Understanding the Privacy Goal Intervenability
Privacy is gaining more and more attention in society and hence, gains more importance as a software quality that has to be considered during software development. A privacy goal that has not yet been deeply studied is the empowerment of end-users to have control over how their personal data is proc...
Saved in:
Published in | Trust, Privacy and Security in Digital Business Vol. 9830; pp. 79 - 94 |
---|---|
Main Authors | , |
Format | Book Chapter |
Language | English |
Published |
Switzerland
Springer International Publishing AG
2016
Springer International Publishing |
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Privacy is gaining more and more attention in society and hence, gains more importance as a software quality that has to be considered during software development. A privacy goal that has not yet been deeply studied is the empowerment of end-users to have control over how their personal data is processed by information systems. This privacy goal is called intervenability. Several surveys have shown that one of end-users’ main privacy concerns is the lack of intervenability options in information systems. In this paper, we refine the privacy goal intervenability into a software requirements taxonomy and relate it to a taxonomy of transparency requirements because transparency can be regarded as a prerequisite for intervenability. The combined taxonomy of intervenability and transparency requirements shall guide requirements engineers to identify the intervenability requirements relevant for the system they consider. We validated the completeness of our taxonomy by comparing it to the relevant literature that we derived based on a systematic literature review. |
---|---|
AbstractList | Privacy is gaining more and more attention in society and hence, gains more importance as a software quality that has to be considered during software development. A privacy goal that has not yet been deeply studied is the empowerment of end-users to have control over how their personal data is processed by information systems. This privacy goal is called intervenability. Several surveys have shown that one of end-users’ main privacy concerns is the lack of intervenability options in information systems. In this paper, we refine the privacy goal intervenability into a software requirements taxonomy and relate it to a taxonomy of transparency requirements because transparency can be regarded as a prerequisite for intervenability. The combined taxonomy of intervenability and transparency requirements shall guide requirements engineers to identify the intervenability requirements relevant for the system they consider. We validated the completeness of our taxonomy by comparing it to the relevant literature that we derived based on a systematic literature review. |
Author | Meis, Rene Heisel, Maritta |
Author_xml | – sequence: 1 givenname: Rene surname: Meis fullname: Meis, Rene email: rene.meis@paluno.uni-due.de organization: paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen, Duisburg, Germany – sequence: 2 givenname: Maritta surname: Heisel fullname: Heisel, Maritta email: maritta.heisel@paluno.uni-due.de organization: paluno - The Ruhr Institute for Software Technology, University of Duisburg-Essen, Duisburg, Germany |
BookMark | eNqNkE1OwzAQhQ0URFp6Aja5gMuM7djxElVQKlWCBV1bTuy0gcgpSajU2-O2SGxZjebnG733xmQU2uAJuUeYIYB60CqnnHLUVAgukEojL8iYx8Gph0uSoESknAt99bcANiIJcGBUK8FvSKIzKZjkubgl077_AABUDASIhMzWwfmuH2xwddikw9anb129t-UhXbS2SZdh8N3eB1vUTT0c7sh1ZZveT3_rhKyfn97nL3T1uljOH1d0w7kcaKWVc6Al4w6yirko0AtbOoelyrCQ4ETlrWdOOctcgaqUlXSCVQ5RF5DzCcHz337XRV2-M0XbfvYGwRyTMTEZw030a05JmJhMZNiZ2XXt17fvB-OPUOnD0Nmm3NpdtNLHQ2AahZHM5OK_UJZFBLNf6AflznUB |
ContentType | Book Chapter |
Copyright | Springer International Publishing Switzerland 2016 |
Copyright_xml | – notice: Springer International Publishing Switzerland 2016 |
DBID | FFUUA |
DEWEY | 658.478 |
DOI | 10.1007/978-3-319-44341-6_6 |
DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science Business |
EISBN | 3319443410 9783319443416 |
EISSN | 1611-3349 |
Editor | Katsikas, Sokratis Lambrinoudakis, Costas Furnell, Steven |
Editor_xml | – sequence: 1 fullname: Katsikas, Sokratis – sequence: 2 fullname: Lambrinoudakis, Costas – sequence: 3 fullname: Furnell, Steven |
EndPage | 94 |
ExternalDocumentID | EBC6302914_62_84 EBC5591415_62_84 |
GroupedDBID | 0D6 0DA 38. AABBV AAMCO AAPIT AAQZU ABBVZ ABMNI ABOWU ACLMJ ADCXD ADPGQ AEDXK AEJGN AEJLV AEKFX AETDV AEZAY ALMA_UNASSIGNED_HOLDINGS AORVH AZZ BBABE CZZ FFUUA I4C IEZ SBO SWNTM TPJZQ TSXQS Z7R Z7S Z7U Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z88 -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ACGFS AEFIE EJD F5P FEDTE HVGLF LAS LDH P2P RIG RNI RSU SVGTG VI1 ~02 |
ID | FETCH-LOGICAL-g336t-f97dd09623d05f2d334e4acdd1c751b60d4feae2d7da2db17c6f6d42fd119b083 |
ISBN | 3319443402 9783319443409 |
ISSN | 0302-9743 |
IngestDate | Tue Jul 29 20:09:45 EDT 2025 Mon Apr 07 01:45:35 EDT 2025 Thu May 29 15:57:31 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
LCCallNum | QA76.9.A25QA76.758QA |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-g336t-f97dd09623d05f2d334e4acdd1c751b60d4feae2d7da2db17c6f6d42fd119b083 |
Notes | This work was partially supported by the Deutsche Forschungsgemeinschaft (DFG) under grant No. GRK 2167, Research Training Group “User-Centered Social Media”. |
OCLC | 956426384 1197571800 |
PQID | EBC5591415_62_84 |
PageCount | 16 |
ParticipantIDs | springer_books_10_1007_978_3_319_44341_6_6 proquest_ebookcentralchapters_6302914_62_84 proquest_ebookcentralchapters_5591415_62_84 |
PublicationCentury | 2000 |
PublicationDate | 2016 |
PublicationDateYYYYMMDD | 2016-01-01 |
PublicationDate_xml | – year: 2016 text: 2016 |
PublicationDecade | 2010 |
PublicationPlace | Switzerland |
PublicationPlace_xml | – name: Switzerland – name: Cham |
PublicationSeriesSubtitle | Security and Cryptology |
PublicationSeriesTitle | Lecture Notes in Computer Science |
PublicationSeriesTitleAlternate | Lect.Notes Computer |
PublicationSubtitle | 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings |
PublicationTitle | Trust, Privacy and Security in Digital Business |
PublicationYear | 2016 |
Publisher | Springer International Publishing AG Springer International Publishing |
Publisher_xml | – name: Springer International Publishing AG – name: Springer International Publishing |
RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Naor, Moni Mitchell, John C. Terzopoulos, Demetri Steffen, Bernhard Pandu Rangan, C. Kanade, Takeo Kittler, Josef Weikum, Gerhard Hutchison, David Tygar, Doug |
RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, Lancaster, United Kingdom – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, United Kingdom – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: CNB H 104.2, ETH Zurich, Zürich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Madras, Indian Institute of Technology, Chennai, India – sequence: 9 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: Fakultät Informatik, TU Dortmund, Dortmund, Germany – sequence: 10 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles, USA – sequence: 11 givenname: Doug surname: Tygar fullname: Tygar, Doug organization: University of California, Berkeley, USA – sequence: 12 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max Planck Institute for Informatics, Saarbrücken, Germany |
SSID | ssj0001720404 ssj0002792 |
Score | 2.07132 |
Snippet | Privacy is gaining more and more attention in society and hence, gains more importance as a software quality that has to be considered during software... |
SourceID | springer proquest |
SourceType | Publisher |
StartPage | 79 |
SubjectTerms | Computer security Data Subject Legal Person Personal Data Requirement Engineer Systematic Literature Review |
Title | Understanding the Privacy Goal Intervenability |
URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=5591415&ppg=84 http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6302914&ppg=84 http://link.springer.com/10.1007/978-3-319-44341-6_6 |
Volume | 9830 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NT9swFLegXKYdGBvTPhjKYSdQUBw7dnvYAW2wCgGHiU7crPgL9dJKNOywv573YrtpMiTELmllWXX8fu7z-36EfJXOe-alyX3lipx7qfMJdya3woyrymJTd7RDXl2L6Yxf3Fa3Xe5Jm13S6BPz98m8kv9BFcYAV8ySfQGy6x-FAfgO-MITEIbnQPjtm1njLfMQ8zXu53-waXsbhBnb0aEZ48f8DjuCrGPb17R1oa7AL9e51KcO2y7F5J1509SbR2nWS4BBSTUt-XPZluoIYZOh4ndgLbh9t_p2GT0U18umDfw6Tk0kEk_ZNDrQodEhGR0HZsvOctbTUhn8zTlnvJhsMDcGnBh0mcDcXGC-AksqslDCNDLU0GkmXs2hHfI_TH8zzgNzsnAtmgsltsm2HFcjsnN6dnH5uzO9YWMe1ELjhY01FIOzKbwSpgClVy5DkaZuC-vKVaE48WDFnp4ycK23EsvNG_Ias1gyTC8B2u2RLbd4S3YT-bNI_nfkpAduBuBmEdwMwc0G4O6T2fnZzfdpHnto5HeMiSb3E2ktqKkls0XlSwvkdbw21lIjK6pFYbl3tSuttHVpNZVGeGF56S2lEw3y-XsyWiwX7gPJrK5q4OZ1rW3JjYMPKgvNYQB4uvPjj-Q47V21nv4YXmzCTlcKlFcK8qISpRrzZ2cLgAPmp9lHiZgKJ69UKrcNICimAATVgqAAhE8vmfyZvOoO-AEZNfcP7gvImY0-jOfmEStsd9w |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Trust%2C+Privacy+and+Security+in+Digital+Business&rft.au=Meis%2C+Rene&rft.au=Heisel%2C+Maritta&rft.atitle=Understanding+the+Privacy+Goal+Intervenability&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2016-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783319443409&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=79&rft.epage=94&rft_id=info:doi/10.1007%2F978-3-319-44341-6_6 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F5591415-l.jpg http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6302914-l.jpg |