Advancing User-Centric Privacy: A Comprehensive Research Roadmap for Ethical and Secure Technology Development

Yashwitha Siyadri*, Sri Ram Deepak Akella**
* Department of Information and Technology, Pragati Engineering College, Surampalem, Andhra Pradesh, India.
** Department of Aerospace Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, Tamil Nadu, India.
Periodicity:July - September'2024

Abstract

The User-Centric Privacy Development Framework serves as a vital guide for addressing privacy concerns in technological initiatives. It promotes user-centered design principles alongside proactive data privacy and security measures, enabling the creation of technology that respects and safeguards user privacy. By emphasizing evidence- based decision-making, the framework helps determine optimal data collection practices, including the appropriate volume of data, relevant metadata, and accurate measurement intervals. This structured methodology integrates user input to balance technological advancements with personal information protection, particularly in mobile technologies and data collection contexts. It provides comprehensive guidance to support innovation in privacy-centric technologies, fostering trust and confidence in their adoption. The framework highlights ethical principles and responsible data practices, aiming to enhance transparency, choice, and consent while minimizing the collection and disclosure of sensitive information. By building a culture of privacy respect, it offers valuable direction to practitioners, developers, and policymakers, ensuring adherence to user-centric privacy principles.

Keywords

User-Centric Privacy, Research Roadmap, User-Centred Design, Proactive Data Privacy, Security Measures, Evidence-Based Decision-Making.

How to Cite this Article?

Siyadri, Y., and Akella, S. R. D. (2024). Advancing User-Centric Privacy: A Comprehensive Research Roadmap for Ethical and Secure Technology Development. i-manager’s Journal on Information Technology, 13(3), 44-59.

References

[2]. Agrafiotis, I. (2012). Enhancing User's Privacy: Developing a Model for Managing and Testing the Lifecycle of Consent and Revocation (Doctoral dissertation, University of Warwick).
[3]. Bax, M. P., & Barbosa, J. L. (2020, November). Proposta de mecanismo de consentimento na lei geral de proteção de dados-LGPD. Universidade Federal de Minas Gerais.
[4]. Biksham, V., & Vasumathi, D. (2017). Homomorphic encryption techniques for securing data in cloud computing: A survey. International Journal of Computer Applications, 160 (6), 1-5.
[6]. Burian, P. E., Rogerson, L., & Maffei III, F. R. (2010). The research roadmap: A primer to the approach and process. Contemporary Issues in Education Research, 3(8), 43-58.
[7]. Cavoukian, A. (2009). Privacy by Design: The 7 Foundational Principles. Information and Privacy Commissioner of Ontario, Canada.
[8]. Chugh, R. (2023). Data privacy and the legal implications of emerging technologies. Journal of Emerging Technologies and Innovative Research (JETIR), 10 (11), e219-e240.
[9]. Colesky, M., Hoepman, J. H., & Hillen, C. (2016, May). A critical analysis of privacy design strategies. In 2016 IEEE Security and Privacy Workshops (SPW) (pp. 33-40). IEEE.
[10]. Cranor, L. F. (2012). Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. Journal on Telecommunications and High Technology Law, 10, 273.
[14]. Kadam, S. (2018, March). Review of distributed ledgers: The technological advances behind cryptocurrency. In International Conference Advances in Computer Technology and Management (ICACTM) (pp. 1-5).
[18]. Nissenbaum, H. (2009). Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press.
[21]. Özkoç, E. E. (2021). Privacy Preserving Data Mining. ResearchGate.
[25]. Schaub, F., Balebako, R., Durity, A. L., & Cranor, L. F. (2015). A design space for effective privacy notices. In Eleventh Symposium on Usable Privacy and Security (SOUPS 2015) (pp. 1-17).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.