2018
DOI: 10.1007/978-3-030-00305-0_17
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Risk Assessment: From Art to Science, by Metrics

Abstract: Privacy risk assessments aim to analyze and quantify the privacy risks associated with new systems. As such, they are critically important in ensuring that adequate privacy protections are built in. However, current methods to quantify privacy risk rely heavily on experienced analysts picking the "correct" risk level on e.g. a five-point scale.In this paper, we argue that a more scientific quantification of privacy risk increases accuracy and reliability and can thus make it easier to build privacy-friendly sy… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 29 publications
(24 citation statements)
references
References 14 publications
0
24
0
Order By: Relevance
“…Many privacy harms are well‐known and well‐documented. For example, IETF RFC 6973 describes privacy harms in the context of internet protocol engineering, including “harms to financial standing, reputation, solitude, autonomy, and safety.” Regulators as well as researchers have published lists of known privacy harms, often grouped along Solove's taxonomy into harms caused by information collection, information processing, information dissemination, and invasion …”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Many privacy harms are well‐known and well‐documented. For example, IETF RFC 6973 describes privacy harms in the context of internet protocol engineering, including “harms to financial standing, reputation, solitude, autonomy, and safety.” Regulators as well as researchers have published lists of known privacy harms, often grouped along Solove's taxonomy into harms caused by information collection, information processing, information dissemination, and invasion …”
Section: Related Workmentioning
confidence: 99%
“…The use of these coarse three‐point or five‐point scales means that the resulting assessment of privacy risk may be more like a rough guess than an accurate measurement. We have previously argued that these rough guesses for privacy risk are of limited value and not informative enough, in particular for the five purposes of (a) quantifying the effect of privacy controls, (b) comparing the effects of different controls, (c) analyzing trends in privacy risk over time, (d) computing a system's aggregate privacy risk from its components, and (e) ranking privacy risks.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…One is to develop methodology to compare different kinds of endpoints, such as privacy [79] vs. security. Another one is to specify the severity of each hazard since it inevitably involves a value judgment.…”
Section: Appendix B32 Specifying the Endpoints (Proposition 2)mentioning
confidence: 99%