AnoSiDat

While anonymization is surely no panacea and should be used cautiously, I believe that it can be beneficial when its usage is embedded into a broader privacy engineering approach.Therefore, I was very happy, when I was invited to participate in the AnoSiDat congress to discuss anonymization and secure data usage. The congress took place on…

Continue reading →

Privacy Engineering From Principles to Practice: A Roadmap

Recently, I had the chance to collaborate with great group of privacy engineering experts. In our collaboration, we investigated factors that hamper the adoption of privacy engineering primitives, methods and strategies in real-world information systems. In particular, we identified the following four tactics to foster adoption: You can read all the details in our paper….

Continue reading →

Europäischer Datenschutztag / European Data Protection Day

Today, for a change, in German and English. Heute ist der 18. Europäische Datenschutztag – ein guter Anlass, sich die grundlegende Funktion des Datenschutzes und der Privatheit in freiheitlichen, offenen Gesellschaften ins Gedächtnis zu rufen. Umso mehr, als diese in und außerhalb Europas von multiplen Krisen und ihren Feinden im Inneren wie Äußeren so stark…

Continue reading →

New Paper on Data Ecosystems and Digital Trust

Fabian Schäfer, Jeremy Rosen, Felix Wortmann and I teamed up to write “Unleashing The Potential of Data Ecosystems: Establishing Digital Trust through Trust-Enhancing Technologies“, which was was presented at ECIS 2023. In the article, we apply the theory of system trust and investigate the potential of technology to strengthen trust in data ecosystems. In particular, we…

Continue reading →

The Reverse Privacy Paradox

There is a very interesting (and fun to read) new paper on the “reverse privacy paradox”, authored by Jessica Colnago, Lorrie Cranor and Alessandro Acquisti. The authors investigate whether there is a reverse privacy paradox, i.e., a mismatch between participants’ dismissive perspectives on privacy and their privacy-protective behaviors In fact, I found the paper so well-written…

Continue reading →