Abstract
As research in cyber security and privacy advances, privacy initiatives should be disseminated to the broader public. Education of this public is a key tool in conveying the seminal importance of security and privacy in our use of digital technology. This article presents a curriculum that, by targeting the non-engineering public, provides an opportunity for rapid acceptance of the innovative security and privacy research in which we are currently engaged.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Note that the Office of the Information and Privacy Commissioner offers PbD educational material organized in two sets of slides aimed at introducing the concept to a large audience including “chief privacy officers, engineering instructors, social scientists, and privacy leaders”. See http://www.privacybydesign.ca/index.php/publications/curriculum/.
- 2.
The Chinese government last published the number of annual mass incidents in 2005. Anecdotal speculation brings the number to as high as 180,000 riots per year - see Freeman, Will (2010) The Accuracy of China’s mass incidents. Financial Times, March 2.
References
Cavoukian, A., Dixon, M.: Privacy and Security by Design: An Enterprise Architecture Approach (2013). http://www.privacybydesign.ca/index.php/paper/privacy-security-design-enterprise-architecture-approach/. Accessed 10 May 2014
Cavoukian, A.: Foundational Principles (Privacy by design) (1997). http://www.privacybydesign.ca/index.php/about-pbd/7-foundational-principles/. Accessed 22 May 2014
Rubinstein, I., Good, N.: Privacy by design: A counterfactual analysis of Google and Facebook privacy incidents. Berkeley Technol. Law J. 4 (2011)
Gürses, S., Troncoso, C., Diaz, C.: Engineering privacy by design. In: International Conference on Privacy and Data Protection (CPDP), Belgium (2011)
Reason, P., Bradbury, H. (eds.): Handbook of Action Research. Sage Publications, London (2013)
Cavoukian, A.: Privacy by design: the definitive workshop. A foreword by Ann Cavoukian. Identity Inf. Soc. 3, 247–251 (2010)
Warren, S., Brandeis, L.: The Right to Privacy. Harvard Law Review IV (1890)
Universal Declaration of Human Rights: G.A. Res. 217 A(III), adopted by the U.N. Doc. A/810, 10 December 1948
Office of the High Commissioner for Human Rights: CCPR General Comment No. 16: Article 17 (Right to Privacy) The Right to Respect of Privacy, Family, Home and Correspondence, and Protection of Honour and Reputation. Adopted 8 April 1988
Posner, R.: Privacy is Overrated, New York Daily News, 28 April 2013
Harper, R. (ed.): Trust, Computing and Society. Cambridge University Press, Cambridge (2014)
Perry, S., Roda, C., Carlson, K.: Submission United Nations Committee on the Rights of the Child - General Comment on the Rights of the Child and the Business Sector (2012)
Nissenbaum, H.: A contextual approach to privacy online. Daedalus 140, 32–48 (2011)
Wright, D., Finn, R., Gellert, R., Gutwirth, S., Schütz, P., Friedewald, M., Venier, S., Mordini, E.: Ethical dilemma scenarios and emerging technologies. Technological Forecasting and Social Change forthcoming
Pew Research Internet Project: Anonymity, Privacy and Security Online (2013). http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online-2/
Internet Society: Internet Society Mission Statement (2014)
Diaz, C., Gürses, S.: Understanding the landscape of privacy technologies. Information Security Summit (2012). http://homes.esat.kuleuven.be/~cdiaz/activities.html. 1 May 14
Jutla, D.N.: Layering privacy on operating systems, social networks, and other platforms by design. Identity Inf. Soc. IDIS 3, 319–341 (2010)
Schwartz, P.M., Solove, D.J.: Reconciling Personal Information in the United States and European Union. California Law Review Forthcoming (2014)
European Commission: Communication on Promoting Data Protection by Privacy Enhancing Technologies (PETs), COM(2007) 228 final, Brussels, 2 May 2007
Goold, B.: Building it in: The role of privacy enhancing technologies in the regulation of surveillance and data collection. In: Goold, B., Neyland, D. (eds.) New Directions in Surveillance and Privacy. Willan, Devon (2009)
International Telecommunication Union: ICT Facts and Figures (2013). http://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2013.pdf. Accessed 26 Sep 2013
Roda, C., Perry, S.: Mobile phone infrastructure regulation in Europe: Scientific challenges and human rights protection. Environ. Sci. Policy 37, 204–214 (2014)
Wright, D., Friedewald, M.: Integrating privacy and ethical impact assessments. Sci. Public Policy 40, 755–766 (2013)
Wright, D.: A framework for the ethical impact assessment of information technology. Ethics Inf. Technol. 13, 199–226 (2011)
Perry, S., Roda, C.: Conceptualizing and contextualizing the changing nature of internet usage in china. In: China and the New Internet World: The Eleventh Chinese Internet Research Conference (CIRC11). Oxford Internet Institute, Oxford (2013)
van der Hoven, J.: Fact Sheet – Ethics, IoT Expert Group. European Commission (2011). http://ec.europa.eu/information_society/newsroom/cf/dae/document.cfm?doc_id=1751. Accessed 10 May 2014
Höfer, C., Petit, J., Schmidt, R., Kargl, F.: POPCORN: Privacy-preserving charging for eMobility. In: First Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security (2013)
Australian Ministry of Education Safe Schools Hub: “What is cyberbullying?” http://safeschoolshub.edu.au/for-parents/what-to-do-about-/staying-cybersafe/what-is-cyberbullying-. Accessed 22 May 2014
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Perry, S., Roda, C. (2014). Teaching Privacy by Design to Non-technical Audiences. In: Cleary, F., Felici, M. (eds) Cyber Security and Privacy. CSP 2014. Communications in Computer and Information Science, vol 470. Springer, Cham. https://doi.org/10.1007/978-3-319-12574-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-12574-9_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12573-2
Online ISBN: 978-3-319-12574-9
eBook Packages: Computer ScienceComputer Science (R0)