Proceedings of the 20th European Conference on Pattern Languages of Programs 2015
DOI: 10.1145/2855321.2855374
|View full text |Cite
|
Sign up to set email alerts
|

Privacy transparency patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(14 citation statements)
references
References 4 publications
0
14
0
Order By: Relevance
“…Ali et al [49] propose the Privacy Injection Pattern as a means to automatically integrate privacy patterns into existing or new code. Siljee [38] describes two privacy patterns focused on transparency: the personal data table pattern and the privacy policy icons pattern. In addition, Bier and Krempel [50] analyze video surveillance and smart energy systems to derive three privacy patterns: privacy proxy, data abstraction, and instant user interface for information concerning PII.…”
Section: Patternsmentioning
confidence: 99%
See 1 more Smart Citation
“…Ali et al [49] propose the Privacy Injection Pattern as a means to automatically integrate privacy patterns into existing or new code. Siljee [38] describes two privacy patterns focused on transparency: the personal data table pattern and the privacy policy icons pattern. In addition, Bier and Krempel [50] analyze video surveillance and smart energy systems to derive three privacy patterns: privacy proxy, data abstraction, and instant user interface for information concerning PII.…”
Section: Patternsmentioning
confidence: 99%
“…[37] [38] [39] [40] [41], the Internet of Things[42], mobile systems[43] [44], big data[15] [82] and e-commerce[45] [46]. They may also provide guidelines that can be used to include PbD in systems in the form of patterns…”
mentioning
confidence: 99%
“…A first step towards transparency is to grant the right of access 14 . Siljee's [14] Personal Data Table fulfills all requirements to realize the execution of this right. The Personal Data Table should be extended by an element to depict data flows to involved processors.…”
Section: Gdprmentioning
confidence: 99%
“…In order to execute T1 (as defined in Section 5), all personal data has to be presented to the user. This data is displayed ex post like Siljee's [14] Personal Data Table. This enables answering the question: Which data collected the controller in question about me? The most challenging aspect of this task is to realize the visualization of huge amounts of diverse data.…”
Section: Data Taxonomymentioning
confidence: 99%
“…Finally, in [13] the authors propose two Privacy Design Standards to facilitate the development of applications through solutions to recurrent privacy problems, focusing on trans-parency as a measure to establish broad control for users about their personal data. These standards are based on a set of factors, such as objective, user profile, usage context, problem, solution and consequences.…”
Section: Introductionmentioning
confidence: 99%