Engineering Privacy
In this paper we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline's topics. First we discuss privacy requirements grounded in both historic and contemporary perspectives on pri...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on software engineering 2009-01, Vol.35 (1), p.67-82 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 82 |
---|---|
container_issue | 1 |
container_start_page | 67 |
container_title | IEEE transactions on software engineering |
container_volume | 35 |
creator | Spiekermann, S. Cranor, L.F. |
description | In this paper we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline's topics. First we discuss privacy requirements grounded in both historic and contemporary perspectives on privacy. We use a three-layer model of user privacy concerns to relate them to system operations (data transfer, storage and processing) and examine their effects on user behavior. In the second part of the paper we develop guidelines for building privacy-friendly systems. We distinguish two approaches: "privacy-by-policy" and "privacy-by-architecture." The privacy-by-policy approach focuses on the implementation of the notice and choice principles of fair information practices (FIPs), while the privacy-by-architecture approach minimizes the collection of identifiable personal data and emphasizes anonymization and client-side data storage and processing. We discuss both approaches with a view to their technical overlaps and boundaries as well as to economic feasibility. The paper aims to introduce engineers and computer scientists to the privacy research domain and provide concrete guidance on how to design privacy-friendly systems. |
doi_str_mv | 10.1109/TSE.2008.88 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_miscellaneous_34441658</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4657365</ieee_id><sourcerecordid>869847158</sourcerecordid><originalsourceid>FETCH-LOGICAL-c417t-b444d2140552f2ba866f52fc95889cb42aaec14bb58355e538ec8c5e14b9718f3</originalsourceid><addsrcrecordid>eNqFkD1LA0EQhhdRMEarlDZioYVc3K_Zmy0lxA8IKBjrZW-dCxeSu7hrhPx7N0YsLLSaYXh4Z-ZhbCD4UAhur6fP46HkHIeIe6wnrLKFAsn3WY9ziwUA2kN2lNKccw5lCT02GLezpiWKTTs7e4rNhw-bY3ZQ-0Wik-_aZy-34-novpg83j2MbiZF0KJ8Lyqt9asUmgPIWlYejalzFywg2lBp6T0FoasKUAEQKKSAASiPbCmwVn12uctdxe5tTendLZsUaLHwLXXr5CxXRitt9b8kGou6FHlRn138Sap8tDBf4PkvcN6tY5v_dcJmUTILytDVDgqxSylS7VaxWfq4cYK7rXGXjbutcYfbyNMd3RDRD6lNDjKgPgFYLXhk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>195582057</pqid></control><display><type>article</type><title>Engineering Privacy</title><source>IEEE Electronic Library (IEL)</source><creator>Spiekermann, S. ; Cranor, L.F.</creator><creatorcontrib>Spiekermann, S. ; Cranor, L.F.</creatorcontrib><description>In this paper we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline's topics. First we discuss privacy requirements grounded in both historic and contemporary perspectives on privacy. We use a three-layer model of user privacy concerns to relate them to system operations (data transfer, storage and processing) and examine their effects on user behavior. In the second part of the paper we develop guidelines for building privacy-friendly systems. We distinguish two approaches: "privacy-by-policy" and "privacy-by-architecture." The privacy-by-policy approach focuses on the implementation of the notice and choice principles of fair information practices (FIPs), while the privacy-by-architecture approach minimizes the collection of identifiable personal data and emphasizes anonymization and client-side data storage and processing. We discuss both approaches with a view to their technical overlaps and boundaries as well as to economic feasibility. The paper aims to introduce engineers and computer scientists to the privacy research domain and provide concrete guidance on how to design privacy-friendly systems.</description><identifier>ISSN: 0098-5589</identifier><identifier>EISSN: 1939-3520</identifier><identifier>DOI: 10.1109/TSE.2008.88</identifier><identifier>CODEN: IESEDJ</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Architecture ; Boundaries ; Companies ; Consumer behavior ; Consumers ; Data encryption ; Data privacy ; Data storage ; Design engineering ; Digital Object Identifier ; Economics ; Electronics ; Guidelines ; Historic ; Information systems ; Invasion of privacy ; Islands ; Law ; Legal Aspects of Computing ; Memory ; Personal information ; Privacy ; Protection ; Radio frequency identification ; Radiofrequency identification ; Requirements/Specifications ; Security and Protection ; Security management ; Social network services ; Social networks ; Social research ; Software engineering ; Studies ; Systems engineering and theory ; Technology adoption ; Ubiquitous computing</subject><ispartof>IEEE transactions on software engineering, 2009-01, Vol.35 (1), p.67-82</ispartof><rights>Copyright IEEE Computer Society Jan 2009</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c417t-b444d2140552f2ba866f52fc95889cb42aaec14bb58355e538ec8c5e14b9718f3</citedby><cites>FETCH-LOGICAL-c417t-b444d2140552f2ba866f52fc95889cb42aaec14bb58355e538ec8c5e14b9718f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4657365$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4657365$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Spiekermann, S.</creatorcontrib><creatorcontrib>Cranor, L.F.</creatorcontrib><title>Engineering Privacy</title><title>IEEE transactions on software engineering</title><addtitle>TSE</addtitle><description>In this paper we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline's topics. First we discuss privacy requirements grounded in both historic and contemporary perspectives on privacy. We use a three-layer model of user privacy concerns to relate them to system operations (data transfer, storage and processing) and examine their effects on user behavior. In the second part of the paper we develop guidelines for building privacy-friendly systems. We distinguish two approaches: "privacy-by-policy" and "privacy-by-architecture." The privacy-by-policy approach focuses on the implementation of the notice and choice principles of fair information practices (FIPs), while the privacy-by-architecture approach minimizes the collection of identifiable personal data and emphasizes anonymization and client-side data storage and processing. We discuss both approaches with a view to their technical overlaps and boundaries as well as to economic feasibility. The paper aims to introduce engineers and computer scientists to the privacy research domain and provide concrete guidance on how to design privacy-friendly systems.</description><subject>Architecture</subject><subject>Boundaries</subject><subject>Companies</subject><subject>Consumer behavior</subject><subject>Consumers</subject><subject>Data encryption</subject><subject>Data privacy</subject><subject>Data storage</subject><subject>Design engineering</subject><subject>Digital Object Identifier</subject><subject>Economics</subject><subject>Electronics</subject><subject>Guidelines</subject><subject>Historic</subject><subject>Information systems</subject><subject>Invasion of privacy</subject><subject>Islands</subject><subject>Law</subject><subject>Legal Aspects of Computing</subject><subject>Memory</subject><subject>Personal information</subject><subject>Privacy</subject><subject>Protection</subject><subject>Radio frequency identification</subject><subject>Radiofrequency identification</subject><subject>Requirements/Specifications</subject><subject>Security and Protection</subject><subject>Security management</subject><subject>Social network services</subject><subject>Social networks</subject><subject>Social research</subject><subject>Software engineering</subject><subject>Studies</subject><subject>Systems engineering and theory</subject><subject>Technology adoption</subject><subject>Ubiquitous computing</subject><issn>0098-5589</issn><issn>1939-3520</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNqFkD1LA0EQhhdRMEarlDZioYVc3K_Zmy0lxA8IKBjrZW-dCxeSu7hrhPx7N0YsLLSaYXh4Z-ZhbCD4UAhur6fP46HkHIeIe6wnrLKFAsn3WY9ziwUA2kN2lNKccw5lCT02GLezpiWKTTs7e4rNhw-bY3ZQ-0Wik-_aZy-34-novpg83j2MbiZF0KJ8Lyqt9asUmgPIWlYejalzFywg2lBp6T0FoasKUAEQKKSAASiPbCmwVn12uctdxe5tTendLZsUaLHwLXXr5CxXRitt9b8kGou6FHlRn138Sap8tDBf4PkvcN6tY5v_dcJmUTILytDVDgqxSylS7VaxWfq4cYK7rXGXjbutcYfbyNMd3RDRD6lNDjKgPgFYLXhk</recordid><startdate>200901</startdate><enddate>200901</enddate><creator>Spiekermann, S.</creator><creator>Cranor, L.F.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7X7</scope><scope>7XB</scope><scope>87Z</scope><scope>88E</scope><scope>88F</scope><scope>88I</scope><scope>88K</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>FYUFA</scope><scope>F~G</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>K9.</scope><scope>L.-</scope><scope>L6V</scope><scope>M0C</scope><scope>M0N</scope><scope>M0S</scope><scope>M1P</scope><scope>M1Q</scope><scope>M2O</scope><scope>M2P</scope><scope>M2T</scope><scope>M7S</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>200901</creationdate><title>Engineering Privacy</title><author>Spiekermann, S. ; Cranor, L.F.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c417t-b444d2140552f2ba866f52fc95889cb42aaec14bb58355e538ec8c5e14b9718f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Architecture</topic><topic>Boundaries</topic><topic>Companies</topic><topic>Consumer behavior</topic><topic>Consumers</topic><topic>Data encryption</topic><topic>Data privacy</topic><topic>Data storage</topic><topic>Design engineering</topic><topic>Digital Object Identifier</topic><topic>Economics</topic><topic>Electronics</topic><topic>Guidelines</topic><topic>Historic</topic><topic>Information systems</topic><topic>Invasion of privacy</topic><topic>Islands</topic><topic>Law</topic><topic>Legal Aspects of Computing</topic><topic>Memory</topic><topic>Personal information</topic><topic>Privacy</topic><topic>Protection</topic><topic>Radio frequency identification</topic><topic>Radiofrequency identification</topic><topic>Requirements/Specifications</topic><topic>Security and Protection</topic><topic>Security management</topic><topic>Social network services</topic><topic>Social networks</topic><topic>Social research</topic><topic>Software engineering</topic><topic>Studies</topic><topic>Systems engineering and theory</topic><topic>Technology adoption</topic><topic>Ubiquitous computing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Spiekermann, S.</creatorcontrib><creatorcontrib>Cranor, L.F.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>Health & Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Medical Database (Alumni Edition)</collection><collection>Military Database (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>Telecommunications (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>Health Research Premium Collection</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Health & Medical Complete (Alumni)</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Health & Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>Military Database</collection><collection>Research Library</collection><collection>Science Database</collection><collection>Telecommunications Database</collection><collection>Engineering Database</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on software engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Spiekermann, S.</au><au>Cranor, L.F.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Engineering Privacy</atitle><jtitle>IEEE transactions on software engineering</jtitle><stitle>TSE</stitle><date>2009-01</date><risdate>2009</risdate><volume>35</volume><issue>1</issue><spage>67</spage><epage>82</epage><pages>67-82</pages><issn>0098-5589</issn><eissn>1939-3520</eissn><coden>IESEDJ</coden><abstract>In this paper we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline's topics. First we discuss privacy requirements grounded in both historic and contemporary perspectives on privacy. We use a three-layer model of user privacy concerns to relate them to system operations (data transfer, storage and processing) and examine their effects on user behavior. In the second part of the paper we develop guidelines for building privacy-friendly systems. We distinguish two approaches: "privacy-by-policy" and "privacy-by-architecture." The privacy-by-policy approach focuses on the implementation of the notice and choice principles of fair information practices (FIPs), while the privacy-by-architecture approach minimizes the collection of identifiable personal data and emphasizes anonymization and client-side data storage and processing. We discuss both approaches with a view to their technical overlaps and boundaries as well as to economic feasibility. The paper aims to introduce engineers and computer scientists to the privacy research domain and provide concrete guidance on how to design privacy-friendly systems.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TSE.2008.88</doi><tpages>16</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0098-5589 |
ispartof | IEEE transactions on software engineering, 2009-01, Vol.35 (1), p.67-82 |
issn | 0098-5589 1939-3520 |
language | eng |
recordid | cdi_proquest_miscellaneous_34441658 |
source | IEEE Electronic Library (IEL) |
subjects | Architecture Boundaries Companies Consumer behavior Consumers Data encryption Data privacy Data storage Design engineering Digital Object Identifier Economics Electronics Guidelines Historic Information systems Invasion of privacy Islands Law Legal Aspects of Computing Memory Personal information Privacy Protection Radio frequency identification Radiofrequency identification Requirements/Specifications Security and Protection Security management Social network services Social networks Social research Software engineering Studies Systems engineering and theory Technology adoption Ubiquitous computing |
title | Engineering Privacy |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-14T07%3A39%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Engineering%20Privacy&rft.jtitle=IEEE%20transactions%20on%20software%20engineering&rft.au=Spiekermann,%20S.&rft.date=2009-01&rft.volume=35&rft.issue=1&rft.spage=67&rft.epage=82&rft.pages=67-82&rft.issn=0098-5589&rft.eissn=1939-3520&rft.coden=IESEDJ&rft_id=info:doi/10.1109/TSE.2008.88&rft_dat=%3Cproquest_RIE%3E869847158%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=195582057&rft_id=info:pmid/&rft_ieee_id=4657365&rfr_iscdi=true |