skip to main content
10.1145/2851581.2856503acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
abstract

Bridging the Gap between Privacy by Design and Privacy in Practice

Published:07 May 2016Publication History

ABSTRACT

While there has been considerable academic work over the past decade on preserving and enhancing digital privacy, little of this scholarship has influenced practitioners in design or industry. By bringing together leading privacy academics and commercial stakeholders, this workshop builds on previous gatherings at ACM conferences and in the broader privacy community. Workshop attendees will address the 'privacy by design' implementation problem, and will work together to identify actionable methods and design heuristics for closing the gap between academic research and industry solutions for protecting user privacy in the design of systems, digital products and services.

References

  1. Acquisti, A., Brandimarte, L., and Loewenstein, G. Privacy and human behavior in the age of information. Science 347, 6221 (2015), 509-514.Google ScholarGoogle ScholarCross RefCross Ref
  2. Aguirre, A. Laura Poitras on Filming Edward Snowden and Her New Documentary About Him, Citizenfour. Vogue, 2014. http://www.vogue.com/2865709/laurapoitras-edward-snowden-documentarycitzenfour/.Google ScholarGoogle Scholar
  3. Braman, S. Privacy by design: Networked computing, 1969-1979. New Media & Society 0, 0 (2011), 1-18.Google ScholarGoogle Scholar
  4. Bureau of Consumer Protection. Protecting Consumer Privacy in an Era of Rapid Change. Federal Trade Commission, 2010.Google ScholarGoogle Scholar
  5. Burkert, H. Privacy-Enhancing Technologies: Typology, Critique, Vision. In P.E. Agre and M. Rotenberg, eds., Technology and Privacy: The New Landscape. The MIT Press, Cambridge, MA, 1997, 125-142. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cohen, J.E. What Privacy Is For. Harvard Law Review 126, (2013), 1904-1933.Google ScholarGoogle Scholar
  7. Drum, K. The Google Panopticon Is Set to Become Even More Omniscient. Mother Jones, 2013. http://www.motherjones.com/kevindrum/2013/09/google-panopticon.html.Google ScholarGoogle Scholar
  8. Dwork, C. and Mulligan, D.K. It's Not Privacy, and It"s Not Fair. Stanford Law Review Online 66, (2013), 35-40.Google ScholarGoogle Scholar
  9. Grodzinsky, F.S. and Tavani, H.T. Applying the "Contextual Integrity" Model of Privacy to Personal Blogs in the Blogosphere. International Journal of Internet Research Ethics 3, (2010), 38-47.Google ScholarGoogle Scholar
  10. Hoepman, J.-H. Privacy Design Strategies. In N. Cuppens-Boulahia, F. Cuppens, S. Jajodia, A. Abou El Kalam and T. Sans, eds., ICT Systems Security and Privacy Protection. Springer Berlin Heidelberg, Berlin, Heidelberg, 2014, 446-459.Google ScholarGoogle ScholarCross RefCross Ref
  11. Li, H., Sarathy, R., and Xu, H. The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors. Decision Support Systems 51, 3 (2011), 434-445. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Li, H., Sarathy, R., and Zhang, J. The Role of Emotions in Shaping Consumers' Privacy Beliefs about Unfamiliar Online Vendors. Journal of Information Privacy & Security 4, 3 (2008), 36-62.Google ScholarGoogle ScholarCross RefCross Ref
  13. Lohr, S. Workplace Surveillance and the "Transparency Paradox." The New York Times, 2014. http://bits.blogs.nytimes.com/2014/06/21/wo rkplace-surveillance-and-the-transparencyparadox/?_r=0.Google ScholarGoogle Scholar
  14. Mulligan, D.K. and King, J. Bridging The Gap Between Privacy And Design. University of Pennsylvania Journal of Constitutional Law 14, 4 (2012), 989-1034.Google ScholarGoogle Scholar
  15. Nippert-Eng, C. Privacy in the USA: Some Implications for Design. International Journal of Design 1, 2 (2007), 1-11.Google ScholarGoogle Scholar
  16. Nissenbaum, H. From Preemption to Circumvention. Berkeley Technology Law Journal 26, 3 (2011), 1367-1386.Google ScholarGoogle Scholar
  17. Nissenbaum, H. A Contextual Approach to Privacy Online. Daedalus 140, 4 (2011), 32- 48.Google ScholarGoogle ScholarCross RefCross Ref
  18. Posner, R.A. An Economic Theory of Privacy. Regulation 2, 3 (1978), 19-26.Google ScholarGoogle Scholar
  19. Rainie, L., Kiesler, S., Kang, R., and Madden, M. Anonymity, Privacy, and Security Online. Pew Research Center's Internet & American Life Project, Washington, D.C., 2013.Google ScholarGoogle Scholar
  20. Simpson, J.M. Google Tells Court You Cannot Expect Privacy When Sending Messages to Gmail. Consumer Watchdog, 2013, 1-2. http://www.consumerwatchdog.org/newsrelea se/google-tells-court-you-cannot-expectprivacy.html.Google ScholarGoogle Scholar
  21. Solove, D.J. A Taxonomy of Privacy. University of Pennsylvania Law Review 154, 3 (2006), 477-564.Google ScholarGoogle ScholarCross RefCross Ref
  22. Stark, L. The Emotional Context of Information Privacy. The Information Society 32, 1 (2016). Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Strandburg, K.J. Social Norms, Self Control, and Privacy in the Online World. 2005, 1-24.Google ScholarGoogle Scholar
  24. Tene, O. and Polonetsky, J. Big Data for All: Privacy and User Control in the Age of Analytics. Northwestern Journal of Technology and Intellectual Property 11, 5 (2013), 239- 273.Google ScholarGoogle Scholar
  25. Westin, A.F. Social and Political Dimensions of Privacy. Journal of Social Issues 59, 2 (2003), 431-453.Google ScholarGoogle ScholarCross RefCross Ref
  26. Privacy by Design in the Age of Big Data. 2012.Google ScholarGoogle Scholar
  27. Privacy by Design. Computing Community Consortium. http://cra.org/ccc/visioning/visioningactivities/2015-activities/privacy-by-design/.Google ScholarGoogle Scholar

Index Terms

  1. Bridging the Gap between Privacy by Design and Privacy in Practice

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CHI EA '16: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems
        May 2016
        3954 pages
        ISBN:9781450340823
        DOI:10.1145/2851581

        Copyright © 2016 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 May 2016

        Check for updates

        Qualifiers

        • abstract

        Acceptance Rates

        CHI EA '16 Paper Acceptance Rate1,000of5,000submissions,20%Overall Acceptance Rate6,164of23,696submissions,26%

        Upcoming Conference

        CHI '24
        CHI Conference on Human Factors in Computing Systems
        May 11 - 16, 2024
        Honolulu , HI , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader