A systematic methodology for privacy impact assessments: a design science approach

被引:98
作者
Oetzel, Marie Caroline [1 ]
Spiekermann, Sarah [1 ]
机构
[1] Vienna Univ Econ & Business, Inst Management Informat Syst, A-1090 Vienna, Austria
关键词
privacy impact assessment; privacy-by-design; security risk assessment; design science;
D O I
10.1057/ejis.2013.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For companies that develop and operate IT applications that process the personal data of customers and employees, a major problem is protecting these data and preventing privacy breaches. Failure to adequately address this problem can result in considerable damage to the company's reputation and finances, as well as negative effects for customers or employees (data subjects). To address this problem, we propose a methodology that systematically considers privacy issues by using a step-by-step privacy impact assessment (PIA). Existing PIA approaches cannot be applied easily because they are improperly structured or imprecise and lengthy. We argue that companies that employ our PIA can achieve 'privacy-by-design', which is widely heralded by data protection authorities. In fact, the German Federal Office for Information Security (BSI) ratified the approach we present in this article for the technical field of RFID and published it as a guideline in November 2011. The contribution of the artefacts we created is twofold: First, we provide a formal problem representation structure for the analysis of privacy requirements. Second, we reduce the complexity of the privacy regulation landscape for practitioners who need to make privacy management decisions for their IT applications.
引用
收藏
页码:126 / 150
页数:25
相关论文
共 66 条
[1]  
Alhadeff J, 2012, MANAGING PRIVACY THROUGH ACCOUNTABILITY, P49
[2]  
[Anonymous], 2008, 1003 BSI
[3]  
[Anonymous], 1980, GUID PROT PRIV TRANS
[4]  
[Anonymous], 1995, OJL, V281, P31
[5]  
[Anonymous], 2007, User control in ubiquitous computing: Design alternatives and user acceptance
[6]  
[Anonymous], 2002, The Delphi Method
[7]  
[Anonymous], 31000 ISOIEC
[8]  
[Anonymous], 1890, Harvard Law Review, DOI DOI 10.2307/1321160
[9]  
[Anonymous], POLICY LAW POLICY RE
[10]  
[Anonymous], COM201211 EC