A tree-based approach to preserve the privacy of software engineering data and predictive models
PROMISE '09 Proceedings of the 5th International Conference on Predictor Models in Software Engineering
Regulating Privacy in Wireless Advertising Messaging: FIPP Compliance by Policy vs. by Design
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Data Protection-Aware Design for Cloud Services
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
User Requirements for Cloud Computing Architecture
CCGRID '10 Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing
Context-aware privacy design pattern selection
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Minimal privacy authorization in web services collaboration
Computer Standards & Interfaces
Location privacy in urban sensing networks: research challenges and directions
IEEE Wireless Communications
Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms
Expert Systems with Applications: An International Journal
The tradeoffs of societal computing
Proceedings of the 10th SIGPLAN symposium on New ideas, new paradigms, and reflections on programming and software
Privacy analysis using ontologies
Proceedings of the second ACM conference on Data and Application Security and Privacy
Trap hunting: finding personal data management issues in next generation AAC devices
SLPAT '11 Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies
An agent infrastructure for privacy-enhancing agent-based e-commerce applications
AAMAS'11 Proceedings of the 10th international conference on Advanced Agent Technology
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
User Modeling and User-Adapted Interaction
The challenges of privacy by design
Communications of the ACM
Proceedings of the 34th International Conference on Software Engineering
Increasing service users' privacy awareness by introducing on-line interactive privacy features
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Caprice: a tool for engineering adaptive privacy
Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering
The state and evolution of privacy by design
Proceedings of the 2012 ACM conference on Computer and communications security
Participatory personal data: An emerging research challenge for the information sciences
Journal of the American Society for Information Science and Technology
ACM Transactions on Interactive Intelligent Systems (TiiS) - Special issue on highlights of the decade in interactive intelligent systems
Magentix2: A privacy-enhancing Agent Platform
Engineering Applications of Artificial Intelligence
Privacy management in global organisations
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
An online experiment of privacy authorization dialogues for social applications
Proceedings of the 2013 conference on Computer supported cooperative work
Engineering adaptive privacy: on the role of privacy awareness requirements
Proceedings of the 2013 International Conference on Software Engineering
Investigating Users’ Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model
ACM Transactions on Internet Technology (TOIT)
Automated buyer profiling control based on human privacy attitudes
Electronic Commerce Research and Applications
Strategies for avoiding preference profiling in agent-based e-commerce environments
Applied Intelligence
Hi-index | 0.02 |
In this paper we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline's topics. First we discuss privacy requirements grounded in both historic and contemporary perspectives on privacy. We use a three-layer model of user privacy concerns to relate them to system operations (data transfer, storage and processing) and examine their effects on user behavior. In the second part of the paper we develop guidelines for building privacy-friendly systems. We distinguish two approaches: "privacy-by-policy" and "privacy-by-architecture." The privacy-by-policy approach focuses on the implementation of the notice and choice principles of fair information practices (FIPs), while the privacy-by-architecture approach minimizes the collection of identifiable personal data and emphasizes anonymization and client-side data storage and processing. We discuss both approaches with a view to their technical overlaps and boundaries as well as to economic feasibility. The paper aims to introduce engineers and computer scientists to the privacy research domain and provide concrete guidance on how to design privacy-friendly systems.