Loading...
Paper Type
ERF
Abstract
As drivers of innovation, digital technologies rely on comprehensive data availability while respecting data protection rights. Organizations must ensure compliance by integrating data protection into their operations, using both technological and organizational mechanisms, ideally during software development. Privacy patterns provide blueprints integrating data protection requirements into technology design. Numerous Privacy Patterns exist, but their wider application is limited by issues such as the lack of centralized provision and support for selecting relevant patterns, as well as the absence of evaluation and adaptation for practical usability. This work evaluates 13 developed Privacy Patterns within a case study, offering new insights for practical deployment and future development opportunities.
Paper Number
1170
Recommended Citation
Waidelich, Lukas and Schuster, Thomas, "Exploring the Maturity of Privacy Patterns: A Case Study" (2024). AMCIS 2024 Proceedings. 15.
https://aisel.aisnet.org/amcis2024/security/security/15
Exploring the Maturity of Privacy Patterns: A Case Study
As drivers of innovation, digital technologies rely on comprehensive data availability while respecting data protection rights. Organizations must ensure compliance by integrating data protection into their operations, using both technological and organizational mechanisms, ideally during software development. Privacy patterns provide blueprints integrating data protection requirements into technology design. Numerous Privacy Patterns exist, but their wider application is limited by issues such as the lack of centralized provision and support for selecting relevant patterns, as well as the absence of evaluation and adaptation for practical usability. This work evaluates 13 developed Privacy Patterns within a case study, offering new insights for practical deployment and future development opportunities.
When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.
Comments
SIGSEC