Skip to main content

Design for the Value of Privacy

  • Reference work entry
  • First Online:
Book cover Handbook of Ethics, Values, and Technological Design

Abstract

In a time where more and more information about people is collected, especially in the digital domain, the right to be left alone and to be free of surveillance, i.e., privacy, is no longer as self-evident as it once was. Therefore, it is important that new systems are designed with privacy in mind. This chapter explores the notion of privacy and how to design “privacy-preserving” systems: systems that are designed with privacy for the end users in mind. Several design approaches that address this issue, such as “Privacy by Design,” “Value Sensitive Design,” and “Privacy Enhancing Technologies,” are discussed. Examples of privacy-preserving (and breaking) systems, ranging from smart meters to electronic health records, are used to illustrate the main difficulties of designing such systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 699.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    As an example, consider the case of Wolfgang Werle. Werle has been convicted for murder in Germany. He used German privacy laws to sue Wikipedia to get this information removed from his German Wikipedia page. After winning the case, Werle’s German Wikipedia page no longer exists, but the information is still accessible from, among others, the English and Dutch Wikipedia pages.

  2. 2.

    Or indeed, how to verify the absence of bugs in computer systems.

  3. 3.

    For example, the NSA can almost certainly indentify users of the TOR network. See https://www.eff.org/deeplinks/2012/03/https-and-tor-working-together-protect-your-privacy-and-security-online (retrieved 3/3/2012).

  4. 4.

    http://freenetproject.org/faq.html#childporn (retrieved 3/3/2012).

References

  • Ackerman M, Darrell T, Weitzner D (2001) Privacy in context. Hum Comput Interact 16:167–176

    Article  Google Scholar 

  • Anderson RJ (2010) Security engineering: a guide to building dependable distributed systems. Wiley, New York

    Google Scholar 

  • Annecharico D (2002) Notes & comments: V. Privacy after GLBA: online transactions: squaring the Gramm-Leach-Bliley act privacy provisions with the FTC fair information practice principles. NC Bank Inst 6:637–695

    Google Scholar 

  • Atlas RM, Dando M (2006) The dual-use dilemma for the life sciences: perspectives, conundrums, and global solutions. Biosecur Bioterror Biodefense Strateg Pract Sci 4(3):276–286

    Google Scholar 

  • Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805

    Article  Google Scholar 

  • Back A, Möller U, Stiglic A (2001) Traffic analysis attacks and trade-offs in anonymity providing systems. In: Sadeghi AR, Katzenbeisser S (eds) Information hiding. Springer, Berlin, pp 245–257

    Chapter  Google Scholar 

  • Barrows RC Jr, Clayton PD (1996) Privacy, confidentiality, and electronic medical records. J Am Med Inform Assoc 3(2):139–148

    Article  Google Scholar 

  • Berlin I (1958) Two concepts of liberty. Clarendon Press, Oxford

    Google Scholar 

  • Birnhack M (2008) The EU data protection directive: an engine of a global regime. Comput Law Sec Rep 24(6):508–520

    Article  Google Scholar 

  • Boekema J (2011) Assessment of the implementation regulations for Smart Meters, TNO Technical Report, Delft, TNO-RPT-DTS-2011-00463-E

    Google Scholar 

  • Brazier FMT, Oskamp A, Prins JEJ, Schellekens MHM, Wijngaards NJE (2004) Anonymity and software agents: an interdisciplinary challenge. AI Law 1–2(12):137–157

    Google Scholar 

  • Cavoukian A (2009) Privacy by design. IPC, Ottawa

    Google Scholar 

  • Cavoukian A (2010) Privacy by design: the definitive workshop. Identity Inf Soc 3(2):121–126

    Google Scholar 

  • Clarke I, Sandberg O, Wiley B, Hong T (2001) Freenet: a distributed anonymous information storage and retrieval system. In: Federrath H (ed) Designing privacy enhancing technologies. Springer, Heidelberg, pp 46–66

    Chapter  Google Scholar 

  • Danezis G, Diaz C, Troncoso C (2007) Two-sided statistical disclosure attack. In: Proceedings of the 7th international conference on privacy enhancing technologies, Springer, pp 30–44

    Google Scholar 

  • Denning DE, Branstad DK (1996) Key escrow encryption systems. Commun ACM 39(3):35

    Article  Google Scholar 

  • Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. In: Proceedings of the 13th conference on USENIX security symposium, Washington DC, vol 13, p 21

    Google Scholar 

  • Douceur J (2002) The Sybil attack. In: Peter D, Frans K, Antony R (eds.) Peer-to-peer systems. Springer, Berlin, pp 251–260

    Google Scholar 

  • Efthymiou C, Kalogridis G (2010) Smart grid privacy via anonymization of smart metering data. In: First IEEE international conference on smart grid communications (SmartGridComm), New York, pp 238–243

    Google Scholar 

  • EU Data Protection Directive (1995) Directive 95/46/EC of the European parliament and of the council of 24 Oct 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data

    Google Scholar 

  • EU Proposal (2012) Proposal for a regulation of the European parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), Brussels

    Google Scholar 

  • ESMA (2009) Annual report on the progress in smart metering, Version 2.0

    Google Scholar 

  • Evans NS, Dingledine R, Grothoff C (2009) A practical congestion attack on Tor using long paths. In: Proceedings of the 18th conference on USENIX security symposium, pp 33–50

    Google Scholar 

  • Fan Z, Kulkarni P, Gormus S, Efthymiou C, Kalogridis G, Sooriyabandara M, Zhu Z, Lambotharan S, Chin W (2011) Smart grid communications: overview of research challenges, solutions, and standardization activities. IEEE Commun Surv Tutor 99:1–18

    Google Scholar 

  • Feistel H (1973) Cryptography and computer privacy. Sci Am 228(5):15–23

    Article  Google Scholar 

  • Friedman B, Kahn Jr PH (2002). Human values, ethics, and design. In: Julie AJ, Andrew S (eds.) The human-computer interaction handbook. Lawrence Erlbaum Associates, Hillsdale, NJ, USA, pp 1177–1201

    Google Scholar 

  • Friedman B, Kahn PH Jr, Borning A (2006) Value sensitive design and information systems. Hum Comput Interact Manag Inf Syst Found 5:348–372

    Google Scholar 

  • Froomkin AM (1995) The metaphor is the key: cryptography, the clipper chip, and the constitution. Univ Pa Law Rev 143(3):709–897

    Article  Google Scholar 

  • Garcia FD, Jacobs BPF (2011) Privacy-friendly energy-metering via homomorphic encryption. In: 6th Workshop on Security and Trust Management (STM 2010) Lecture Notes in Computer Science, vol 6710. Springer, pp 226–238

    Google Scholar 

  • Garcia FD, de Koning Gans G, Muijrers R, van Rossum P, Verdult R, Wichers Schreur R, Jacobs BPF (2008) Dismantling MIFARE classic. In: Jajodia S, Lopez J (eds) 13th European symposium on research in computer security (ESORICS 2008). Lecture Notes in Computer Science, vol 5283. Springer, pp 97–114

    Google Scholar 

  • Gellings CW, Chamberlin JH (1987) Demand-side management: concepts and methods. The Fairmont, Lilburn

    Google Scholar 

  • Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st annual ACM symposium on theory of computing, ACM, pp169–178

    Google Scholar 

  • Greveler U, Justus B, Loehr D (2012) Multimedia content identification through smart meter power usage proles. In: Gutwirth S, Leenes R, de Hert P, Poullet Y (eds.) Computers, privacy and data protection. Springer, Berlin

    Google Scholar 

  • Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, ACM, pp 71–80

    Google Scholar 

  • HIPAA (1996) Health insurance portability and accountability act of 1996

    Google Scholar 

  • Hoare T (2003) The verifying compiler: a grand challenge for computing research. In: Proceedings of the 12th international conference on compiler construction. Springer, pp 262–272

    Google Scholar 

  • Hone K, Eloff JHP (2002) Information security policy–what do international information security standards say? Comput Sec 21(5):402–409

    Article  Google Scholar 

  • Janger EJ, Schwartz PM (2001) The Gramm-Leach-Bliley act, information privacy, and the limits of default rules, Minnesota Law Review 86

    Google Scholar 

  • Jones H, Soltren H (2005) Facebook: threats to privacy. Soc Sci Res 1:1–76

    Google Scholar 

  • Juels A (2006) RFID security and privacy: a research survey. IEEE J Sel Area Commun 24(2):381–394

    Article  Google Scholar 

  • Kursawe K, Danezis G, Kohlweiss M (2011) Privacy-friendly aggregation for the smart-grid. In: Privacy enhancing technologies. Springer, pp 175–191

    Google Scholar 

  • Liu C, Marchewka JT, Ku C (2004) American and Taiwanese perceptions concerning privacy, trust, and behavioral intentions in electronic commerce. J Glob Inf Manag 12:18–40

    Article  Google Scholar 

  • Loeckx J, Sieber K, Stansifer RD (1985) The foundations of program verification. Wiley, New York

    Google Scholar 

  • Massoud SA, Wollenberg B (2005) Toward a smart grid: power delivery for the 21st century. Power Energy Mag IEEE 3(5):34–41

    Article  Google Scholar 

  • McDaniel P, McLaughlin S (2009) Security and privacy challenges in the smart grid. IEEE Sec Priv 7(3):75–77

    Article  Google Scholar 

  • Movius L, Krup N (2009) U.S. and EU privacy policy: comparison of regulatory approaches. Int J Commun 3:169–187

    Google Scholar 

  • Nagenborg M (2009) Designing spheres of informational justice. Ethics Inf Technol 11:175–179

    Article  Google Scholar 

  • Nissenbaum H (2010) Privacy in context. Stanford University Press, Palo Alto

    Google Scholar 

  • Ogston EFY, Brazier FMT (2009) Apportionment of control in virtual power stations. In: Proceedings of the international conference on infrastructure systems and services 2009: developing 21st century infrastructure networks, IEEE computer society, pp 1–6

    Google Scholar 

  • PCI (2009) PCI security standards council, payment card industry (PCI) data security standard – requirements and security assessment procedures version 1.2

    Google Scholar 

  • Phelps J, Nowak G, Ferrell E (2000) Privacy concerns and consumer willingness to provide personal information. J Public Policy Market 19:27–41

    Article  Google Scholar 

  • Rosen J (2010) The end of forgetting, The New York Times Magazine, July 25

    Google Scholar 

  • Rosenblum D (2007) What anyone can know: the privacy risks of social networking sites. IEEE Sec Priv IEEE Comput Soc 5:40–49

    Article  Google Scholar 

  • Schorceman FD (ed) (1984) Philosophical dimensions of privacy: an anthology. Cambridge University Press, Cambridge

    Google Scholar 

  • van den Hoven MJ (1999) Privacy or informational injustice? In: Pourcia L (ed) Ethics and information in the twenty-first century. Purdue University Press, West Lafayette, pp 140–150

    Google Scholar 

  • van den Hoven J, Vermaas PE (2007) Nano-technology and privacy: on continuous surveillance outside the panopticon. J Med Philos 32(3):283–297

    Article  Google Scholar 

  • van ’t Noordende G (2010) Security in the Dutch electronic patient record system, 2nd ACM Workshop on Security and Privacy in Medical and Home-Care Systems (SPIMACS), pp 21–31

    Google Scholar 

  • Warnier ME (2006) Language based security for Java and JML. PhD thesis, Radboud University, Nijmegen

    Google Scholar 

  • Warnier ME, Brazier FMT, Oskamp A (2008) Security of distributed digital criminal dossiers. J Softw 3(3):21–29, Academy Publisher

    Article  Google Scholar 

  • Warren SD, Brandeis LD (1890) The right to privacy. Harv Law Rev 4(5):193–220

    Article  Google Scholar 

  • Winters N (2004) Personal privacy and popular ubiquitous technology. In: Proceedings of Ubiconf, London

    Google Scholar 

  • Zakaria N, Stanton JM, Sarkar-Barney STM (2003) Designing and implementing culturally-sensitive IT applications: the interaction of culture values and privacy issues in the middle east. Inf Technol People 16(1):49–75

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Martijn Warnier .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Dordrecht

About this entry

Cite this entry

Warnier, M., Dechesne, F., Brazier, F. (2015). Design for the Value of Privacy . In: van den Hoven, J., Vermaas, P., van de Poel, I. (eds) Handbook of Ethics, Values, and Technological Design. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6970-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-6970-0_17

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-6969-4

  • Online ISBN: 978-94-007-6970-0

  • eBook Packages: Humanities, Social Sciences and Law

Publish with us

Policies and ethics