Engineering Privacy

被引:235
作者
Spiekermann, Sarah [1 ]
Cranor, Lorrie Faith [2 ]
机构
[1] Humboldt Univ, Inst Informat Syst, D-10178 Berlin, Germany
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
关键词
Privacy; security; privacy-enhancing technologies; anonymity; identification;
D O I
10.1109/TSE.2008.88
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline's topics. First, we discuss privacy requirements grounded in both historic and contemporary perspectives on privacy. We use a three-layer model of user privacy concerns to relate them to system operations (data transfer, storage, and processing) and examine their effects on user behavior. In the second part of this paper, we develop guidelines for building privacy-friendly systems. We distinguish two approaches: "privacy-by-policy" and "privacy-by-architecture." The privacy-by-policy approach focuses on the implementation of the notice and choice principles of fair information practices, while the privacy-by-architecture approach minimizes the collection of identifiable personal data and emphasizes anonymization and client-side data storage and processing. We discuss both approaches with a view to their technical overlaps and boundaries as well as to economic feasibility. This paper aims to introduce engineers and computer scientists to the privacy research domain and provide concrete guidance on how to design privacy-friendly systems.
引用
收藏
页码:67 / 82
页数:16
相关论文
共 116 条
[41]  
*EUR PARL, 2006, 20050182 COD EUR PAR
[42]  
Feigenbaum J., 2002, Security and Privacy in Digital Rights Management. ACM CCS-8 Workshop DRM 2001. Revised Papers (Lecture Notes in Computer Science Vol.2320), P76
[43]  
FRIEDMAN B, 2006, P 8 INT C UB COMP
[44]  
GARFINKEL S, 2003, IEEE SECURITY PR JAN
[45]  
Garfinkel Simon, 2000, Database nation: the death of privacy in the 21st century
[46]  
Ghosh A.K., 2001, SECURITY PRIVACY E B
[47]  
GIDEON J, 2006, P 2 S US PRIV SEC, V149, P133
[48]   Implementation intentions and goal achievement: A meta-analysis of effects and processes [J].
Gollwitzer, Peter M. ;
Sheeran, Paschal .
ADVANCES IN EXPERIMENTAL SOCIAL PSYCHOLOGY, VOL 38, 2006, 38 :69-119
[49]   Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis [J].
Gruteser, M ;
Grunwald, D .
MOBILE NETWORKS & APPLICATIONS, 2005, 10 (03) :315-325
[50]  
GUMBRECHT M, 2004, P WORKSH WEBL EC AGG