2016 IEEE Security and Privacy Workshops (SPW) 2016
DOI: 10.1109/spw.2016.19
|View full text |Cite
|
Sign up to set email alerts
|

From Privacy Impact Assessment to Social Impact Assessment

Abstract: Abstract-In order to address the continued decline in consumer trust in all things digital, and specifically the Internet of Things (IoT), we propose a radical overhaul of IoT design processes. Privacy by Design has been proposed as a suitable framework, but we argue the current approach has two failings: it presents too abstract a framework to inform design; and it is often applied after many critical design decisions have been made in defining the business opportunity. To rebuild trust we need the philosophy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 21 publications
0
3
0
1
Order By: Relevance
“…Assessment. Privacy impact assessments should help provide a secure method of analyzing how personally identifiable information is collected, stored, secured, shared, and handled and how it is disposed of, governed by this section [105,111,112].…”
Section: Privacy Requirementsmentioning
confidence: 99%
“…Assessment. Privacy impact assessments should help provide a secure method of analyzing how personally identifiable information is collected, stored, secured, shared, and handled and how it is disposed of, governed by this section [105,111,112].…”
Section: Privacy Requirementsmentioning
confidence: 99%
“…Users might not foresee the possible risks of inferences drawn from their data, especially when datasets are combined. Edwards et al even suggest that "social impact assessment" should be considered that would "consider the public interest as well as the interests and rights of enterprises and users" [56] and look at factors like sharing practices since "B2B relationships, are not designed with privacy as a prime consideration " [56].…”
Section: Guideline 7: Ethical Data Sharing Practicesmentioning
confidence: 99%
“…It has been shown in many studies that employees are the weakest link in any organization in terms of information security (Edwards et al, 2016;Kotenko et al, 2011;Irani et al, 2011). Many security attacks are due to social engineering, which relies on a low level of employee awareness of safe security practices that need to be followed to prevent such attacks (Edwards et al, 2016;Kotenko et al, 2011;Irani et al, 2011). Therefore, the security metric for this layer has to be defined to meet the requirements of the security design principle of securing the weakest link.…”
Section: Employee-based Security Assessmentmentioning
confidence: 99%