An approach to early evaluation of informational privacy requirements

The widespread availability of information in the digital age places a significant demand on the privacy needs of individuals. However, privacy considerations in requirements management are often treated as non-functional concerns and in particular, early feedback of privacy concerns is not easily embedded into current requirements practice. Luciano Floridi's Ontological Theory of Informational Privacy presents an extensive interpretation of informational privacy using concepts such as ontological friction. This paper first recasts the theory in terms of modelling constructs and then applies the theory in the form of a Bayesian network of beliefs in the context of an existing research project aimed at developing socio-technical system delivered as a mobile app in the UK youth justice system. The operationalisation of the theory and its relationship to value sensitive design creates opportunities for early evaluation of informational privacy concerns in the requirements process.

[1]  Barry W. Boehm,et al.  Value-based software engineering: reinventing , 2003, SOEN.

[2]  L. Floridi The Ontological Interpretation of Informational Privacy , 2005, Ethics and Information Technology.

[3]  Tony Clark,et al.  A Domain Specific Language for Contextual Design , 2010, HCSE.

[4]  E. Sanders Generative Tools for Co-designing , 2000 .

[5]  M. Kyng,et al.  Computers and Democracy: A Scandinavian Challenge , 1987 .

[6]  Jill Palzkill Woelfer,et al.  A value sensitive action-reflection model: evolving a co-design space with stakeholder and designer prompts , 2013, CHI.

[7]  S. L. Star,et al.  Social science, technical systems, and cooperative work: beyond the great divide , 1999 .

[8]  Martin Gogolla Unified Modeling Language , 2009, Encyclopedia of Database Systems.

[9]  Barry W. Boehm Value-based software engineering: reinventing , 2003, SOEN.

[10]  Lakhmi C. Jain,et al.  Introduction to Bayesian Networks , 2008 .

[11]  L. Suchman Do categories have politics? The language/action perspective reconsidered , 1993 .

[12]  Helen Nissenbaum,et al.  Bias in computer systems , 1996, TOIS.

[13]  Alan Borning,et al.  Value Sensitive Design and Information Systems , 2020, The Ethics of Information Technologies.

[14]  Andrew Sears,et al.  Human-Computer Interaction: Development Process , 2009 .

[15]  John Muncie,et al.  Youth Crime and Justice: Critical Issues , 2006 .

[16]  Finn Verner Jensen,et al.  Introduction to Bayesian Networks , 2008, Innovations in Bayesian Networks.

[17]  Batya Friedman,et al.  Value-sensitive design , 1996, INTR.

[18]  Lucas D. Introna Privacy and the computer: why we need privacy in the information society , 1997 .

[19]  David Smith Youth crime and justice : research, evaluation and 'evidence'. , 2006 .

[20]  Kecheng Liu Virtual, Distributed and Flexible Organisations - Studies in Organisational Semiotics , 2004 .

[21]  L. Floridi OPEN PROBLEMS IN THE PHILOSOPHY OF INFORMATION , 2004 .

[22]  Michael J. Muller,et al.  Participatory design: the third space in HCI , 2002 .

[23]  L. Floridi Four challenges for a theory of informational privacy , 2006, Ethics and Information Technology.