Filters








139,901 Hits in 5.9 sec

Privacy Patterns in Business Processes

Erik Buchmann, Jürgen Anke
2017 Jahrestagung der Gesellschaft für Informatik  
Workflow design patterns provide abstract, "best-practices" solutions to recurring problems.  ...  While the majority of workflow patterns focus on control flow, resources and data, our concern are patterns from a data privacy perspective.  ...  Introduction Design patterns are reusable solutions to a commonly occuring problem. By instantiating a design pattern, an engineer can arrive at a "best-practices"-solution with little effort.  ... 
doi:10.18420/in2017_79 dblp:conf/gi/BuchmannA17 fatcat:mvpznbxhunebden3fpa3v4rvii

Participatory design research to understand the legal and technological perspectives in designing health information technology

M. Aljohani, J. Blustein, K. Hawkey
2017 Proceedings of the 35th ACM International Conference on the Design of Communication - SIGDOC '17  
We aim to bridge the gap between privacy law designers and privacy IT designers by expanding the concept of end-user participation.  ...  We propose a mixed approach between Participatory Design Research and Human Computer Interaction techniques to facilitate the participation of different stakeholders during the design lifecycle.  ...  The authors appreciate and acknowledge the support given by these organizations.  ... 
doi:10.1145/3121113.3121240 dblp:conf/sigdoc/AljohaniBH17 fatcat:lkwba42c4ve53o5rz5zfi5rif4

Contribution of Privacy by Design (of the Processes)

Santiago Martín-Romo Romero, Carmen De-Pablos-Heredero
2018 Harvard Deusto Business Research  
In this paper a group of organizational mechanisms oriented to implement protection measures based on privacy by design are provided.  ...  Privacy by design (PbD) will soon be a compulsory requirement for firms processing personal data.  ...  when developing a framework of privacy by design from the process perspective to reinforce the strengths, offer solutions for weaknesses avoid threads and exploit opportunities.  ... 
doi:10.3926/hdbr.180 fatcat:rphble5nvzfazoby7pwejaufei

Developing Scales to Evaluate Staff Perception of the Effects of the Physical Environment on Patient Comfort, Patient Safety, Patient Privacy, Family Integration With Patient Care, and Staff Working Conditions in Adult Intensive Care Units

Mahbub Rashid
2007 Critical Care Nursing Quarterly  
Studies suggest that the physical environment can be important for patient comfort, patient safety, patient privacy, family integration with patient care, and staff working condition in adult intensive  ...  These scales were tested in a pilot survey that was administered among a small group of nurse managers and ICU directors at several best practice example sites.  ...  However, scales for evaluating ICU designs from patient and family perspectives particularly on issues related to comfort, safety, privacy, and family integration are also needed.  ... 
doi:10.1097/01.cnq.0000278928.52315.f3 pmid:17579311 fatcat:4gowylnoqffzvd6ldrunwr3wmu

Cloud Native Privacy Engineering through DevPrivOps [article]

Elias Grünewald
2021 arXiv   pre-print
In this paper, we identify the conceptual dimensions of cloud native privacy engineering and propose an integrative approach to be addressed in practice to overcome the shortcomings of existing privacy  ...  Altogether, we show that cloud native privacy engineering advances the state of the art of privacy by design and by default using latest technologies.  ...  Acknowledgements The work behind this paper was partially conducted within the project DaSKITA (Data sovereignty through AI-based transparency and access), supported under grant no. 28V2307A19 by funds  ... 
arXiv:2108.00927v2 fatcat:mky5uuly7jayjhltdqp5swmwfy

Two tales of privacy in online social networks

Seda Gurses, Claudia Diaz
2013 IEEE Security and Privacy  
In this article, we first provide an introduction to the surveillance and social privacy perspectives emphasizing the narratives that inform them, as well as their assumptions, goals and methods.  ...  We argue that the different privacy problems are entangled and that research on privacy in OSNs would benefit from a more holistic approach.  ...  Acknowledgments This work was supported in part by the projects: IWT SBO SPION, FWO G.0360.11N, FWO G.0686.11N , and GOA TENSE (GOA/11/007).  ... 
doi:10.1109/msp.2013.47 fatcat:q7qfbadn3zhllj6euvxwdwfine

DPIA in Context: Applying DPIA to Assess Privacy Risks of Cyber Physical Systems

Jane Henriksen-Bulmer, Shamal Faily, Sheridan Jeary
2020 Future Internet  
Further, by using this DPIA framework we also provide organisations with a means of assessing privacy from both the perspective of the organisation and the individual, thereby facilitating GDPR compliance  ...  We present the DPIA Data Wheel, a holistic privacy risk assessment framework based on Contextual Integrity (CI), that practitioners can use to inform decision making around the privacy risks of CPS.  ...  To illustrate how this can be achieved, we present the DPIA Data Wheel: a practical adaptation of how Privacy by Design (PbD) [15] can be incorporated into the decision-making process through Contextual  ... 
doi:10.3390/fi12050093 fatcat:4ej52vbutrejdoig52yrzpikce

Designing Privacy for You : A User Centric Approach For Privacy [article]

Awanthika Senarath, Nalin A.G. Arachchilage, Jill Slay
2017 arXiv   pre-print
Through this research we propose a framework that would enable developers and designers to grasp privacy in a user-centered manner and implement it along with the software development life cycle.  ...  There are many concepts and guidelines that support development of privacy and embedding privacy into systems. However, none of them approaches privacy in a user- centered manner.  ...  Obstructing existing user practices in systems is mentioned as one of the five pitfalls by Lederer et al [31] that should be avoided by privacy designers to ensure usable privacy.  ... 
arXiv:1703.09847v2 fatcat:lkvgyzbogzghnjr5yzeef4x2be

Data protection by design: Organizational integration

Santiago Martín-Romo Romero, Carmen De-Pablos-Heredero
2018 Harvard Deusto Business Research  
These activities, realized by making use of different firm's profiles, promote the need to develop a proper organizational integration amongst participants.  ...  The activities done by different profiles at firms promote the need to develop an organizational integration amongst participants, activities performed by different agents, results interchanged and common  ...  The authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.  ... 
doi:10.3926/hdbr.179 fatcat:fcse2ycwzzhdnojqb6jvktukju

Privacy Engineering Meets Software Engineering. On the Challenges of Engineering Privacy ByDesign [article]

Blagovesta Kostova, Seda Gürses, Carmela Troncoso
2020 arXiv   pre-print
These practices result in systems made up of multiple services that introduce new data flows and evolving designs that escape the control of a single designer.  ...  Based on our analysis, we delineate research and actions needed to re-align research with practice, changes that serve a precondition for the operationalization of academic privacy results in common software  ...  From a privacy perspective, however, hiding the service' internals interferes with the overall privacy design and analysis, to the point that it may make achieving end-to-end privacy practically impossible  ... 
arXiv:2007.08613v1 fatcat:2tqaxp3uhfhmrngqkmoysmrkm4

Privacy Theories and Frameworks [chapter]

Pamela J. Wisniewski, Xinru Page
2022 Modern Socio-Technical Perspectives on Privacy  
These frameworks can be used to identify privacy needs and violations, as well as inform design.  ...  Privacy frameworks have since evolved into conceptualizing privacy as a process of interpersonal boundary regulation, appropriate information flows, design-based frameworks, and, finally, user-centered  ...  Next, we turn to discuss the proactive practice of Privacy by Design (PbD).  ... 
doi:10.1007/978-3-030-82786-1_2 fatcat:ehdiig7xq5dm7j2xwmrqyrceii

Informing The Future of Data Protection in Smart Homes [article]

Martin J Kraemer, William Seymour, Reuben Binns, Max Van Kleek, Ivan Flechais
2019 arXiv   pre-print
This position paper outlines the motivation and research approach of a new project aiming to inform the future of data protection by design and by default in smart homes through a combination of ethnography  ...  Recent changes to data protection regulation, particularly in Europe, are changing the design landscape for smart devices, requiring new design techniques to ensure that devices are able to adequately  ...  Through the combination of an HCI research approach with aspects of social science methodology and speculative design, we hope to explore the highly complex and idiosyncratic issues posed by the use of  ... 
arXiv:1910.01973v1 fatcat:hjjb3rofxrgxlhvgjwceaj7taq

Ambient Privacy with Wireless Grids: Forging New Concepts of Relationship in 21st Century Information Society

H. Patricia McKenna, Marilyn P. Arnone, Michelle L. Kaarst-Brown, Lee W. McKnight, Sarah Chauncey
2014 International Journal for Information Security Research  
Findings related to ambient privacy at the early design stage of an awareenabled wireless grid product draw on the concepts of underdesign, privacy by design (PbD), and sensitive information, contributing  ...  This research proposes an ambient privacy interaction dynamic; an ambient privacy research framework; and an agenda to guide ambient privacy research and practice for a 21 st century information society  ...  Noting a range of conceptualizations of privacy and the view by Solove that the privacy concept is in a state of disarray, Xu uses a multiple lens approach in an attempt to develop an integrated and common  ... 
doi:10.20533/ijisr.2042.4639.2014.0047 fatcat:kb5rqzmv6zg6hpq3cizkqkpoja

Using contextual integrity to examine interpersonal information boundary on social network sites

Pan Shi, Heng Xu, Yunan Chen
2013 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems - CHI '13  
This study aims to generate insights in understanding users' interpersonal privacy concerns by expounding interpersonal information boundaries in SNS.  ...  This paper concludes with a discussion of design implications and future research.  ...  ACKNOWLEDGMENTS The authors are very grateful to the AC and anonymous reviewers for their constructive comments on an earlier version of this manuscript.  ... 
doi:10.1145/2470654.2470660 dblp:conf/chi/ShiXC13 fatcat:a32z52pa6rhnvjpijlintlwine

Localizing the Politics of Privacy in Communication and Media Research

Johanna E. Möller, Leyla Dogruel
2020 Media and Communication  
Finally, we argue that the media practice perspective is well suited to offer an analytical tool for the study of the multiple aspects of privacy in a political context.  ...  In this contribution, we set out to push this forward by mapping four communication and media perspectives on the political implications of privacy.  ...  Barry's distinction between the political as a space of disagreement and politics as a set of reproductive or disruptive technological practices was originally designed to embrace the interrelationship  ... 
doi:10.17645/mac.v8i2.2869 fatcat:26rftj73xrhnhnv6masetvcwtu
« Previous Showing results 1 — 15 out of 139,901 results