Engineering Privacy

In this paper we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline's topics. First we discuss privacy requirements grounded in both historic and contemporary perspectives on pri...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on software engineering 2009-01, Vol.35 (1), p.67-82
Hauptverfasser: Spiekermann, S., Cranor, L.F.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 82
container_issue 1
container_start_page 67
container_title IEEE transactions on software engineering
container_volume 35
creator Spiekermann, S.
Cranor, L.F.
description In this paper we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline's topics. First we discuss privacy requirements grounded in both historic and contemporary perspectives on privacy. We use a three-layer model of user privacy concerns to relate them to system operations (data transfer, storage and processing) and examine their effects on user behavior. In the second part of the paper we develop guidelines for building privacy-friendly systems. We distinguish two approaches: "privacy-by-policy" and "privacy-by-architecture." The privacy-by-policy approach focuses on the implementation of the notice and choice principles of fair information practices (FIPs), while the privacy-by-architecture approach minimizes the collection of identifiable personal data and emphasizes anonymization and client-side data storage and processing. We discuss both approaches with a view to their technical overlaps and boundaries as well as to economic feasibility. The paper aims to introduce engineers and computer scientists to the privacy research domain and provide concrete guidance on how to design privacy-friendly systems.
doi_str_mv 10.1109/TSE.2008.88
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_miscellaneous_34441658</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4657365</ieee_id><sourcerecordid>869847158</sourcerecordid><originalsourceid>FETCH-LOGICAL-c417t-b444d2140552f2ba866f52fc95889cb42aaec14bb58355e538ec8c5e14b9718f3</originalsourceid><addsrcrecordid>eNqFkD1LA0EQhhdRMEarlDZioYVc3K_Zmy0lxA8IKBjrZW-dCxeSu7hrhPx7N0YsLLSaYXh4Z-ZhbCD4UAhur6fP46HkHIeIe6wnrLKFAsn3WY9ziwUA2kN2lNKccw5lCT02GLezpiWKTTs7e4rNhw-bY3ZQ-0Wik-_aZy-34-novpg83j2MbiZF0KJ8Lyqt9asUmgPIWlYejalzFywg2lBp6T0FoasKUAEQKKSAASiPbCmwVn12uctdxe5tTendLZsUaLHwLXXr5CxXRitt9b8kGou6FHlRn138Sap8tDBf4PkvcN6tY5v_dcJmUTILytDVDgqxSylS7VaxWfq4cYK7rXGXjbutcYfbyNMd3RDRD6lNDjKgPgFYLXhk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>195582057</pqid></control><display><type>article</type><title>Engineering Privacy</title><source>IEEE Electronic Library (IEL)</source><creator>Spiekermann, S. ; Cranor, L.F.</creator><creatorcontrib>Spiekermann, S. ; Cranor, L.F.</creatorcontrib><description>In this paper we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline's topics. First we discuss privacy requirements grounded in both historic and contemporary perspectives on privacy. We use a three-layer model of user privacy concerns to relate them to system operations (data transfer, storage and processing) and examine their effects on user behavior. In the second part of the paper we develop guidelines for building privacy-friendly systems. We distinguish two approaches: "privacy-by-policy" and "privacy-by-architecture." The privacy-by-policy approach focuses on the implementation of the notice and choice principles of fair information practices (FIPs), while the privacy-by-architecture approach minimizes the collection of identifiable personal data and emphasizes anonymization and client-side data storage and processing. We discuss both approaches with a view to their technical overlaps and boundaries as well as to economic feasibility. The paper aims to introduce engineers and computer scientists to the privacy research domain and provide concrete guidance on how to design privacy-friendly systems.</description><identifier>ISSN: 0098-5589</identifier><identifier>EISSN: 1939-3520</identifier><identifier>DOI: 10.1109/TSE.2008.88</identifier><identifier>CODEN: IESEDJ</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Architecture ; Boundaries ; Companies ; Consumer behavior ; Consumers ; Data encryption ; Data privacy ; Data storage ; Design engineering ; Digital Object Identifier ; Economics ; Electronics ; Guidelines ; Historic ; Information systems ; Invasion of privacy ; Islands ; Law ; Legal Aspects of Computing ; Memory ; Personal information ; Privacy ; Protection ; Radio frequency identification ; Radiofrequency identification ; Requirements/Specifications ; Security and Protection ; Security management ; Social network services ; Social networks ; Social research ; Software engineering ; Studies ; Systems engineering and theory ; Technology adoption ; Ubiquitous computing</subject><ispartof>IEEE transactions on software engineering, 2009-01, Vol.35 (1), p.67-82</ispartof><rights>Copyright IEEE Computer Society Jan 2009</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c417t-b444d2140552f2ba866f52fc95889cb42aaec14bb58355e538ec8c5e14b9718f3</citedby><cites>FETCH-LOGICAL-c417t-b444d2140552f2ba866f52fc95889cb42aaec14bb58355e538ec8c5e14b9718f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4657365$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4657365$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Spiekermann, S.</creatorcontrib><creatorcontrib>Cranor, L.F.</creatorcontrib><title>Engineering Privacy</title><title>IEEE transactions on software engineering</title><addtitle>TSE</addtitle><description>In this paper we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline's topics. First we discuss privacy requirements grounded in both historic and contemporary perspectives on privacy. We use a three-layer model of user privacy concerns to relate them to system operations (data transfer, storage and processing) and examine their effects on user behavior. In the second part of the paper we develop guidelines for building privacy-friendly systems. We distinguish two approaches: "privacy-by-policy" and "privacy-by-architecture." The privacy-by-policy approach focuses on the implementation of the notice and choice principles of fair information practices (FIPs), while the privacy-by-architecture approach minimizes the collection of identifiable personal data and emphasizes anonymization and client-side data storage and processing. We discuss both approaches with a view to their technical overlaps and boundaries as well as to economic feasibility. The paper aims to introduce engineers and computer scientists to the privacy research domain and provide concrete guidance on how to design privacy-friendly systems.</description><subject>Architecture</subject><subject>Boundaries</subject><subject>Companies</subject><subject>Consumer behavior</subject><subject>Consumers</subject><subject>Data encryption</subject><subject>Data privacy</subject><subject>Data storage</subject><subject>Design engineering</subject><subject>Digital Object Identifier</subject><subject>Economics</subject><subject>Electronics</subject><subject>Guidelines</subject><subject>Historic</subject><subject>Information systems</subject><subject>Invasion of privacy</subject><subject>Islands</subject><subject>Law</subject><subject>Legal Aspects of Computing</subject><subject>Memory</subject><subject>Personal information</subject><subject>Privacy</subject><subject>Protection</subject><subject>Radio frequency identification</subject><subject>Radiofrequency identification</subject><subject>Requirements/Specifications</subject><subject>Security and Protection</subject><subject>Security management</subject><subject>Social network services</subject><subject>Social networks</subject><subject>Social research</subject><subject>Software engineering</subject><subject>Studies</subject><subject>Systems engineering and theory</subject><subject>Technology adoption</subject><subject>Ubiquitous computing</subject><issn>0098-5589</issn><issn>1939-3520</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNqFkD1LA0EQhhdRMEarlDZioYVc3K_Zmy0lxA8IKBjrZW-dCxeSu7hrhPx7N0YsLLSaYXh4Z-ZhbCD4UAhur6fP46HkHIeIe6wnrLKFAsn3WY9ziwUA2kN2lNKccw5lCT02GLezpiWKTTs7e4rNhw-bY3ZQ-0Wik-_aZy-34-novpg83j2MbiZF0KJ8Lyqt9asUmgPIWlYejalzFywg2lBp6T0FoasKUAEQKKSAASiPbCmwVn12uctdxe5tTendLZsUaLHwLXXr5CxXRitt9b8kGou6FHlRn138Sap8tDBf4PkvcN6tY5v_dcJmUTILytDVDgqxSylS7VaxWfq4cYK7rXGXjbutcYfbyNMd3RDRD6lNDjKgPgFYLXhk</recordid><startdate>200901</startdate><enddate>200901</enddate><creator>Spiekermann, S.</creator><creator>Cranor, L.F.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7X7</scope><scope>7XB</scope><scope>87Z</scope><scope>88E</scope><scope>88F</scope><scope>88I</scope><scope>88K</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>FYUFA</scope><scope>F~G</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>K9.</scope><scope>L.-</scope><scope>L6V</scope><scope>M0C</scope><scope>M0N</scope><scope>M0S</scope><scope>M1P</scope><scope>M1Q</scope><scope>M2O</scope><scope>M2P</scope><scope>M2T</scope><scope>M7S</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>200901</creationdate><title>Engineering Privacy</title><author>Spiekermann, S. ; Cranor, L.F.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c417t-b444d2140552f2ba866f52fc95889cb42aaec14bb58355e538ec8c5e14b9718f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Architecture</topic><topic>Boundaries</topic><topic>Companies</topic><topic>Consumer behavior</topic><topic>Consumers</topic><topic>Data encryption</topic><topic>Data privacy</topic><topic>Data storage</topic><topic>Design engineering</topic><topic>Digital Object Identifier</topic><topic>Economics</topic><topic>Electronics</topic><topic>Guidelines</topic><topic>Historic</topic><topic>Information systems</topic><topic>Invasion of privacy</topic><topic>Islands</topic><topic>Law</topic><topic>Legal Aspects of Computing</topic><topic>Memory</topic><topic>Personal information</topic><topic>Privacy</topic><topic>Protection</topic><topic>Radio frequency identification</topic><topic>Radiofrequency identification</topic><topic>Requirements/Specifications</topic><topic>Security and Protection</topic><topic>Security management</topic><topic>Social network services</topic><topic>Social networks</topic><topic>Social research</topic><topic>Software engineering</topic><topic>Studies</topic><topic>Systems engineering and theory</topic><topic>Technology adoption</topic><topic>Ubiquitous computing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Spiekermann, S.</creatorcontrib><creatorcontrib>Cranor, L.F.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>Health &amp; Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Medical Database (Alumni Edition)</collection><collection>Military Database (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>Telecommunications (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>Health Research Premium Collection</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Health &amp; Medical Complete (Alumni)</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Health &amp; Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>Military Database</collection><collection>Research Library</collection><collection>Science Database</collection><collection>Telecommunications Database</collection><collection>Engineering Database</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on software engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Spiekermann, S.</au><au>Cranor, L.F.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Engineering Privacy</atitle><jtitle>IEEE transactions on software engineering</jtitle><stitle>TSE</stitle><date>2009-01</date><risdate>2009</risdate><volume>35</volume><issue>1</issue><spage>67</spage><epage>82</epage><pages>67-82</pages><issn>0098-5589</issn><eissn>1939-3520</eissn><coden>IESEDJ</coden><abstract>In this paper we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline's topics. First we discuss privacy requirements grounded in both historic and contemporary perspectives on privacy. We use a three-layer model of user privacy concerns to relate them to system operations (data transfer, storage and processing) and examine their effects on user behavior. In the second part of the paper we develop guidelines for building privacy-friendly systems. We distinguish two approaches: "privacy-by-policy" and "privacy-by-architecture." The privacy-by-policy approach focuses on the implementation of the notice and choice principles of fair information practices (FIPs), while the privacy-by-architecture approach minimizes the collection of identifiable personal data and emphasizes anonymization and client-side data storage and processing. We discuss both approaches with a view to their technical overlaps and boundaries as well as to economic feasibility. The paper aims to introduce engineers and computer scientists to the privacy research domain and provide concrete guidance on how to design privacy-friendly systems.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TSE.2008.88</doi><tpages>16</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0098-5589
ispartof IEEE transactions on software engineering, 2009-01, Vol.35 (1), p.67-82
issn 0098-5589
1939-3520
language eng
recordid cdi_proquest_miscellaneous_34441658
source IEEE Electronic Library (IEL)
subjects Architecture
Boundaries
Companies
Consumer behavior
Consumers
Data encryption
Data privacy
Data storage
Design engineering
Digital Object Identifier
Economics
Electronics
Guidelines
Historic
Information systems
Invasion of privacy
Islands
Law
Legal Aspects of Computing
Memory
Personal information
Privacy
Protection
Radio frequency identification
Radiofrequency identification
Requirements/Specifications
Security and Protection
Security management
Social network services
Social networks
Social research
Software engineering
Studies
Systems engineering and theory
Technology adoption
Ubiquitous computing
title Engineering Privacy
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-14T07%3A39%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Engineering%20Privacy&rft.jtitle=IEEE%20transactions%20on%20software%20engineering&rft.au=Spiekermann,%20S.&rft.date=2009-01&rft.volume=35&rft.issue=1&rft.spage=67&rft.epage=82&rft.pages=67-82&rft.issn=0098-5589&rft.eissn=1939-3520&rft.coden=IESEDJ&rft_id=info:doi/10.1109/TSE.2008.88&rft_dat=%3Cproquest_RIE%3E869847158%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=195582057&rft_id=info:pmid/&rft_ieee_id=4657365&rfr_iscdi=true