Filters








4,885 Hits in 11.4 sec

Supporting Privacy by Design Using Privacy Process Patterns [chapter]

Vasiliki Diamantopoulou, Christos Kalloniatis, Stefanos Gritzalis, Haralambos Mouratidis
2017 IFIP Advances in Information and Communication Technology  
To deal with such concerns, the literature has identified the need to introduce a Privacy by Design (PbD) approach to support the elicitation and analysis of privacy requirements and their implementation  ...  However, and despite all the work presented in the literature, there is still a gap between privacy design and implementation.  ...  This research was partially supported by the Visual Privacy Management in User Centric Open Environments (VisiOn) project, supported by the EU Horizon 2020 programme, Grant agreement No. 653642.  ... 
doi:10.1007/978-3-319-58469-0_33 fatcat:cfos7zr4p5fflgxrhww2scsehu

Protecting privacy in system design: the electronic voting case

Evangelia Kavakli, Stefanos Gritzalis, Kalloniatis Christos
2007 Transforming Government: People, Process and Policy  
Purpose -The purpose of the paper is to present Privacy Safeguard (PriS) a formal security requirements engineering methodology which, incorporates privacy requirements in the system design process and  ...  Design/methodology/approach -PriS provides a methodological framework for addressing privacy-related issues during system development.  ...  In particular, PriS defines seven-process patterns corresponding to the seven basic Protecting privacy in system design privacy requirements. Each pattern is described in two levels.  ... 
doi:10.1108/17506160710839150 fatcat:4tpdafpebrcrdaojzrqw6ab674

Towards a Principled Approach for Engineering Privacy by Design [chapter]

Majed Alshammari, Andrew Simpson
2017 Lecture Notes in Computer Science  
Challenges involved in engineering Privacy by Design include a lack of holistic, systematic and integrative methodologies that address the complexity and variability of privacy, and support the translation  ...  In this report, we analyse three privacy requirements engineering methods from which we derived a set of criteria that meet these challenges.  ...  The PriS Method The PriS method is a requirements engineering method that aims to integrate privacy requirements into the early stages of the design process by modelling privacy requirements as organisational  ... 
doi:10.1007/978-3-319-67280-9_9 fatcat:udbt5doysrgnzb7obxrd2rmm3m

Incorporating privacy by design in body sensor networks for medical applications: A privacy and data protection framework

Christos Kalloniatis, Costas Lambrinoudakis, Mathias Musahl, Athanasios Kanatas, Stefanos Gritzalis
2020 Computer Science and Information Systems  
The framework, beyond previous literature, supports the combination of privacy by design principles with the newly introduced GDPR requirements in order to create a strong elicitation process for deriving  ...  the set of the technical security and privacy requirements that should be addressed.  ...  The use of the PriS Privacy by Design method is very 10 critical for capturing the required information following the whole software 11 development lifecycle.  ... 
doi:10.2298/csis200922057k fatcat:7oobilalgbarlk4twmvix2akqm

A Systematic Mapping Study on Privacy by Design in Software Engineering

Miguel Ehecatl Morales-Trujillo, Gabriel Alberto García-Mireles, Erick Orlando Matla-Cruz, Mario Piattini
2019 CLEI Electronic Journal  
Privacy by Design (PbD) approach has been proposed to address this issue and has been applied to systems development in a variety of application domains.  ...  The findings suggest that there is a need to develop privacy-aware methods to be integrated at all stages of software development life cycle and validate them in industrial settings.  ...  Acknowledgements This work has been developed within the GEMA Project (SBPLY/17/180501/000293) funded by "Consejería de Educación, Cultura y Deportes de la Dirección General de Universidades, Investigación  ... 
doi:10.19153/cleiej.22.1.4 fatcat:yimqeklypfegbnkqt4ujjmkywy

Tool Support of Formal Methods for Privacy by Design [article]

Sibylle Schupp
2019 arXiv   pre-print
Formal methods are, in principle, suited for supporting the recent paradigm of privacy by design, but no overview is available that summarizes which particular approaches have been investigated, for which  ...  Using the techniques of search-based literature review and snowballing this paper answers those questions for a selected set of research papers.  ...  privacy.  ... 
arXiv:1903.11092v1 fatcat:6mnlr5w5bna77bnphxe7yzzxku

Action Design Research

Sein, Henfridsson, Purao, Rossi, Lindgren
2011 MIS Quarterly  
We propose action design research (ADR) as a new DR method to address this problem.  ...  Design research (DR) positions information technology artifacts at the core of the Information Systems discipline.  ...  We are also thankful for the feedback received when presenting our research in workshops at various universities and at IRIS and DESRIST conferences. Finally we thank Elizabeth Gross for editing.  ... 
doi:10.2307/23043488 fatcat:fswlcfv4lzgfthnmvregcfxynu

Using the Design Thinking Empathy Phase as a Facilitator in Privacy Requirements Elicitation

Edna Dias Canedo, Angélica Toffano Seidel Calazans, Anderson Jefferson Cerqueira, Pedro Henrique Teixeira Costa, Eloisa Toffano Seidel Masson
2020 Americas Conference on Information Systems  
We conducted a literature review to identify the use of the Design Thinking Empathy phase in privacy requirements elicitation.  ...  This article presents a contextualization of the use of the Empathy phase in the process of privacy requirements elicitation.  ...  Several methods can be found in the literature, but in this work four will be listed: Privacy-Friendly System Design (Caiza et al. 2019) , PriS and LINDDUN (Beckers 2012 ) and a method proposed by (  ... 
dblp:conf/amcis/CanedoCCCM20 fatcat:jxgjswgpuzg43eb44vdwu572gm

A Methodology for Assuring Privacy by Design in Information Systems

Siham Arfaoui, Abdellatif Mezrioui, Abdelhamid Belmekki
2020 International Journal of Communication Networks and Information Security  
Privacy Methodology" which focuses on the implementation of PbD in the enterprises architecture, specifically in information systems taking into account all the technical and organizational aspects which  ...  There is no doubt that privacy by design PbD has become a structuring paradigm for personal data protection.  ...  In the following section, the authors have addressed the requirements that ISPM must meet.  ... 
dblp:journals/ijcnis/ArfaouiMB20 fatcat:24hmewo5wjckdgbzaefx5gezxu

A systematic methodology for privacy impact assessments: a design science approach

Marie Caroline Oetzel, Sarah Spiekermann
2013 European Journal of Information Systems  
The contribution of the artefacts we created is twofold: First, we provide a formal problem representation structure for the analysis of privacy requirements.  ...  Failure to adequately address this problem can result in considerable damage to the company's reputation and finances, as well as negative effects for customers or employees (data subjects).  ...  Institute of Information Security and the German Data Protection Authorities for their willingness to verify, discuss and publish the methodology presented in this article, Christian von Grone (CIO of  ... 
doi:10.1057/ejis.2013.18 fatcat:wmegqteyorfbzhqqnpupij5l6i

Embedding Privacy Into Design Through Software Developers: Challenges Solutions [article]

Mohammad Tahaei, Kami Vaniea, Awais Rashid
2022 arXiv   pre-print
We discuss the challenges with the successful integration of privacy features and propose solutions for stakeholders to help developers perform privacy-related tasks.  ...  To make privacy a first-class citizen in software, we argue for equipping developers with usable tools, as well as providing support from organizations, educators, and regulators.  ...  Secure software development by the masses (EPSRC: EP/P011799/2), and REPHRAIN: UK's National Research Centre on Privacy, Harm Reduction and Adversarial Influence Online (EPSRC: EP/V011189/1).  ... 
arXiv:2208.11898v1 fatcat:pjhr5v6rufagjo2rdjpmo5tgde

Designing databases that enhance people's privacy without hindering organizations

Thomas B. Hodel-Widmer
2006 Ethics and Information Technology  
We argue that future database systems must provide autonomy for individuals for the privacy of data they manage.  ...  We propose a design for such a system, identify challenges and problems, and suggest some approaches to these.  ...  HODEL ODEL-WIDMER IDM ER DESIGNING DATA BASES THAT ECHANCE PEOPLE ESIGNIN G DATA BASES THAT ECHANCE PEOPLE S PRIVACY S PRI VA CY  ... 
doi:10.1007/s10676-006-9105-3 fatcat:rprwitaqnbb7fpwdvm4uwfrgge

Privacy and Data Protection by Design - from policy to engineering [article]

George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Metayer, Rodica Tirtea, Stefan Schiffner
2015 arXiv   pre-print
The report sketches a method to map legal obligations to design strategies, which allow the system designer to select appropriate techniques for implementing the identified privacy requirements.  ...  Starting from the privacy principles of the legislation, important elements are presented as a first step towards a design process for privacy-friendly systems and services.  ...  Acknowledgements We have discussed this work with numerous people at various occasions; we thank for the valuable input we got from these discussions.  ... 
arXiv:1501.03726v1 fatcat:csxvtyiiprhodnquaigppcwbwi

Research Challenges in Designing Differentially Private Text Generation Mechanisms

Oluwaseyi Feyisetan, Abhinav Aggarwal, Zekun Xu, Nathanael Teissier
2021 Proceedings of the ... International Florida Artificial Intelligence Research Society Conference  
Such mechanisms add privacy preserving noise to vectorial representations of text in high dimension and return a text based projection of the noisy vectors.  ...  However, these mechanisms are sub-optimal in their trade-off between privacy and utility. In this proposal paper, we describe some challenges in balancing this trade-off.  ...  Truncated Noise Mechanisms The standard d χ -privacy mechanisms were designed by borrowing ideas from the privacy methods used for location data ).  ... 
doi:10.32473/flairs.v34i1.128461 fatcat:mcse4lzmjjfcveqgptzlgrttiy

Design Goals for Consent at Scale in Digital Service Ecosystems

Christian Kurtz, Florian Wittner, Pascal Vogel, Martin Semmann, Tilo Böhmann
2020 European Conference on Information Systems  
This requires a fundamental rethinking of the concept of consent or far-reaching automation of privacy-related legal acts.  ...  Based on these problems, the design goals are determined which help to find meaningful consent in digital service ecosystems.  ...  Acknowledgements This research was sponsored by the Hamburg Ministry of Science, Research and Equality in the project Information Governance Technologies under the reference LFF-FV 34.  ... 
dblp:conf/ecis/KurtzWVSB20 fatcat:kewppwzqxngwxbznr3u7pk5jiu
« Previous Showing results 1 — 15 out of 4,885 results