Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2855321.2855374acmotherconferencesArticle/Chapter ViewAbstractPublication PageseuroplopConference Proceedingsconference-collections
research-article

Privacy transparency patterns

Published: 08 July 2015 Publication History

Abstract

This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid software developers with the realization of privacy by design. Privacy design patterns are design solutions to recurring privacy problems; as such they can facilitate the development of privacy-by-design solutions. Privacy design patterns as such exist, but a complete, uniform and readily applicable overview does not exist. This paper presents such an overview for privacy transparency patterns: they focus on solutions on how to create privacy transparency. Two privacy transparency patterns are fully described: the Personal Data Table pattern and the Privacy Policy Icons pattern.

References

[1]
ACT. Privacy Dashboard, ACT -- The App Association, http://actonline.org/projects/privacy-dashboard/
[2]
AFM. Financiële Bijsluiter -- De risicometer, http://www.afm.nl/nl/consumenten/aanpak/fb/risicometer.aspx.
[3]
Bier, C., & Krempel, E. 2012. Common privacy patterns in video surveillance and smart energy. In Computing and Convergence Technology (ICCCT), 2012 7th International Conference on, 610--615, IEEE.
[4]
Bodea, G., 2010. Privacy pictograms: a graphic rendition of online privacy policies, paper presented at Safer Internet Forum 2010, Luxembourg.
[5]
Chung, E. S., Hong, J. I., Lin, J., Prabaker, M. K., Landay, J. A., & Liu, A. L. 2004. Development and evaluation of emerging design patterns for ubiquitous computing. In Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques, 233--242, ACM.
[6]
Couvakian, A., 2011. Privacy by Design in Law, Policy and Practice - A White Paper for Regulators, Decision-makers and Policy-makers, Report, August 2011.
[7]
Creative Commons. http://creativecommons.org/
[8]
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J. H., Metayer, D. L., Tirtea, R., & Schiffner, S., 2014. Privacy and Data Protection by Design -- From Policy to Engineering. ENISA Report, December 2014.
[9]
Doty, N. Gupta, M., and Zych, J. 2012. privacypatterns.org, available at http://www.privacypatterns.org.
[10]
European Commission, 2012. Proposal for a Regulation of the European Parliament and of the Council. On the protection of individuals with regard to the processing of personal data and on the free movement of such data, Brussels.
[11]
Graf, C., Wolkerstorfer, P., Geven, A., & Tscheligi, M. 2010. A pattern collection for privacy enhancing technology. In The 2nd Int. Conf. on Pervasive Patterns and Applications (PATTERNS 2010), 21--26.
[12]
Guarda, P., & Zannone, N., 2009. Towards the development of privacy-aware systems. Information and Software Technology, 51(2), 337--350.
[13]
Hedbom, H., 2009. "A Survey on transparency tools for enhancing Privacy", The Future of Identity in the Information Society, IFIP AICT, vol. 298, Springer, Heidelberg, 67--82.
[14]
IPC Information and Privacy Commissioner/Ontario. 7 Foundational Principles, available at https://www.privacybydesign.ca/index.php/about-pbd/7-foundational-principles/.
[15]
Janic, M., Wijbenga J. P., and Veugen, T., 2013. "Transparency enhancing tools (TETs): an overview", STAST2013, New Orleans.
[16]
Kini, A. and Choobineh, J., 2000. "An Empirical evaluation of the factors affecting trust in web banking systems", Americas Conference on Information System, 185--19.
[17]
Laakso, S. A. 2003, User Interface Design Patterns -- Overview beside Detail, available at http://www.cs.helsinki.fi/u/salaakso/patterns/Overview-beside-Detail.html
[18]
NICAM. Kijkwijzer, Dutch Institute for the Classification of Audio-visual Media NICAM, http://www.kijkwijzer.nl/
[19]
NRC. Nutrition Researcher Cohort, http://nrc.dbnp.org/.
[20]
Pieters, W., 2011. "Explanation and trust: what to tell the user in security and AI", Ethics and Information Technology, Vol. 13(1), pp. 53--64, 2011.
[21]
PrimeLife Project, 2010. Report D4.1.3 -- HCI Pattern Collection -- Version 2, available at http://www.primelife.eu.
[22]
Razkin, A. 2010. Mozilla Privacy Icons, Images courtesy of Aza Raskin via http://www.fastcodesign.com/1662961/mozillas-privacy-icons-tell-you-how-sites-use-your-personal-data.
[23]
SWELL Project, 2014. Report D4.9 Privacy transparency, COMMIT/ SWELL, available at http://www.swell-project.net/.

Cited By

View all
  • (2024)Beyond digital privacy: Uncovering deeper attitudes toward privacy in cameras among older adultsInternational Journal of Human-Computer Studies10.1016/j.ijhcs.2024.103345192(103345)Online publication date: Dec-2024
  • (2023)A Narrative Review of Factors Affecting the Implementation of Privacy and Security Practices in Software DevelopmentACM Computing Surveys10.1145/358995155:14s(1-27)Online publication date: 4-Apr-2023
  • (2023)Data Cart: A Privacy Pattern for Personal Data Management in OrganizationsHuman Factors in Privacy Research10.1007/978-3-031-28643-8_18(353-378)Online publication date: 10-Mar-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
EuroPLoP '15: Proceedings of the 20th European Conference on Pattern Languages of Programs
July 2015
714 pages
ISBN:9781450338479
DOI:10.1145/2855321
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 July 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. personal data table
  2. privacy
  3. privacy by design
  4. privacy policy icons
  5. privacy transparency patterns
  6. transparency

Qualifiers

  • Research-article

Conference

EuroPLoP 2015

Acceptance Rates

Overall Acceptance Rate 216 of 354 submissions, 61%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)72
  • Downloads (Last 6 weeks)9
Reflects downloads up to 26 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Beyond digital privacy: Uncovering deeper attitudes toward privacy in cameras among older adultsInternational Journal of Human-Computer Studies10.1016/j.ijhcs.2024.103345192(103345)Online publication date: Dec-2024
  • (2023)A Narrative Review of Factors Affecting the Implementation of Privacy and Security Practices in Software DevelopmentACM Computing Surveys10.1145/358995155:14s(1-27)Online publication date: 4-Apr-2023
  • (2023)Data Cart: A Privacy Pattern for Personal Data Management in OrganizationsHuman Factors in Privacy Research10.1007/978-3-031-28643-8_18(353-378)Online publication date: 10-Mar-2023
  • (2022)A Catalog of Security PatternsProceedings of the 29th Conference on Pattern Languages of Programs10.5555/3631672.3631674(1-14)Online publication date: 24-Oct-2022
  • (2022)Privacy by Design and Software EngineeringProceedings of the XXI Brazilian Symposium on Software Quality10.1145/3571473.3571480(1-10)Online publication date: 7-Nov-2022
  • (2022)The Influence of Transparency and Control on the Willingness of Data Sharing in Adaptive Mobile AppsProceedings of the ACM on Human-Computer Interaction10.1145/35467246:MHCI(1-26)Online publication date: 20-Sep-2022
  • (2022)How to Support Users in Understanding Intelligent Systems? An Analysis and Conceptual Framework of User Questions Considering User Mindsets, Involvement, and Knowledge OutcomesACM Transactions on Interactive Intelligent Systems10.1145/351926412:4(1-27)Online publication date: 5-Nov-2022
  • (2022)Informing Users: Effects of Notification Properties and User Characteristics on Sharing AttitudesInternational Journal of Human–Computer Interaction10.1080/10447318.2022.208659239:14(2796-2824)Online publication date: 27-Jun-2022
  • (2021)How to Support Users in Understanding Intelligent Systems? Structuring the DiscussionProceedings of the 26th International Conference on Intelligent User Interfaces10.1145/3397481.3450694(120-132)Online publication date: 14-Apr-2021
  • (2021)From Design Requirements to Effective Privacy Notifications: Empowering Users of Online Services to Make Informed DecisionsInternational Journal of Human–Computer Interaction10.1080/10447318.2021.191385937:19(1823-1848)Online publication date: 11-Jun-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media