2012
DOI: 10.1007/978-3-642-31668-5_2
|View full text |Cite
|
Sign up to set email alerts
|

Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals

Abstract: Privacy requirements are often not well considered in system design. The objective of this paper is to help interested system designers in three ways: First, it is discussed how "privacy" should be understood when designing systems that take into account the protection of individuals' rights and their private spheres. Here specifically the concept of linkage control as an essence of privacy is introduced. Second, the paper presents a list of ten issues in system design collected during the daily work of a Data… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(19 citation statements)
references
References 12 publications
0
19
0
Order By: Relevance
“…Thus, expectations about the treatment of data must be revised to accept transparency in place of privacy, although this too cannot necessarily be assured, some of the practicalities of which are discussed in [17] . Hansen [10] sets out higher level requirements: "unlinkability when possible and desired, transparency on possible and actual linkages, and the feasibility for data subjects to exercise control or at least intervene in the processing of data." We notice "where possible": there cannot be absolute guarantees, only best efforts, hence our notion of satisficing security.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, expectations about the treatment of data must be revised to accept transparency in place of privacy, although this too cannot necessarily be assured, some of the practicalities of which are discussed in [17] . Hansen [10] sets out higher level requirements: "unlinkability when possible and desired, transparency on possible and actual linkages, and the feasibility for data subjects to exercise control or at least intervene in the processing of data." We notice "where possible": there cannot be absolute guarantees, only best efforts, hence our notion of satisficing security.…”
Section: Related Workmentioning
confidence: 99%
“…These goals focus on the infrastructure and the organization as a whole. From a privacy engineering perspective new approaches [7,8] argue to integrate unlinkability, transparency, intervenability in a similar way as privacy protection goals into software engineering. Several researchers ( [9][10][11]) have identified that secure software not only requires secure algorithms but that their usage has to be fostered in software engineering processes.…”
Section: Security Engineeringmentioning
confidence: 99%
“…In this paper, we consider the generation of privacy requirements related to the protection goals for privacy engineering proposed by Hansen [5]. These protection goals include the classical security goals confidentiality, integrity, and availability and the privacy goals unlinkability, transparency, and intervenability.…”
Section: Problem-based Privacy Analysismentioning
confidence: 99%
“…End-users wish for more empowerment, i.e., they want to keep control of their personal data and how their data is processed by information systems. Hansen [5] summarizes this and other privacy needs into the privacy goal of intervenability. Hansen states "Intervenability aims at the possibility for parties involved in any privacy-relevant data processing to interfere with the ongoing or planned data processing.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation