SlideShare a Scribd company logo
1 of 34
Privacy?	
  Who	
  Cares!	
  
Swapneel	
  Sheth,	
  Gail	
  Kaiser,	
  Walid	
  Maalej	
  
@swapneel	
  	
  @maalejw	
   1	
  
Summary	
  of	
  the	
  Talk	
  
Survey	
  comparing	
  how	
  
developers	
  &	
  users	
  from	
  
different	
  geographies	
  
care	
  about	
  privacy	
  
# responses
Aggregation
Distortion
Sharing
Breach
Increase ConcernIncrease Concern
Technical details
Policy
Laws
Usage
Anonymization
200 100 0 100 200 300 400
Reduce ConcernReduce Concern
No Uncertain Yes
2	
  
Framework	
  with	
  	
  
guidelines	
  &	
  requirements	
  
for	
  building	
  privacy-­‐aware	
  
so:ware	
  system	
  
3	
  
4	
  
6	
  
7	
  
Everybody	
  is	
  Talking	
  about	
  
Privacy	
  
How	
  about	
  the	
  Developers	
  and	
  Users?	
  
8	
  
Outline	
  of	
  the	
  Talk	
  
ImplicaSons	
  
Study	
  Design	
  
Results	
  
MoSvaSon	
  
2	
  
1	
  
3	
  
4	
  
9	
  
Research	
  QuesSons	
  1/2	
  
1.  What	
  are	
  developers’	
  and	
  
users’	
  percepSons	
  of	
  privacy?	
  
2.  Which	
  privacy	
  concerns	
  are	
  
more	
  important?	
  
10	
  
Research	
  QuesSons	
  2/2	
  
3.  What	
  are	
  the	
  best	
  techniques	
  	
  
to	
  address	
  these	
  aspects?	
  
4.  Does	
  geography	
  have	
  any	
  	
  
impact	
  on	
  privacy	
  requirements?	
  
11	
  
Research	
  Method:	
  Online	
  Survey	
  
•  Nov	
  2012	
  -­‐	
  Sep	
  2013	
  
•  About	
  10	
  minutes	
  
•  14	
  closed	
  quesIons	
  	
  
•  2	
  open	
  quesIons	
  
•  English	
  and	
  German	
  
12	
  
SemanSc	
  Scale	
  for	
  the	
  Answer	
  
OpSons	
  
13	
  
Research	
  Reliability	
  &	
  Validity	
  
Pilot	
  tesIng	
  
Random	
  order	
  of	
  answers	
  
ValidaIon	
  quesIons	
  
Post	
  sampling	
  
Summaries	
  generalizable	
  to	
  populaIons	
  
DifferenIal	
  analysis	
  with	
  significant	
  results	
  
!
14	
  
408	
  Valid	
  Responses	
  (out	
  of	
  595)	
  
Developers	
   Users	
  
North	
  America	
   85	
   44	
  
Europe	
   116	
   65	
  
Asia/Pacific	
   61	
   30	
  
15	
  
Outline	
  of	
  the	
  Talk	
  
ImplicaSons	
  
Study	
  Design	
  
Results	
  
MoSvaSon	
  
2	
  
1	
  
3	
  
4	
  
16	
  
Privacy	
  Concerns	
  
Data	
  AggregaSon	
  	
  
AggregaIon	
  of	
  user	
  
data	
  over	
  long	
  
period	
  of	
  Ime	
  
Data	
  DistorSon	
  
MisrepresentaIon	
  
of	
  the	
  data	
  or	
  user	
  
intent	
  
Data	
  Sharing	
  
Collected	
  data	
  given	
  to	
  
third	
  parIes	
  e.g.	
  for	
  
adverIsing	
  
Data	
  Breaches	
  
Malicious	
  users	
  get	
  
access	
  to	
  sensiIve	
  
data	
   17	
  
What	
  Increases	
  Privacy	
  Concerns?	
  
Aggregation
Distortion
Sharing
Breach
IncreaseConcernIncreaseConcern
ReduceConcernReduceConcern
#respon
Aggregation
Distortion
Sharing
Breach
IncreaseConcernIncreaseConcern
Technicaldetails
Policy
Laws
Usage
Anonymization
200 100 0 100 200 300 400
ReduceConcernReduceConcern
No Uncertain Yes
Breach	
  
Sharing	
  
DistorIon	
  
AggregaIon	
  
#	
  responses	
  
18	
  
Selected	
  QualitaSve	
  Feedback	
  
AuthoriSes	
  and	
  
intelligent	
  services	
  
“Anyway	
  there	
  is	
  prism”	
  
Unusable	
  and	
  non-­‐
transparent	
  policies	
  
Lack	
  of	
  control	
   APIs,	
  correctness	
  &	
  viruses	
  
“Privacy	
  concerns	
  are	
  
transmiZed	
  through	
  APIs”	
  
19	
  
Reducing	
  Privacy	
  Concerns	
  
•  Privacy	
  Policy	
  and	
  license	
  agreements	
  
•  Privacy	
  Laws	
  e.g.	
  HIPAA	
  or	
  EU	
  Privacy	
  DirecIve	
  	
  
•  AnonymizaSon	
  removing	
  personal	
  idenIfiers	
  
•  Technical	
  Details	
  e.g.	
  encrypIon	
  algorithm	
  
•  Details	
  on	
  Usage	
  how	
  different	
  data	
  are	
  used	
  
20	
  
What	
  Reduces	
  Privacy	
  
Concerns?	
  
Aggregation
Distortion
Sharing
Breach
Increase ConcernIncrease Concern
Technical details
Policy
Laws
Usage
Anonymization
200 100 0 100 200 300
Reduce ConcernReduce Concern
No Uncertain Yes
Aggregation
Technicaldetails
Policy
Laws
Usage
Anonymization
200 100 0 100 200 300
ReduceConcernReduceConcern
AnonymizaIon	
  
Usage	
  
Laws	
  
Policy	
  
Technical	
  
details	
  
#	
  responses	
  
21	
  
Selected	
  QualitaSve	
  Feedback	
  
Period	
  and	
  
amount	
  of	
  data	
  
Easy,	
  fine-­‐grained	
  control	
  
over	
  data	
  “It	
  should	
  be	
  
possible	
  to	
  disagree	
  with	
  
certain	
  terms”	
  
CerSficaSon	
  from	
  independent	
  
trusted	
  organizaSons	
  	
  
“A	
  privacy	
  police	
  to	
  check	
  how	
  
data	
  is	
  handled”“privacy	
  audits”	
  	
  
Transparency	
  
and	
  open	
  source	
  
22	
  
CriScality	
  of	
  Different	
  Types	
  of	
  Data	
  
Metadata
Interaction
Preferences
Location
Personal Data
Content
200 100 0 100
Metadata
Interaction
Preferences
Location
Personal Data
Content
200 100 0 100200 100 0 100
Very Critical Critical Neutral Somewhat Uncritical Uncritical 23	
  
Give	
  up	
  Privacy?	
  
•  Monetary	
  discounts	
  (e.g.,	
  10%	
  discount	
  on	
  
the	
  next	
  purchase)	
  
•  “Intelligent”	
  or	
  added	
  funcSonality	
  (such	
  as	
  
the	
  Amazon	
  recommendaIons)	
  
•  Fewer	
  adverSsements	
  
24	
  
Would	
  you	
  Give	
  up	
  Privacy	
  for…?	
  
#responses
Ads
Money
Functionality
200 100 0 100 #responses200 100 0 100 #responses
# responses
Ads
Money
Functionality
200 100 0 100 # responses200 100 0 100 # responses
No Uncertain Yes
FuncIonality	
  
Money	
  
Ads	
  
25	
  
PercepSons	
  of	
  
Developers	
  vs.	
  Users	
  
Developers	
   Users	
  
Concerns	
  about	
  
data	
  distorSon	
  
and	
  aggregaSon	
  
Low	
   High	
  
MiSgaSng	
  
privacy	
  concerns	
  
AnonymizaIon	
  &	
  
usage	
  details	
  
AnonymizaIon,	
  usage	
  
details,	
  policies	
  &	
  laws	
  
equally	
  effecIve	
  
26	
  
PercepSons	
  Based	
  on	
  
Geography	
  
North	
  America	
   Europe	
  
MiSgaSng	
  privacy	
  
concerns	
  
Usage	
  details,	
  laws,	
  
and	
  policies	
  equally	
  
effecIve	
  
Usage	
  details	
  
Data	
  criScality	
   Low	
   High	
  
Give	
  up	
  privacy	
  for	
  
funcSonality?	
  
More	
  likely	
   Less	
  likely	
  
27	
  
Outline	
  of	
  the	
  Talk	
  
ImplicaSons	
  
Study	
  Design	
  
Results	
  
MoSvaSon	
  
2	
  
1	
  
3	
  
4	
  
28	
  
Biggest	
  Privacy	
  Concerns	
  
29	
  
"Kathy	
  Simon	
  -­‐	
  originally	
  posted	
  to	
  Flickr	
  as	
  Viola	
  and	
  Mina	
  share	
  food"	
  
Privacy	
  by	
  Security	
  
30	
  
Towards	
  a	
  Privacy	
  Framework	
  
•  AnonymizaIon	
  
•  Data	
  usage	
  details	
  
•  Fine-­‐grained	
  control	
  over	
  data	
  
•  Metadata	
  and	
  interacIon	
  data	
  first	
  
•  Time	
  and	
  space	
  limited	
  storage	
  
•  Privacy	
  “licenses”	
  
31	
  
Privacy	
  InterpretaSon	
  Gaps	
  
32	
  
Privacy?	
  Who	
  Cares!	
  
33	
  
Us	
  and	
  Them:	
  	
  
A	
  Study	
  of	
  Privacy	
  Requirements	
  Across	
  
North	
  America,	
  Asia,	
  and	
  Europe	
  
Swapneel	
  Sheth,	
  Gail	
  Kaiser,	
  Walid	
  Maalej	
  
Columbia	
  University,	
  University	
  of	
  Hamburg	
  
@swapneel	
  	
  	
  	
  @maalejw	
  	
  	
  	
  bit.ly/privacy-­‐requirements	
  34	
  

More Related Content

What's hot

Mi0040 technology management
Mi0040  technology managementMi0040  technology management
Mi0040 technology management
smumbahelp
 

What's hot (7)

Pitfalls and Countermeasures in Software Quality Measurements and Evaluations
Pitfalls and Countermeasures in Software Quality Measurements and EvaluationsPitfalls and Countermeasures in Software Quality Measurements and Evaluations
Pitfalls and Countermeasures in Software Quality Measurements and Evaluations
 
Building Trust in
Building Trust in Building Trust in
Building Trust in
 
Mindtrek 2015 - Tampere Finland
Mindtrek 2015 - Tampere Finland Mindtrek 2015 - Tampere Finland
Mindtrek 2015 - Tampere Finland
 
Mi0040 technology management
Mi0040  technology managementMi0040  technology management
Mi0040 technology management
 
SE_Lec 10_ Software Code of Ethics
SE_Lec 10_ Software Code of EthicsSE_Lec 10_ Software Code of Ethics
SE_Lec 10_ Software Code of Ethics
 
OpenStack: The Platform of Choice for Cloud [Infographic]
OpenStack: The Platform of Choice for Cloud [Infographic]OpenStack: The Platform of Choice for Cloud [Infographic]
OpenStack: The Platform of Choice for Cloud [Infographic]
 
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based Approach
 

Viewers also liked

How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...
Walid Maalej
 
Invited Talk at TU Graz
Invited Talk at TU GrazInvited Talk at TU Graz
Invited Talk at TU Graz
Walid Maalej
 
Intention-Based Integration of Software Engineering Tools
Intention-Based Integration of Software Engineering ToolsIntention-Based Integration of Software Engineering Tools
Intention-Based Integration of Software Engineering Tools
Walid Maalej
 
2012 icse program comprehension
2012 icse program comprehension2012 icse program comprehension
2012 icse program comprehension
Walid Maalej
 

Viewers also liked (10)

Help! I need an empirical study for my PhD!
Help! I need an empirical study for my PhD!Help! I need an empirical study for my PhD!
Help! I need an empirical study for my PhD!
 
On the Socialness of Software
On the Socialness of SoftwareOn the Socialness of Software
On the Socialness of Software
 
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Revi...
 
User Involvement in Software Evolution Practice: A Case Study
User Involvement in Software Evolution Practice: A Case StudyUser Involvement in Software Evolution Practice: A Case Study
User Involvement in Software Evolution Practice: A Case Study
 
Invited Talk at TU Graz
Invited Talk at TU GrazInvited Talk at TU Graz
Invited Talk at TU Graz
 
Intention-Based Integration of Software Engineering Tools
Intention-Based Integration of Software Engineering ToolsIntention-Based Integration of Software Engineering Tools
Intention-Based Integration of Software Engineering Tools
 
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
Assisting Engineers in Switching Artifacts by using Task Semantic and Interac...
 
Msr14 tutorial 4upload
Msr14 tutorial 4uploadMsr14 tutorial 4upload
Msr14 tutorial 4upload
 
2012 icse program comprehension
2012 icse program comprehension2012 icse program comprehension
2012 icse program comprehension
 
Context aware software engineering and maintenance: the FastFix approach
Context aware software engineering and maintenance: the FastFix approachContext aware software engineering and maintenance: the FastFix approach
Context aware software engineering and maintenance: the FastFix approach
 

Similar to Us and Them — A Study of Privacy Requirements Across North America, Asia, and Europe (ICSE 2014 Paper)

How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
Neo4j
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
 

Similar to Us and Them — A Study of Privacy Requirements Across North America, Asia, and Europe (ICSE 2014 Paper) (20)

Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsSecuring SharePoint, OneDrive, & Teams with Sensitivity Labels
Securing SharePoint, OneDrive, & Teams with Sensitivity Labels
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknowns
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Privacy: Regulatory Pressure is the Consequence of a Broader Problem
Privacy: Regulatory Pressure is the Consequence of a Broader ProblemPrivacy: Regulatory Pressure is the Consequence of a Broader Problem
Privacy: Regulatory Pressure is the Consequence of a Broader Problem
 
Web Analytics and Privacy
Web Analytics and Privacy Web Analytics and Privacy
Web Analytics and Privacy
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
Designing the privacy user experience experience dynamics web seminar
Designing the privacy user experience  experience dynamics web seminarDesigning the privacy user experience  experience dynamics web seminar
Designing the privacy user experience experience dynamics web seminar
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
 
GDPR: Leverage the Power of Graphs
GDPR: Leverage the Power of GraphsGDPR: Leverage the Power of Graphs
GDPR: Leverage the Power of Graphs
 
How To Harness First-Party Data & Win In A Cookieless Future
How To Harness First-Party Data & Win In A Cookieless FutureHow To Harness First-Party Data & Win In A Cookieless Future
How To Harness First-Party Data & Win In A Cookieless Future
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research
 
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
 
Slides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data GovernanceSlides: Taking an Active Approach to Data Governance
Slides: Taking an Active Approach to Data Governance
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
 

More from Walid Maalej

05 Making Tacit Requirements Explicit
05 Making Tacit Requirements Explicit05 Making Tacit Requirements Explicit
05 Making Tacit Requirements Explicit
Walid Maalej
 
10 A Machine Learning Approach for Identifying Expert Stakeholders
10 A Machine Learning Approach for Identifying Expert Stakeholders10 A Machine Learning Approach for Identifying Expert Stakeholders
10 A Machine Learning Approach for Identifying Expert Stakeholders
Walid Maalej
 
12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...
12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...
12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...
Walid Maalej
 
08 Domain KnowledgeWiki for Requirements Elicitation
08 Domain KnowledgeWiki for Requirements Elicitation08 Domain KnowledgeWiki for Requirements Elicitation
08 Domain KnowledgeWiki for Requirements Elicitation
Walid Maalej
 
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
Walid Maalej
 
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
Walid Maalej
 
01 Using Defect Reports to Build Requirements Knowledge in Product Lines
01 Using Defect Reports to Build Requirements Knowledge in Product Lines01 Using Defect Reports to Build Requirements Knowledge in Product Lines
01 Using Defect Reports to Build Requirements Knowledge in Product Lines
Walid Maalej
 
07 Modeling and Managing Tacit Product Line Requirements Knowledge
07 Modeling and Managing Tacit Product Line Requirements Knowledge07 Modeling and Managing Tacit Product Line Requirements Knowledge
07 Modeling and Managing Tacit Product Line Requirements Knowledge
Walid Maalej
 
14 Reasoning on Requirements Knowledge to Support Creativity
14 Reasoning on Requirements Knowledge to Support Creativity14 Reasoning on Requirements Knowledge to Support Creativity
14 Reasoning on Requirements Knowledge to Support Creativity
Walid Maalej
 
03 How to Keep Domain Requirements Models Reasonably Sized
03 How to Keep Domain Requirements Models Reasonably Sized03 How to Keep Domain Requirements Models Reasonably Sized
03 How to Keep Domain Requirements Models Reasonably Sized
Walid Maalej
 
00 Opening: Why MaRK
00 Opening: Why MaRK00 Opening: Why MaRK
00 Opening: Why MaRK
Walid Maalej
 
04 The Papyrus tool as an Eclipse UML2-modeling environment for requirements
04 The Papyrus tool as an Eclipse UML2-modeling environment for requirements04 The Papyrus tool as an Eclipse UML2-modeling environment for requirements
04 The Papyrus tool as an Eclipse UML2-modeling environment for requirements
Walid Maalej
 
09 On Presuppositions in Requirements
09 On Presuppositions in Requirements09 On Presuppositions in Requirements
09 On Presuppositions in Requirements
Walid Maalej
 
Team Weaver Demo Camp June 08
Team Weaver Demo Camp June 08Team Weaver Demo Camp June 08
Team Weaver Demo Camp June 08
Walid Maalej
 
Potential And Challenges of Recommendation Systems for Software Development
Potential And Challenges of Recommendation Systems for Software DevelopmentPotential And Challenges of Recommendation Systems for Software Development
Potential And Challenges of Recommendation Systems for Software Development
Walid Maalej
 

More from Walid Maalej (18)

How Can Software Engineering Support AI
How Can Software Engineering Support AIHow Can Software Engineering Support AI
How Can Software Engineering Support AI
 
Can Development Work Describe Itself?
Can Development Work Describe Itself?Can Development Work Describe Itself?
Can Development Work Describe Itself?
 
05 Making Tacit Requirements Explicit
05 Making Tacit Requirements Explicit05 Making Tacit Requirements Explicit
05 Making Tacit Requirements Explicit
 
10 A Machine Learning Approach for Identifying Expert Stakeholders
10 A Machine Learning Approach for Identifying Expert Stakeholders10 A Machine Learning Approach for Identifying Expert Stakeholders
10 A Machine Learning Approach for Identifying Expert Stakeholders
 
12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...
12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...
12 Leveraging Rule Deviations in IT Ecosystems for Implicit Requirements Elic...
 
08 Domain KnowledgeWiki for Requirements Elicitation
08 Domain KnowledgeWiki for Requirements Elicitation08 Domain KnowledgeWiki for Requirements Elicitation
08 Domain KnowledgeWiki for Requirements Elicitation
 
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
11 Towards a Research Agenda for Recommendation Systems in Requirements Engin...
 
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
13 Continuous and Collaborative Validation: A Field Study of Requirements Kno...
 
01 Using Defect Reports to Build Requirements Knowledge in Product Lines
01 Using Defect Reports to Build Requirements Knowledge in Product Lines01 Using Defect Reports to Build Requirements Knowledge in Product Lines
01 Using Defect Reports to Build Requirements Knowledge in Product Lines
 
07 Modeling and Managing Tacit Product Line Requirements Knowledge
07 Modeling and Managing Tacit Product Line Requirements Knowledge07 Modeling and Managing Tacit Product Line Requirements Knowledge
07 Modeling and Managing Tacit Product Line Requirements Knowledge
 
14 Reasoning on Requirements Knowledge to Support Creativity
14 Reasoning on Requirements Knowledge to Support Creativity14 Reasoning on Requirements Knowledge to Support Creativity
14 Reasoning on Requirements Knowledge to Support Creativity
 
03 How to Keep Domain Requirements Models Reasonably Sized
03 How to Keep Domain Requirements Models Reasonably Sized03 How to Keep Domain Requirements Models Reasonably Sized
03 How to Keep Domain Requirements Models Reasonably Sized
 
00 Opening: Why MaRK
00 Opening: Why MaRK00 Opening: Why MaRK
00 Opening: Why MaRK
 
04 The Papyrus tool as an Eclipse UML2-modeling environment for requirements
04 The Papyrus tool as an Eclipse UML2-modeling environment for requirements04 The Papyrus tool as an Eclipse UML2-modeling environment for requirements
04 The Papyrus tool as an Eclipse UML2-modeling environment for requirements
 
09 On Presuppositions in Requirements
09 On Presuppositions in Requirements09 On Presuppositions in Requirements
09 On Presuppositions in Requirements
 
From Work To Word
From Work To WordFrom Work To Word
From Work To Word
 
Team Weaver Demo Camp June 08
Team Weaver Demo Camp June 08Team Weaver Demo Camp June 08
Team Weaver Demo Camp June 08
 
Potential And Challenges of Recommendation Systems for Software Development
Potential And Challenges of Recommendation Systems for Software DevelopmentPotential And Challenges of Recommendation Systems for Software Development
Potential And Challenges of Recommendation Systems for Software Development
 

Recently uploaded

Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
nirzagarg
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 

Recently uploaded (20)

"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 

Us and Them — A Study of Privacy Requirements Across North America, Asia, and Europe (ICSE 2014 Paper)

  • 1. Privacy?  Who  Cares!   Swapneel  Sheth,  Gail  Kaiser,  Walid  Maalej   @swapneel    @maalejw   1  
  • 2. Summary  of  the  Talk   Survey  comparing  how   developers  &  users  from   different  geographies   care  about  privacy   # responses Aggregation Distortion Sharing Breach Increase ConcernIncrease Concern Technical details Policy Laws Usage Anonymization 200 100 0 100 200 300 400 Reduce ConcernReduce Concern No Uncertain Yes 2   Framework  with     guidelines  &  requirements   for  building  privacy-­‐aware   so:ware  system  
  • 5.
  • 8. Everybody  is  Talking  about   Privacy   How  about  the  Developers  and  Users?   8  
  • 9. Outline  of  the  Talk   ImplicaSons   Study  Design   Results   MoSvaSon   2   1   3   4   9  
  • 10. Research  QuesSons  1/2   1.  What  are  developers’  and   users’  percepSons  of  privacy?   2.  Which  privacy  concerns  are   more  important?   10  
  • 11. Research  QuesSons  2/2   3.  What  are  the  best  techniques     to  address  these  aspects?   4.  Does  geography  have  any     impact  on  privacy  requirements?   11  
  • 12. Research  Method:  Online  Survey   •  Nov  2012  -­‐  Sep  2013   •  About  10  minutes   •  14  closed  quesIons     •  2  open  quesIons   •  English  and  German   12  
  • 13. SemanSc  Scale  for  the  Answer   OpSons   13  
  • 14. Research  Reliability  &  Validity   Pilot  tesIng   Random  order  of  answers   ValidaIon  quesIons   Post  sampling   Summaries  generalizable  to  populaIons   DifferenIal  analysis  with  significant  results   ! 14  
  • 15. 408  Valid  Responses  (out  of  595)   Developers   Users   North  America   85   44   Europe   116   65   Asia/Pacific   61   30   15  
  • 16. Outline  of  the  Talk   ImplicaSons   Study  Design   Results   MoSvaSon   2   1   3   4   16  
  • 17. Privacy  Concerns   Data  AggregaSon     AggregaIon  of  user   data  over  long   period  of  Ime   Data  DistorSon   MisrepresentaIon   of  the  data  or  user   intent   Data  Sharing   Collected  data  given  to   third  parIes  e.g.  for   adverIsing   Data  Breaches   Malicious  users  get   access  to  sensiIve   data   17  
  • 18. What  Increases  Privacy  Concerns?   Aggregation Distortion Sharing Breach IncreaseConcernIncreaseConcern ReduceConcernReduceConcern #respon Aggregation Distortion Sharing Breach IncreaseConcernIncreaseConcern Technicaldetails Policy Laws Usage Anonymization 200 100 0 100 200 300 400 ReduceConcernReduceConcern No Uncertain Yes Breach   Sharing   DistorIon   AggregaIon   #  responses   18  
  • 19. Selected  QualitaSve  Feedback   AuthoriSes  and   intelligent  services   “Anyway  there  is  prism”   Unusable  and  non-­‐ transparent  policies   Lack  of  control   APIs,  correctness  &  viruses   “Privacy  concerns  are   transmiZed  through  APIs”   19  
  • 20. Reducing  Privacy  Concerns   •  Privacy  Policy  and  license  agreements   •  Privacy  Laws  e.g.  HIPAA  or  EU  Privacy  DirecIve     •  AnonymizaSon  removing  personal  idenIfiers   •  Technical  Details  e.g.  encrypIon  algorithm   •  Details  on  Usage  how  different  data  are  used   20  
  • 21. What  Reduces  Privacy   Concerns?   Aggregation Distortion Sharing Breach Increase ConcernIncrease Concern Technical details Policy Laws Usage Anonymization 200 100 0 100 200 300 Reduce ConcernReduce Concern No Uncertain Yes Aggregation Technicaldetails Policy Laws Usage Anonymization 200 100 0 100 200 300 ReduceConcernReduceConcern AnonymizaIon   Usage   Laws   Policy   Technical   details   #  responses   21  
  • 22. Selected  QualitaSve  Feedback   Period  and   amount  of  data   Easy,  fine-­‐grained  control   over  data  “It  should  be   possible  to  disagree  with   certain  terms”   CerSficaSon  from  independent   trusted  organizaSons     “A  privacy  police  to  check  how   data  is  handled”“privacy  audits”     Transparency   and  open  source   22  
  • 23. CriScality  of  Different  Types  of  Data   Metadata Interaction Preferences Location Personal Data Content 200 100 0 100 Metadata Interaction Preferences Location Personal Data Content 200 100 0 100200 100 0 100 Very Critical Critical Neutral Somewhat Uncritical Uncritical 23  
  • 24. Give  up  Privacy?   •  Monetary  discounts  (e.g.,  10%  discount  on   the  next  purchase)   •  “Intelligent”  or  added  funcSonality  (such  as   the  Amazon  recommendaIons)   •  Fewer  adverSsements   24  
  • 25. Would  you  Give  up  Privacy  for…?   #responses Ads Money Functionality 200 100 0 100 #responses200 100 0 100 #responses # responses Ads Money Functionality 200 100 0 100 # responses200 100 0 100 # responses No Uncertain Yes FuncIonality   Money   Ads   25  
  • 26. PercepSons  of   Developers  vs.  Users   Developers   Users   Concerns  about   data  distorSon   and  aggregaSon   Low   High   MiSgaSng   privacy  concerns   AnonymizaIon  &   usage  details   AnonymizaIon,  usage   details,  policies  &  laws   equally  effecIve   26  
  • 27. PercepSons  Based  on   Geography   North  America   Europe   MiSgaSng  privacy   concerns   Usage  details,  laws,   and  policies  equally   effecIve   Usage  details   Data  criScality   Low   High   Give  up  privacy  for   funcSonality?   More  likely   Less  likely   27  
  • 28. Outline  of  the  Talk   ImplicaSons   Study  Design   Results   MoSvaSon   2   1   3   4   28  
  • 29. Biggest  Privacy  Concerns   29   "Kathy  Simon  -­‐  originally  posted  to  Flickr  as  Viola  and  Mina  share  food"  
  • 31. Towards  a  Privacy  Framework   •  AnonymizaIon   •  Data  usage  details   •  Fine-­‐grained  control  over  data   •  Metadata  and  interacIon  data  first   •  Time  and  space  limited  storage   •  Privacy  “licenses”   31  
  • 34. Us  and  Them:     A  Study  of  Privacy  Requirements  Across   North  America,  Asia,  and  Europe   Swapneel  Sheth,  Gail  Kaiser,  Walid  Maalej   Columbia  University,  University  of  Hamburg   @swapneel        @maalejw        bit.ly/privacy-­‐requirements  34