Explore chapters and articles related to this topic
Smart cities under attack
Published in Abbas Moallem, Human-Computer Interaction and Cybersecurity Handbook, 2018
Ralf C. Staudemeyer, Artemios G. Voyiatzis, George Moldovan, Santiago Reinhard Suppan, Athanasios Lioumpas, Daniel Calvo
The responsible person should be well trained in the technical aspects of designing and implementing privacy friendly systems. We call this person the “privacy expert” of the team. The privacy expert should know a privacy engineering framework such as PRIPARE (Preparing Industry to Privacy-by-design by supporting its Application in Research) [90]. The most critical condition for achieving a privacy-friendly product is the presence of at least one, but preferably several, security and privacy experts in the team.
Developing and Validating a Model for Assessing Autonomous Vehicles Acceptance
Published in International Journal of Human–Computer Interaction, 2023
Secondly, information quality is also an important factor affecting AVs acceptance. Therefore, to improve the AVs acceptance, we recommend that AVs manufacturers should focus on quality and interaction mode of information exchange in the design and development of AVs. We believe that making AVs easier to use without cognitive load could improve AVs acceptance and adoption. Meanwhile, it is also important to focus on information security and privacy. Trust in data protection by law, technology, and the recipients of data mitigates privacy concerns and increases acceptance (Schomakers et al., 2022). The government should work closely with academia and manufacturers to develop information security privacy-related rules and ensure that manufacturers strictly comply with them. AVs manufacturers need to focus on risk-oriented security and privacy engineering design principles during research and development process, assume data protection obligations, and strengthen security risk warning and monitoring capabilities.
Translating Privacy Design Principles Into Human-Centered Software Lifecycle: A Literature Review
Published in International Journal of Human–Computer Interaction, 2023
Marco Saltarella, Giuseppe Desolda, Rosa Lanzilotti, Vita Santa Barletta
However, while these by-design and by-default paradigms propose high-level principles to reconsider the system design process, it is also important to understand how these paradigms can be practically implemented in everyday practices, which could be not that straightforward. One way discussed in research to implement privacy measures are reusable components, including techniques, tools, and methodologies. For example, in (Caiza et al., 2019), the authors provide a mapping study to provide reusable components for designing privacy-aware systems. However, the authors highlight that despite this research field getting more and more interest over time, most of the contributions analyzed still lack empirical evidence and remain just solution proposals and, thus, are not mature enough to be adopted in practical scenarios. This view is further corroborated in (Lenhard et al., 2017) in which the authors, after analysing literature contributions in privacy engineering, state that although patterns could help support GDPR compliance, research still provides few practical guidelines for practitioners. Thus, there is still work to be done to strengthen the available privacy patterns by empirical evaluation.
Responsible innovation at work: gamification, public engagement, and privacy by design
Published in Journal of Responsible Innovation, 2022
Daniele Ruggiu, Vincent Blok, Christopher Coenen, Christos Kalloniatis, Angeliki Kitsiou, Aikaterini-Georgia Mavroeidi, Simone Milani, Andrea Sitzia
Many differences characterise these laws, for instance there is little correspondence between the United States’ and the EU’s fundamental rights of data protection. In the USA there are no constitutional/legal requirements for data processors on how to use personal data (Schwartz and Peifer 2017). They are nowadays expected to manage the collection, storage and usage of personal information effectively (Dinev et al. 2013). In this respect, privacy engineering in such systems is immense not only in Europe but recently also across the Atlantic. This is a significant part of the system development process, where privacy developers should define principles in the form of technical requirements that need to be satisfied in order for the system to ensure a minimum level of privacy and be trustworthy for users (Martin & Kung, 2018).