in Digital Identity Systems: Models, Assessment, and User Adoption
Electronic GovernmentAbstractThe use of privacy protection measures is of particular importance for existing and upcoming users’ digital identities. Thus, the recently adopted EU Regulation on Electronic identification and trust services (eIDAS) explicitly allows the use of ...
Comments