Advertisement

Workshop on Privacy Challenges in Public and Private Organizations

  • Alessandra BagnatoEmail author
  • Paulo Silva
  • Ala Sarah Alaqra
  • Orhan Ermis
Chapter
  • 45 Downloads
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 576)

Abstract

Recent developments in information technology such as the Internet of Things and the cloud computing paradigm enable public and private organisations to collect large amounts of data to employ various data analytic techniques for extracting important information that helps improve their businesses. Unfortunately, these benefits come with a high cost in terms of privacy exposures given the high sensitivity of the data that are usually processed at powerful third-party servers. Given the ever-increasing of data breaches, the serious damage they cause, and the need for compliance to the European General Data Protection Regulation (GDPR), these organisations look for secure and privacy-preserving data handling practices. During the workshop, we aimed at presenting an approach to the problem of user data protection and control, currently being developed in the scope of the PoSeID-on and PAPAYA H2020 European projects.

Keywords

Privacy-enhancing dashboard Privacy-preserving data analytics GDPR 

Notes

Acknowledgement

This work was partly supported by the PAPAYA project and PoSeID-on project funded by the European Union’s Horizon 2020 Research and Innovation Programme, under Grant Agreement no. 786767 and no. 786713, respectively.

References

  1. 1.
    Papaya Project - Platform for privacy preserving data analytics. www.papaya-project.eu. Accessed 17 Oct 2019
  2. 2.
    PoSeID-on Project - Protection and control of secured information by means of a privacy enhanced dashboard. www.poseidon-h2020.eu. Accessed 17 Oct 2019
  3. 3.
    Ciceri, E., Mosconi, M., Önen, M., Ermis, O.: PAPAYA: A Platform for Privacy Preserving Data Analytics (2019). https://ercim-news.ercim.eu/en118/special/papaya-a-platform-for-privacy-preserving-data-analytics. Accessed 22 Oct 2019
  4. 4.
    Abras, C., Maloney-Krichmar, D., Preece, J.: User-centered design. Bainbridge W. Encycl. Hum.-Comput. Interact. 37(4), 445–56 (2004)Google Scholar
  5. 5.
    Anderson, N.S., Norman, D.A., Draper, S.W.: User centered system design: new perspectives on human-computer interaction. Am. J. Psychol. 101(1), 148 (1988)CrossRefGoogle Scholar
  6. 6.
    Alaqra, A.S., Wästlund, E.: Reciprocities or incentives? Understanding privacy intrusion perspectives and sharing behaviors. In: Moallem, A. (ed.) HCII 2019. LNCS, vol. 11594, pp. 355–370. Springer, Cham (2019).  https://doi.org/10.1007/978-3-030-22351-9_24CrossRefGoogle Scholar
  7. 7.
    Ciceri, E., Galliani, S., Mosconi, M., Azraoui, M., Canard, S.: D2.1: Use Cases and Requirements, PAPAYA Deliverable D2.1 (2019)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2020

Authors and Affiliations

  • Alessandra Bagnato
    • 1
    Email author
  • Paulo Silva
    • 2
  • Ala Sarah Alaqra
    • 3
  • Orhan Ermis
    • 4
  1. 1.SOFTEAM R&D DepartmentParisFrance
  2. 2.CISUC, Department of Informatics EngineeringUniversity of CoimbraCoimbraPortugal
  3. 3.Karlstad UniversityKarlstadSweden
  4. 4.EURECOMSophia AntipolisFrance

Personalised recommendations