Skip to main content

Teaching Privacy by Design to Non-technical Audiences

  • Conference paper
  • First Online:
Cyber Security and Privacy (CSP 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 470))

Included in the following conference series:

Abstract

As research in cyber security and privacy advances, privacy initiatives should be disseminated to the broader public. Education of this public is a key tool in conveying the seminal importance of security and privacy in our use of digital technology. This article presents a curriculum that, by targeting the non-engineering public, provides an opportunity for rapid acceptance of the innovative security and privacy research in which we are currently engaged.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Note that the Office of the Information and Privacy Commissioner offers PbD educational material organized in two sets of slides aimed at introducing the concept to a large audience including “chief privacy officers, engineering instructors, social scientists, and privacy leaders”. See http://www.privacybydesign.ca/index.php/publications/curriculum/.

  2. 2.

    The Chinese government last published the number of annual mass incidents in 2005. Anecdotal speculation brings the number to as high as 180,000 riots per year - see Freeman, Will (2010) The Accuracy of China’s mass incidents. Financial Times, March 2.

References

  1. Cavoukian, A., Dixon, M.: Privacy and Security by Design: An Enterprise Architecture Approach (2013). http://www.privacybydesign.ca/index.php/paper/privacy-security-design-enterprise-architecture-approach/. Accessed 10 May 2014

  2. Cavoukian, A.: Foundational Principles (Privacy by design) (1997). http://www.privacybydesign.ca/index.php/about-pbd/7-foundational-principles/. Accessed 22 May 2014

  3. Rubinstein, I., Good, N.: Privacy by design: A counterfactual analysis of Google and Facebook privacy incidents. Berkeley Technol. Law J. 4 (2011)

    Google Scholar 

  4. Gürses, S., Troncoso, C., Diaz, C.: Engineering privacy by design. In: International Conference on Privacy and Data Protection (CPDP), Belgium (2011)

    Google Scholar 

  5. Reason, P., Bradbury, H. (eds.): Handbook of Action Research. Sage Publications, London (2013)

    Google Scholar 

  6. Cavoukian, A.: Privacy by design: the definitive workshop. A foreword by Ann Cavoukian. Identity Inf. Soc. 3, 247–251 (2010)

    Article  Google Scholar 

  7. Warren, S., Brandeis, L.: The Right to Privacy. Harvard Law Review IV (1890)

    Google Scholar 

  8. Universal Declaration of Human Rights: G.A. Res. 217 A(III), adopted by the U.N. Doc. A/810, 10 December 1948

    Google Scholar 

  9. Office of the High Commissioner for Human Rights: CCPR General Comment No. 16: Article 17 (Right to Privacy) The Right to Respect of Privacy, Family, Home and Correspondence, and Protection of Honour and Reputation. Adopted 8 April 1988

    Google Scholar 

  10. Posner, R.: Privacy is Overrated, New York Daily News, 28 April 2013

    Google Scholar 

  11. Harper, R. (ed.): Trust, Computing and Society. Cambridge University Press, Cambridge (2014)

    Google Scholar 

  12. Perry, S., Roda, C., Carlson, K.: Submission United Nations Committee on the Rights of the Child - General Comment on the Rights of the Child and the Business Sector (2012)

    Google Scholar 

  13. Nissenbaum, H.: A contextual approach to privacy online. Daedalus 140, 32–48 (2011)

    Article  Google Scholar 

  14. Wright, D., Finn, R., Gellert, R., Gutwirth, S., Schütz, P., Friedewald, M., Venier, S., Mordini, E.: Ethical dilemma scenarios and emerging technologies. Technological Forecasting and Social Change forthcoming

    Google Scholar 

  15. Pew Research Internet Project: Anonymity, Privacy and Security Online (2013). http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online-2/

  16. Internet Society: Internet Society Mission Statement (2014)

    Google Scholar 

  17. Diaz, C., Gürses, S.: Understanding the landscape of privacy technologies. Information Security Summit (2012). http://homes.esat.kuleuven.be/~cdiaz/activities.html. 1 May 14

  18. Jutla, D.N.: Layering privacy on operating systems, social networks, and other platforms by design. Identity Inf. Soc. IDIS 3, 319–341 (2010)

    Article  Google Scholar 

  19. Schwartz, P.M., Solove, D.J.: Reconciling Personal Information in the United States and European Union. California Law Review Forthcoming (2014)

    Google Scholar 

  20. European Commission: Communication on Promoting Data Protection by Privacy Enhancing Technologies (PETs), COM(2007) 228 final, Brussels, 2 May 2007

    Google Scholar 

  21. Goold, B.: Building it in: The role of privacy enhancing technologies in the regulation of surveillance and data collection. In: Goold, B., Neyland, D. (eds.) New Directions in Surveillance and Privacy. Willan, Devon (2009)

    Google Scholar 

  22. International Telecommunication Union: ICT Facts and Figures (2013). http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2013.pdf. Accessed 26 Sep 2013

  23. Roda, C., Perry, S.: Mobile phone infrastructure regulation in Europe: Scientific challenges and human rights protection. Environ. Sci. Policy 37, 204–214 (2014)

    Article  Google Scholar 

  24. Wright, D., Friedewald, M.: Integrating privacy and ethical impact assessments. Sci. Public Policy 40, 755–766 (2013)

    Article  Google Scholar 

  25. Wright, D.: A framework for the ethical impact assessment of information technology. Ethics Inf. Technol. 13, 199–226 (2011)

    Article  Google Scholar 

  26. Perry, S., Roda, C.: Conceptualizing and contextualizing the changing nature of internet usage in china. In: China and the New Internet World: The Eleventh Chinese Internet Research Conference (CIRC11). Oxford Internet Institute, Oxford (2013)

    Google Scholar 

  27. van der Hoven, J.: Fact Sheet – Ethics, IoT Expert Group. European Commission (2011). http://ec.europa.eu/information_society/newsroom/cf/dae/document.cfm?doc_id=1751. Accessed 10 May 2014

  28. Höfer, C., Petit, J., Schmidt, R., Kargl, F.: POPCORN: Privacy-preserving charging for eMobility. In: First Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security (2013)

    Google Scholar 

  29. Australian Ministry of Education Safe Schools Hub: “What is cyberbullying?” http://safeschoolshub.edu.au/for-parents/what-to-do-about-/staying-cybersafe/what-is-cyberbullying-. Accessed 22 May 2014

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Claudia Roda .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Perry, S., Roda, C. (2014). Teaching Privacy by Design to Non-technical Audiences. In: Cleary, F., Felici, M. (eds) Cyber Security and Privacy. CSP 2014. Communications in Computer and Information Science, vol 470. Springer, Cham. https://doi.org/10.1007/978-3-319-12574-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12574-9_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12573-2

  • Online ISBN: 978-3-319-12574-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics