2017
DOI: 10.1080/13600869.2017.1275123
|View full text |Cite
|
Sign up to set email alerts
|

Opening the black box: Petri nets and Privacy by Design

Abstract: Building on the growing literature in algorithmic accountability, this paper investigates the use of a process visualisation technique known as the Petri net to achieve the aims of Privacy by Design. The strength of the approach is that it can help to bridge the knowledge gap that often exists between those in the legal and technical domains. Intuitive visual representations of the status of a system and the flow of information within and between legal and system models mean developers can embody the aims of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…Moreover, there is an increasing need for transparency, verification, and explainability of privacy-aware IT systems. Disclosing the source code or recurring to the use of open source is indeed a best practice, but it is not sufficient because it does not provide a proper verification instrument for the legal experts, since the gap between legal and technical languages is too big [62]. We remark that checking a source code's correctness and compliance to a given legislation corpus constitutes a notable effort even for an expert developer.…”
Section: B the Promise Of Formal Approaches: Languages Logics Context...mentioning
confidence: 96%
“…Moreover, there is an increasing need for transparency, verification, and explainability of privacy-aware IT systems. Disclosing the source code or recurring to the use of open source is indeed a best practice, but it is not sufficient because it does not provide a proper verification instrument for the legal experts, since the gap between legal and technical languages is too big [62]. We remark that checking a source code's correctness and compliance to a given legislation corpus constitutes a notable effort even for an expert developer.…”
Section: B the Promise Of Formal Approaches: Languages Logics Context...mentioning
confidence: 96%
“…Petrinets can also be used to model and analyze privacy by design [16,26]. They can be used to model the business flows and algorithms within processes, similar to an activity diagram.…”
Section: Architectural Approachesmentioning
confidence: 99%
“…A concept that seems to focus on multiple steps of technology, its whole life cycle, is privacy-by-design. Even though its ‗name' refers to design, its interpretation, as provided in small print, footnotes, soft laws, press releases (European Commission, 2010: 17;EDPS, 2018: 4, 10) or literature (Diver & Schafer, 2017), suggests that the relevant principle (here, the protection of privacy) be embedded throughout the entire life cycle of technologies, from the early design stage to their deployment, use and ultimate disposal. Therefore, it would be reasonable and fair to suggest that ethical principles be promoted and incorporated in the many shape-determining steps of technologies.…”
Section: Ethics In Machines? a Need For Consensusmentioning
confidence: 99%