Engineering Privacy

被引:235
作者
Spiekermann, Sarah [1 ]
Cranor, Lorrie Faith [2 ]
机构
[1] Humboldt Univ, Inst Informat Syst, D-10178 Berlin, Germany
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
关键词
Privacy; security; privacy-enhancing technologies; anonymity; identification;
D O I
10.1109/TSE.2008.88
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline's topics. First, we discuss privacy requirements grounded in both historic and contemporary perspectives on privacy. We use a three-layer model of user privacy concerns to relate them to system operations (data transfer, storage, and processing) and examine their effects on user behavior. In the second part of this paper, we develop guidelines for building privacy-friendly systems. We distinguish two approaches: "privacy-by-policy" and "privacy-by-architecture." The privacy-by-policy approach focuses on the implementation of the notice and choice principles of fair information practices, while the privacy-by-architecture approach minimizes the collection of identifiable personal data and emphasizes anonymization and client-side data storage and processing. We discuss both approaches with a view to their technical overlaps and boundaries as well as to economic feasibility. This paper aims to introduce engineers and computer scientists to the privacy research domain and provide concrete guidance on how to design privacy-friendly systems.
引用
收藏
页码:67 / 82
页数:16
相关论文
共 116 条
[1]  
Ackerman M.S., 1999, Proceedings of the 1st ACM Conference on Electronic Commerce EC, P1, DOI [10.1145/336992.336995, DOI 10.1145/336992.336995]
[2]   Privacy and rationality in individual decision making [J].
Acquisti, A ;
Grossklags, J .
IEEE SECURITY & PRIVACY, 2005, 3 (01) :26-33
[3]  
Acquisti A., 2004, P 5 ACM C ELECT COMM, DOI [10.1145/988772.988777, DOI 10.1145/988772.988777]
[4]  
ACQUISTI A, 2006, P 3 INT C INT SYST
[5]  
Adams A, 2001, BCS CONF SERIES, P49
[6]  
ADAMS A, 1999, P 7 ACM INT MULT C
[7]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[8]  
Altman I., 1975, ENV SOCIAL BEHAV PRI
[9]  
[Anonymous], 2000, ECONOMIST
[10]  
[Anonymous], 2004, Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services