4.6 Review

Translating Privacy Design Principles Into Human-Centered Software Lifecycle: A Literature Review

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

The impact of general data protection regulation on software engineering practices

Luis Leite et al.

Summary: This paper explores the impact of GDPR on software engineering practices, with a focus on identifying the most significant changes and good practices. The study involves four case studies of Portuguese software engineering companies, revealing changes at all stages of software development. The findings emphasize the need to train software developers for GDPR compliance, while also acknowledging limitations in the study's focus on traditional development methodologies.

INFORMATION AND COMPUTER SECURITY (2022)

Article Computer Science, Information Systems

Towards privacy compliance: A design science study in a small organization

Ze Shi Li et al.

Summary: This paper aims to fill a gap in the under-researched area of continuous compliance with privacy requirements in practice, by investigating how a continuous practicing SME dealt with GDPR compliance. The study identified 3 main challenges faced by the collaborating organization in complying with GDPR, and developed two design science artifacts to address these challenges. The artifacts were validated through close collaboration with the partner organization and applying them to the partner organization's system, indicating potential for leveraging continuous compliance with GDPR through CSE.

INFORMATION AND SOFTWARE TECHNOLOGY (2022)

Article Computer Science, Information Systems

A survey on solutions to support developers in privacy-preserving IoT development

Patrick Kuehtreiber et al.

Summary: Internet-of-Things (IoT) devices are becoming more popular, but privacy-preserving design is a challenge for engineers. Existing solutions are cumbersome to use and have limitations, indicating the need for further research and improvement.

PERVASIVE AND MOBILE COMPUTING (2022)

Proceedings Paper Automation & Control Systems

Towards privacy-aware software design in small and medium enterprises

Lelio Campanile et al.

Summary: The legal definition of privacy regulations has significantly impacted the design and maintenance of software, systems, and organizations. Efforts should be made to systematically adapt software development cycles to privacy regulations to lower operational privacy enforcement costs.

2022 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH) (2022)

Proceedings Paper Computer Science, Information Systems

Human-GDPR Interaction: Practical Experiences of Accessing Personal Data

Alex Bowyer et al.

Summary: This study found that the EU's GDPR falls short of its goals due to non-compliance and low-quality responses from companies. Participants were unable to understand providers' data practices or harness their own data, leading to increased distrust.

PROCEEDINGS OF THE 2022 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI' 22) (2022)

Proceedings Paper Computer Science, Information Systems

From GDPR to Privacy Design Patterns: The MATERIALIST Framework

Vita Barletta et al.

Summary: Privacy is becoming increasingly important in software production, not just to improve software quality, but also due to mandatory regulations like GDPR. However, lack of knowledge and ambiguous regulations hinder the adoption of proper privacy mechanisms during the software lifecycle. To address this issue, this paper presents the MATERIALIST framework, which guides developers in choosing privacy design patterns based on GDPR requirements.

SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (2022)

Article Computer Science, Information Systems

DICON: A Domain-Independent Consent Management for Personal Data Protection

Emre Olca et al.

Summary: The development of technology has accelerated the digitization of information systems, making data accessible anytime and anywhere. However, privacy concerns and threats to data privacy have arisen. To address these issues, a Semantic Web-based personal consent management model is proposed to protect personal data privacy.

IEEE ACCESS (2022)

Article Computer Science, Cybernetics

User-Centered Privacy-by-Design: Evaluating the Appropriateness of Design Prototypes

Oshrat Ayalon et al.

Summary: The study found that framing computing systems' features using data flows resulted in less critical evaluations. Students with professional engineering experience were less critical in assessing the features' appropriateness compared to those with no work experience.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2021)

Article Computer Science, Information Systems

Cookie Banners and Privacy Policies: Measuring the Impact of the GDPR on the Web

Michael Kretschmer et al.

Summary: The General Data Protection Regulation (GDPR) has been in effect since May 2018, sparking discussions on its impact on online privacy. Despite an increased emphasis on privacy in online services, there is still room for improvement, and while online services often provide means for users to opt out of data processing, they frequently hinder convenient access through complex interface designs.

ACM TRANSACTIONS ON THE WEB (2021)

Article Computer Science, Information Systems

Guidelines for GDPR compliance in Big Data systems

Mouna Rhahla et al.

Summary: The implementation of GDPR in Big Data systems poses a challenge due to the complexity of data evolution, leading to the need for specific tools and frameworks to ensure compliance.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2021)

Proceedings Paper Computer Science, Information Systems

A Model-based Approach to Realize Privacy and Data Protection by Design

Gabriel Pedroza et al.

Summary: Telecommunications and data are omnipresent in our daily lives, leading to increasing concerns about privacy and data protection. The introduction of the new General Data Protection Regulation (GDPR) by the European Commission in 2018 has granted data subjects new rights, highlighting the growing need for approaches to integrate GDPR and privacy provisions during the design phase.

2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2021) (2021)

Article Computer Science, Information Systems

Privacy by Evidence: A Methodology to develop privacy-friendly software applications

Pedro Barbosa et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Software Engineering

Integrating security and privacy in software development

Maria Teresa Baldassarre et al.

SOFTWARE QUALITY JOURNAL (2020)

Proceedings Paper Computer Science, Cybernetics

Dark Patterns after the GDPR: Scraping Consent Pop-ups and Demonstrating their Influence

Midas Nouwens et al.

PROCEEDINGS OF THE 2020 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'20) (2020)

Article Computer Science, Hardware & Architecture

A formal approach to build privacy-awareness into clinical workflows

Saliha Irem Besik et al.

SICS SOFTWARE-INTENSIVE CYBER-PHYSICAL SYSTEMS (2020)

Article Business

The impact of transparency on mobile privacy decision making

Jan Hendrik Betzing et al.

ELECTRONIC MARKETS (2020)

Article Computer Science, Information Systems

Engineering Privacy in Smartphone Apps: A Technical Guideline Catalog for App Developers

Majid Hatamian

IEEE ACCESS (2020)

Review Computer Science, Information Systems

A mapping of IoT user-centric privacy preserving approaches to the GDPR

Alexia Dini Kounoudes et al.

INTERNET OF THINGS (2020)

Article Computer Science, Information Systems

Smart City IoT Platform Respecting GDPR Privacy and Security Aspects

Claudio Badii et al.

IEEE ACCESS (2020)

Article Multidisciplinary Sciences

A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective

Hezam Akram Abdulghani et al.

SYMMETRY-BASEL (2019)

Article Computer Science, Information Systems

The Security Implications of Data Subject Rights

Jatinder Singh et al.

IEEE SECURITY & PRIVACY (2019)

Review Computer Science, Information Systems

Privacy in Internet of Things: From Principles to Technologies

Chao Li et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Chemistry, Analytical

Privacy Engineering for Domestic IoT: Enabling Due Diligence

Tom Lodge et al.

SENSORS (2019)

Article Computer Science, Cybernetics

It Is About What They Could Do with the Data: A User Perspective on Privacy in Smart Metering

Timo Jakobi et al.

ACM TRANSACTIONS ON COMPUTER-HUMAN INTERACTION (2019)

Article Computer Science, Cybernetics

Adaptive Architecture and Personal Data

Holger Schnadelbach et al.

ACM TRANSACTIONS ON COMPUTER-HUMAN INTERACTION (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

A Novel Privacy Framework for Secure M-health Applications: The Case of the GDPR

Uzma Mustafa et al.

PROCEEDINGS OF 2019 IEEE 12TH INTERNATIONAL CONFERENCE ON GLOBAL SECURITY, SAFETY AND SUSTAINABILITY (ICGS3-2019) (2019)

Proceedings Paper Computer Science, Information Systems

User-Centered and Privacy-Driven Process Mining System Design for IoT

Judith Michael et al.

INFORMATION SYSTEMS ENGINEERING IN RESPONSIBLE INFORMATION SYSTEMS, CAISE FORUM 2019 (2019)

Proceedings Paper Computer Science, Information Systems

Achieving GDPR Compliance of BPMN Process Models

Simone Agostinelli et al.

INFORMATION SYSTEMS ENGINEERING IN RESPONSIBLE INFORMATION SYSTEMS, CAISE FORUM 2019 (2019)

Article Computer Science, Information Systems

Practical evaluation of a reference architecture for the management of privacy level agreements

Vasiliki Diamantopoulou et al.

INFORMATION AND COMPUTER SECURITY (2019)

Article Computer Science, Information Systems

Reusable Elements for the Systematic Design of Privacy-Friendly information Systems: A Mapping Study

Julio C. Caiza et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Information Systems

Accomplishing Transparency within the General Data Protection Regulation

Dayana Spagnuelo et al.

PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP) (2019)

Proceedings Paper Computer Science, Information Systems

A Generic Information and Consent Framework for the IoT

Mathieu Cunche et al.

2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019) (2019)

Proceedings Paper Computer Science, Information Systems

Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments

Riad Ladjel et al.

2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019) (2019)

Proceedings Paper Computer Science, Software Engineering

Data Protection by Design for cybersecurity systems in a Smart Home environment

Olga Gkotsopoulou et al.

PROCEEDINGS OF THE 2019 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2019) (2019)

Proceedings Paper Computer Science, Software Engineering

An Architectural View for Data Protection by Design

Laurens Sion et al.

2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE (ICSA) (2019)

Proceedings Paper Computer Science, Information Systems

Analysis of Privacy Policies to Enhance Informed Consent

Raul Pardo et al.

DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIII (2019)

Proceedings Paper Computer Science, Information Systems

Privacy Patterns for Pseudonymity

Alexander Gabel et al.

PRIVACY AND IDENTITY MANAGEMENT: FAIRNESS, ACCOUNTABILITY, AND TRANSPARENCY IN THE AGE OF BIG DATA (2019)

Proceedings Paper Computer Science, Information Systems

Using Models to Enable Compliance Checking against the GDPR: An Experience Report

Damiano Torre et al.

2019 ACM/IEEE 22ND INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS (MODELS 2019) (2019)

Proceedings Paper Computer Science, Information Systems

The General Data Protection Regulation: Requirements, Architectures, and Constraints

Kalle Hjerppe et al.

2019 27TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2019) (2019)

Proceedings Paper Computer Science, Software Engineering

Continuous Requirements: An Example Using GDPR

Ze Shi Li et al.

2019 IEEE 27TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW 2019) (2019)

Proceedings Paper Computer Science, Software Engineering

CrowdRE, User Feedback and GDPR Towards Tracking GDPR Implications with Adequate Technical and Organizational Measures in an Effort-Minimal Way

Eduard C. Groen et al.

2019 IEEE 27TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW 2019) (2019)

Proceedings Paper Computer Science, Information Systems

(Un)informed Consent: Studying GDPR Consent Notices in the Field

Christine Utz et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Proceedings Paper Computer Science, Cybernetics

A/P(rivacy) Testing: Assessing Applications for Social and Institutional Privacy

Oshrat Ayalon et al.

CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (2019)

Review Computer Science, Information Systems

Privacy-Preserving Solutions for Blockchain: Review and Challenges

Jorge Bernal Bernabe et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Information Systems

GDPR impacts and opportunities for computer-aided diagnosis Guidelines and legal perspectives

Micael Pedrosa et al.

2019 IEEE 32ND INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS (CBMS) (2019)

Proceedings Paper Computer Science, Theory & Methods

CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle

Thomas Loruenser et al.

13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018) (2019)

Proceedings Paper Computer Science, Cybernetics

Bringing Design to the Privacy Table Broadening Design in Privacy by Design Through the Lens of HCI

Richmond Y. Wong et al.

CHI 2019: PROCEEDINGS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

Recommender-based Privacy Requirements Elicitation - EPICUREAN An Approach to Simplify Privacy Settings in IoT Applications with Respect to the GDPR

Christoph Stach et al.

SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

Privacy-Enhanced System Design Modeling Based on Privacy Features

Amir Shayan Ahmadian et al.

SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING (2019)

Article Computer Science, Information Systems

Realising the right to data portability for the domestic Internet of things

Lachlan Urquhart et al.

PERSONAL AND UBIQUITOUS COMPUTING (2018)

Article Computer Science, Information Systems

Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice

Achilleas Papageorgiou et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Integrating Technical and Legal Concepts of Privacy

Ana Sokolovska et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Complying with Privacy Legislation: From Legal Text to Implementation of Privacy-Aware Location-Based Services

Mehrnaz Ataei et al.

ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION (2018)

Proceedings Paper Computer Science, Theory & Methods

HCI Patterns for Cryptographically Equipped Cloud Services

Thomas Langer et al.

HUMAN-COMPUTER INTERACTION: THEORIES, METHODS, AND HUMAN ISSUES, HCI INTERNATIONAL 2018, PT I (2018)

Proceedings Paper Business

Personal Data Management: An Abstract Personal Data Lifecycle Model

Majed Alshammari et al.

BUSINESS PROCESS MANAGEMENT WORKSHOPS (BPM 2017) (2018)

Proceedings Paper Computer Science, Theory & Methods

Rethinking the Proposition of Privacy Engineering

Aaron Ceross et al.

NSPW '18: PROCEEDINGS OF THE NEW SECURITY PARADIGMS WORKSHOP (2018)

Proceedings Paper Computer Science, Theory & Methods

A System of Privacy Patterns for Informing Users: Creating a Pattern System

Michael Colesky et al.

EUROPLOP 2018: PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON PATTERN LANGUAGES OF PROGRAMS (2018)

Proceedings Paper Computer Science, Information Systems

Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things

Stevan Coroller et al.

PROCEEDINGS OF THE 2018 WORKSHOP ON MIDDLEWARE AND APPLICATIONS FOR THE INTERNET OF THINGS (M4IOT '18) (2018)

Proceedings Paper Computer Science, Information Systems

Presence Patterns and Privacy Analysis

Ella Roubtsova et al.

BUSINESS MODELING AND SOFTWARE DESIGN, BMSD 2018 (2018)

Proceedings Paper Engineering, Electrical & Electronic

Privacy Challenges for Process Mining in Human-centered Industrial Environments

Felix Mannhardt et al.

2018 14TH INTERNATIONAL CONFERENCE ON INTELLIGENT ENVIRONMENTS (IE 2018) (2018)

Proceedings Paper Computer Science, Interdisciplinary Applications

Optimal Evidence Collection for Accountability in the Cloud

Fatma Masmoudi et al.

2018 IEEE 15TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE 2018) (2018)

Proceedings Paper Engineering, Electrical & Electronic

Extending ISO/IEC 29110 Basic Profile with Privacy-by-Design Approach: a Case Study in the Health Care Sector

Miguel Ehecatl Morales-Trujillo et al.

2018 11TH INTERNATIONAL CONFERENCE ON THE QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY (QUATIC) (2018)

Proceedings Paper Computer Science, Theory & Methods

Privacy Architectural Strategies: An Approach for Achieving Various Levels of Privacy Protection

Majed Alshammari et al.

PROCEEDINGS OF THE 2018 WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY (WPES'18) (2018)

Proceedings Paper Computer Science, Information Systems

Security-Driven Information Flow Modelling for Component Integration in Complex Environments

Veronika Kupfersberger et al.

PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION TECHNOLOGY (IAIT2018) (2018)

Proceedings Paper Computer Science, Theory & Methods

Solution-aware Data Flow Diagrams for Security Threat Modeling

Laurens Sion et al.

33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (2018)

Proceedings Paper Computer Science, Theory & Methods

Helping John to Make Informed Decisions on Using Social Login

Farzaneh Karegar et al.

33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (2018)

Proceedings Paper Computer Science, Theory & Methods

Extending Model-Based Privacy Analysis for the Industrial Data Space by Exploiting Privacy Level Agreements

Amir Shayan Ahmadian et al.

33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (2018)

Proceedings Paper Computer Science, Theory & Methods

Supporting Privacy Impact Assessment by Model-Based Privacy Analysis

Amir Shayan Ahmadian et al.

33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (2018)

Article Computer Science, Software Engineering

Privacy by designers: software developers' privacy mindset

Irit Hadar et al.

EMPIRICAL SOFTWARE ENGINEERING (2018)

Proceedings Paper Computer Science, Theory & Methods

Towards a Principled Approach for Engineering Privacy by Design

Majed Alshammari et al.

PRIVACY TECHNOLOGIES AND POLICY, APF 2017 (2017)

Proceedings Paper Computer Science, Information Systems

Towards Systematic Privacy and Operability (PRIOP) Studies

Rene Meis et al.

ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017 (2017)

Proceedings Paper Computer Science, Information Systems

A Literature Study on Privacy Patterns Research

Jorg Lenhard et al.

2017 43RD EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA) (2017)

Proceedings Paper Computer Science, Information Systems

Privacy by Design: Informed Consent and Internet of Things for Smart Health

Yvonne O'Connor et al.

8TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2017) / 7TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2017) / AFFILIATED WORKSHOPS (2017)

Proceedings Paper Computer Science, Information Systems

Orchestrating Privacy Enhancing Technologies and Services with BPM Tools The WITDOM Data Protection Orchestrator

Nicolas Notario et al.

PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017) (2017)

Article Computer Science, Hardware & Architecture

Privacy as a Service: Protecting the Individual in Healthcare Data Processing

Xiang Su et al.

COMPUTER (2016)

Proceedings Paper Engineering, Electrical & Electronic

Informed Consent in Internet of Things: the Case Study of Cooperative Intelligent Transport Systems

Ricardo Neisse et al.

2016 23RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT) (2016)

Proceedings Paper Engineering, Electrical & Electronic

Protection Goals for Privacy Engineering

Marit Hansen et al.

2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW) (2015)

Proceedings Paper Engineering, Electrical & Electronic

A Guide to End-to-End Privacy Accountability

Denis Butin et al.

2015 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON TECHNICAL AND LEGAL ASPECTS OF DATA PRIVACY AND SECURITY TELERISE 2015 (2015)

Article Computer Science, Hardware & Architecture

Universal usability

B Shneiderman

COMMUNICATIONS OF THE ACM (2000)