Privacy Risk Assessment: From Art to Science, By Metrics

Privacy risk assessments aim to analyze and quantify the privacy risks associated with new systems. As such, they are critically important in ensuring that adequate privacy protections for individual users are built in. However, current methods to quantify privacy risk rely heavily on experienced analysts who pick the "correct" risk level on a five-point scale. In this paper, we argue that a more scientific quantification of privacy risk increases accuracy and reliability and can thus make it easier to build privacy-friendly systems. We discuss how the impact and likelihood of privacy violations can be quantified and stress the importance of meaningful units of measurement. Finally, we argue that privacy risk metrics should be expressed as distributions instead of average values.

[1]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[2]  Katrine Evans Vidal-Hall and Risk Management for Privacy Breaches , 2015, IEEE Security & Privacy.

[3]  Naomi B. Lefkovitz,et al.  An Introduction to Privacy Engineering and Risk Management in Federal Systems , 2017 .

[4]  A. Calder,et al.  IT Governance: An International Guide to Data Security and ISO27001/ISO27002 , 2003 .

[5]  S S Stevens,et al.  On the Theory of Scales of Measurement. , 1946, Science.

[6]  Evimaria Terzi,et al.  A Framework for Computing the Privacy Scores of Users in Online Social Networks , 2009, ICDM.

[7]  Joint Task Force Transformation Initiative Guide for Conducting Risk Assessments , 2012 .

[8]  Daniel J. Solove A Taxonomy of Privacy , 2006 .

[9]  Wenke Lee,et al.  The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads , 2016, NDSS.

[10]  Norman M. Sadeh,et al.  Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.

[11]  Isabel Wagner,et al.  Evaluating the Strength of Genomic Privacy Metrics , 2016, ACM Trans. Priv. Secur..

[12]  Wouter Joosen,et al.  A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.

[13]  David Eckhoff,et al.  Metrics : a Systematic Survey , 2018 .

[14]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[15]  Ronald S. Ross,et al.  Guide for Conducting Risk Assessments , 2012 .

[16]  Isabel Wagner,et al.  Privacy in the Smart City—Applications, Technologies, Challenges, and Solutions , 2018, IEEE Communications Surveys & Tutorials.

[17]  Rogério de Lemos,et al.  Risks of Sharing Cyber Incident Information , 2018, ARES.