Privacy design strategies

229Citations
Citations of this article
299Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper we define the notion of a privacy design strategy. These strategies help IT architects to support privacy by design early in the software development life cycle, during concept development and analysis. Using current data protection legislation as point of departure we derive the following eight privacy design strategies: MINIMISE, HIDE, SEPARATE, AGGREGATE, INFORM, CONTROL, ENFORCE, and DEMONSTRATE. The strategies also provide a useful classification of privacy design patterns and the underlying privacy enhancing technologies. We therefore believe that these privacy design strategies are not only useful when designing privacy friendly systems, but also helpful when evaluating the privacy impact of existing IT systems.

Cite

CITATION STYLE

APA

Hoepman, J. H. (2014). Privacy design strategies. In IFIP Advances in Information and Communication Technology (Vol. 428, pp. 446–459). Springer Science and Business Media, LLC. https://doi.org/10.1007/978-3-642-55415-5_38

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free