A Multidisciplinary Definition of Privacy Labels: The Story of Princess Privacy and the Seven Helpers (original) (raw)
Related papers
Privacy Labelling and the Story of Princess Privacy and the Seven Helpers
ArXiv, 2020
Privacy is currently in 'distress' and in need of 'rescue', much like princesses in the all-familiar fairytales. We employ storytelling and metaphors from fairytales to argue how a new and all-encompassing concept of Privacy Labelling (the 'knight in shining armour') can come to the rescue of Privacy (the 'princess in distress'). We paint a detailed portrait of Privacy Labelling (PL) that emerges from discussions carried out from seven different perspectives (the 'seven helpers'): Business, Legal, Regulatory, Usability and Human Factors, Educative, Technological, and Multidisciplinary. We describe a common vision, proposing several important 'traits of character' of PL as well as identifying 'places of improvement', i.e., open problems on which the community can focus their efforts. More specifically, this position paper identifies the stakeholders of the PL and their needs with regard to privacy, describing how the PL should b...
Privacy in the Information Age: Stakeholders, Interests and Values
Journal of Business Ethics, 1999
Privacy is a relational and relative concept that has been defined in a variety of ways. In this paper we offer a systematic discussion of potentially different notions of privacy. We conclude that privacy as the freedom or immunity from the judgement of others is an extremely useful concept to develop ways in which to understand privacy claims and associated
Privacy in the Information Age: Stakeholders
1999
Privacy is a relational and relative concept that has been defined in a variety of ways. In this paper we offer a systematic discussion of potentially different notions of privacy. We conclude that privacy as the freedom or immunity from the judgement of others is an extremely useful concept to develop ways in which to understand privacy claims and associated risks. To this end, we develop a framework of principles that explores the interrela- tions of interests and values for various stakeholders where privacy concerns have risen or are expected to rise. We argue that conflicts between the interests and values of different stakeholders may result in legitimate claims of privacy/transparency being ignored or underrepresented. Central to this analysis is the notion of a stakeholder. We argue that stake- holders are persons or groups with legitimate inter- ests, of intrinsic value, in the procedural and/or substantive aspects of the privacy/transparency claim and subsequent judgements...
ENCORE: Towards a holistic approach to privacy
2010
We make the case for an integrated approach to privacy management within organisations. Current approaches to privacy management are either too high-level, enforcing privacy of personal data using legal compliance, risk and impact assessments, or too low-level, focusing only on the technical implementation of access controls to personal data held by an enterprise. High-level approaches tend to address privacy as an afterthought in ordinary business practice, and involve ad hoc enforcement practices; low-level approaches often leave out important legal and business considerations. As part of the EnCoRe project we are developing a methodology which tries to bridge the gap between privacy risk and impact assessment with the technical management of privacy policies. We are working to define a conceptual model as a means of expressing policy requirements as well as users' privacy preferences and as a way to bridge the gap described above. We aim to show the value of this approach in collaborative case studies (including corporate personnel management, biobanks and assisted living) in the context of the EnCoRe project.
Privacy: What are we actually talking about? A multidisciplinary approach
This paper presents a multidisciplinary approach to privacy. The sub- ject is examined from an ethical, social, and economic perspective reflecting the preliminary findings of the EU-funded research project PRESCIENT. The analy- sis will give a comprehensive illustration of the dimensions’ unique and charac- teristic features. This will build the basis for identifying overlaps and developing synergetic effects, which should ideally contribute to a better understanding of privacy.
The Evolving Path of “the Right to Be Left Alone” - When Privacy Meets Technology
2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)
This paper deals with the hot, evergreen topic of the relationship between privacy and technology. We give extensive motivation for why the privacy debate is still alive for private citizens and institutions, and we investigate the privacy concept. This paper proposes our vision of the privacy ecosystem, introducing privacy dimensions, the related users' expectations, the privacy violations, and the changing factors. We provide a critical assessment of the Privacy by Design paradigm, strategies, tactics, patterns, and Privacy-Enhancing Technologies, highlighting the current open issues. We believe that promising approaches to tackle the privacy challenges move in two directions: (i) identification of effective privacy metrics; and (ii) adoption of formal tools to design privacy-compliant applications.
Redesigning or Redefining Privacy
Snowden's revelations of 2013 have shifted attention to societal implications of surveillance practices and in particular privacy. This editorial reflects on key concepts and research questions raised in the issue. How can privacy be defined? Can it be designed? Considering such developments, this editorial asks if the public's attitudes to the sharing of data have moved towards, 'nothing to hide, nothing to fear' arguments and if greater awareness and corporate transparency are possible. Even if corporate surveillance does not operate through overt coercion, it is argued that it yet results in self-regulation and subjugation to neoliberal rationality. Since telecoms and social media companies generally work hand in hand with the state and legal and practical standpoints boundaries overlap on a great scale, how can privacy be safeguarded for citizens? And where 'accountability' of data holders, as interviewee Mark Andrejevic suggests, is a growing imperative. Contributions to this issue suggest detailed attention to legal frameworks, encryption practices, definitions of the surveilled subject and the history of such scrutiny may hold some of the answers.