Translating contextual integrity into practice using CLIFOD.
Henriksen-Bulmer, Jane; Faily, Shamal; Katos, Vasilios
Dr Shamal Faily email@example.com
Public open data increases transparency, but raises questions about the privacy implications of affected individuals. We present a case for using CLIFOD (ContextuaL Integrity for Open Data), a step-by-step privacy decision framework derived from contextual integrity, to assess the hidden risks of making data obtained from Internet of Things (IoT) and Smart City devices before any data is released and made openly available. We believe CLIFOD helps reduce the risk of any personal or sensitive data being inadvertently published or made available by guiding decision makers into thinking about privacy in context and what privacy risks might be associated with making the data available and how this might impact prosumers.
HENRIKSEN-BULMER, J., FAILY, S. and KATOS, V. 2018. Translating contextual integrity into practice using CLIFOD. Presented at the 2018 Networked privacy workshop: privacy in context: critically engaging with theory to guide privacy research and design, part of the 21st ACM conference on computer-supported cooperative work and social computing (CSCW 2018), 3 November 2018, Jersey City, USA.
|Presentation Conference Type||Conference Paper (unpublished)|
|Conference Name||2018 Networked privacy workshop: privacy in context: critically engaging with theory to guide privacy research and design, part of the 21st ACM conference on computer-supported cooperative work and social computing (CSCW 2018)|
|Conference Location||Jersey City, USA|
|Start Date||Nov 3, 2018|
|Deposit Date||Dec 15, 2021|
|Publicly Available Date||Dec 15, 2021|
|Keywords||Privacy and computing; Data protection; Open Data; Personal data|
HENRIKSEN-BULMER 2018 Translating contextual integrity
You might also like
Programming language evaluation criteria for safety-critical software in the air domain.
Automation and cyber security risks on the railways: the human factors implications.
Presentation / Conference
Assessing system of systems information security risk with OASoSIS.
Integrated design framework for facilitating systems-theoretic process analysis.
Cybersecurity user requirements analysis: the ECHO approach.