2012
DOI: 10.1145/2209249.2209263
|View full text |Cite
|
Sign up to set email alerts
|

The challenges of privacy by design

Abstract: Heralded by regulators, Privacy by Design holds the promise to solve the digital world's privacy problems. But there are immense challenges, including management commitment and step-by-step methods to integrate privacy into systems.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
70
0
2

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 112 publications
(73 citation statements)
references
References 2 publications
1
70
0
2
Order By: Relevance
“…"Privacy by Design is an engineering and strategic management approach that commits to selectively and sustainably minimize information systems' privacy risks through pro-active technical and governance controls." (Spiekermann, 2012). Privacy-by-design has been driven by the increasing recognition that a respect for user privacy cannot be realised through bolted-on measures that are only added to a system after it is deployed.…”
Section: Existing Privacy Compliance Procedures and Privacy-by-designmentioning
confidence: 99%
“…"Privacy by Design is an engineering and strategic management approach that commits to selectively and sustainably minimize information systems' privacy risks through pro-active technical and governance controls." (Spiekermann, 2012). Privacy-by-design has been driven by the increasing recognition that a respect for user privacy cannot be realised through bolted-on measures that are only added to a system after it is deployed.…”
Section: Existing Privacy Compliance Procedures and Privacy-by-designmentioning
confidence: 99%
“…For example, P5 said, The principles are complex and lengthy, how can I implement them?. Previous work has also challenged privacy practices such as PbD for being complex and too theoretical to be used within the software development processes [13,21,30,32]. These privacy practices are mostly generated through social and legal research [4,21], in order to broadly capture a vast amount of privacy requirements and present them in an abstract form, such as the respect for user privacy principle in PbD.…”
Section: Participants Had Trouble Relating Privacy Requirements Into mentioning
confidence: 99%
“…Scholars have noted the challenges of engineering privacy without such a concomitant consideration of these "softer" organizational aspects [19,21,28]. An integral element in this is the PIA [16,29]. Use of PIAs appears to be confined mostly to governments and a few very large corporations, although in the latter case there is scant evidence on the quality of the assessments being carried out [31].…”
Section: Related Work In Pbd and Piasmentioning
confidence: 99%