skip to main content
10.1145/2702123.2702142acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Playing the Legal Card: Using Ideation Cards to Raise Data Protection Issues within the Design Process

Authors Info & Claims
Published:18 April 2015Publication History

ABSTRACT

The regulatory climate is in a process of change. Design, having been implicated for some time, is now explicitly linked to law. This paper recognises the heightened role of designers in the regulation of ambient interactive technologies. Taking account of incumbent legal requirements is difficult. Legal rules are convoluted, uncertain, and not geared towards operationalisable heuristics or development guidelines for system designers. Privacy and data protection are a particular moral, social and legal concern for technologies. This paper seeks to understand how to make emerging European data protection regulation more accessible to our community. Our approach develops and tests a series of data protection ideation cards with teams of designers. We find that, whilst wishing to protect users, regulation is viewed as a compliance issue. Subsequently we argue for the use of instruments, such as our cards, as a means to engage designers in leading a human-centered approach to regulation.

References

  1. Ambrose, M., Ausloos, J. The Right to be Forgotten Across the Pond. J Inform Pol, 3, 1--23. (2013)Google ScholarGoogle ScholarCross RefCross Ref
  2. Are you a Data Controller? At http://www.dataprotection.ie/docs/Are-you-a-DataController-/43.htmGoogle ScholarGoogle Scholar
  3. Attride-Stirling, J. Thematic networks: an analytic tool for qualitative research. Qual Res. 1, 3 (2001) 385--405Google ScholarGoogle ScholarCross RefCross Ref
  4. Barnard-Wills, D. Privacy Game. http://surveillantidentity.blogspot.co.uk/p/privacy-cardgame.htmlGoogle ScholarGoogle Scholar
  5. Bernal, P. The EU, the US and the Right to be Forgotten In Gutwirth, S. Leenes, R. and De Hert, P. {Eds} Reloading Data Protection Multidisciplinary Insights and Contemporary Challenges' Springer, 2014Google ScholarGoogle Scholar
  6. Black J 'Decentring Regulation: Understanding the Role of Regulation and Self-regulation in a 'Post- Regulatory' World' (2001) 54 Current Legal Problems 103Google ScholarGoogle Scholar
  7. Brownsword, R., Yeung, K. (eds), Regulating Technologies: Legal Futures, Regulatory Frames and Technological Fixes. Hart Publishing, 2008Google ScholarGoogle Scholar
  8. Camp, J. and Connelly, K. Beyond Consent: Privacy in Ubicomp Systems in Digital Privacy: Theory, Technologies and Practices (2007)Google ScholarGoogle Scholar
  9. Cavoukian, A, Privacy by Design: The 7 Foundational Principles, IPCO, 2011Google ScholarGoogle Scholar
  10. Dourish, P., Bell, G. Divining a Digital Future: Mess and Mythology in Ubiquitous Computing. MIT Press, 2011 Google ScholarGoogle ScholarCross RefCross Ref
  11. Druschel, P. The Right to Be Forgotten - Between Expectations and Promise, ENISA 2012Google ScholarGoogle Scholar
  12. Feick, R. & Werle, R. Regulation of Cyberspace. In Baldwin, R., Cave, M., & Lodge, M. {eds} The Oxford Handbook of Regulation. OUP, 2010, 523--547Google ScholarGoogle Scholar
  13. Friedman, B. & Hendry, D. The envisioning cards: a toolkit for catalyzing humanistic and technical imaginations. In Proc. CHI'12 ACM (2012) Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Friedman, B. Lin, P. Miller, J.K. Informed Consent by Design in Cranor, L.F. and Garfinkel, S. (Eds) Security and Usability. O'Reilly Media Inc (2005) 503--529Google ScholarGoogle Scholar
  15. Golembewski, M. Selby, M. Ideation decks: a cardbased design ideation tool. Proc. DIS'10. ACM Press Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. IDEO. Method Cards for IDEO: 51 Card Deck to Inspire Design. At http://www.ideo.com/work/methodcardsGoogle ScholarGoogle Scholar
  17. ICO on Privacy by Design, 2014 http://ico.org.uk/for_organisations/data_protection/topic_guides/privacy_by_designGoogle ScholarGoogle Scholar
  18. Langheinrich, M. A Privacy Awareness System for Ubiquitous Computing Environments. In Lecture Notes in Computer Science 2498, Springer 237--245 (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Leenes, R "Framing Techno-Regulation: An Exploration of State and Non-State Regulation By Technology" Legisprudence, 2011, Vol. 5 No. 2, 143--169Google ScholarGoogle ScholarCross RefCross Ref
  20. Lessig, L. Code V2.0. Basic Books, 2006Google ScholarGoogle Scholar
  21. Luger, E. & Rodden, T. An informed view on consent for UbiComp. In Proc. UbiComp '13. ACM (2013), 529--538 Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Luger, E. Rodden, T. Terms of Agreement: Rethinking Consent for Pervasive Computing Interact Comput 25.2 (2013)Google ScholarGoogle Scholar
  23. Lynskey, O. Rising Like a Phoenix: The Right to Be Forgotten Before the ECJ European Law Blog (2014)Google ScholarGoogle Scholar
  24. Mackay, W. The Interactive Thread: Exploring Methods for Multi-disciplinary Design In Proc. DIS'04. ACM (2004) Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Manson, C G. and Gorniak, S. Recommendations for a methodology of the assessment of severity of personal data breaches, ENISA, 2013Google ScholarGoogle Scholar
  26. Mayntz, R. The Changing Governance of Large Technical Infrastructure Systems in: Mayntz, R. (ed.): Über Governance. In Stitutionen und Prozesse politischer Regelung, Schriften aus dem Max-PlanckInstitut für Gesellschaftsfor-schung, Campus (2009), 121--150Google ScholarGoogle Scholar
  27. OECD. The OECD Privacy Framework. OECD Publishing (2013)Google ScholarGoogle Scholar
  28. Stahl, B.C. Responsible research and innovation: The role of privacy in an emerging framework. Science and Public Policy, 2013, 40 (6), pp. 708--716Google ScholarGoogle ScholarCross RefCross Ref
  29. Smith, D. One small step for EU Parliament could prove one giant leap for data protection. ICO. At. http://ico.org.uk/news/blog/2013/one-small-step-for-euparliament (accessed 13.03.14)Google ScholarGoogle Scholar
  30. The Security Cards. At http://securitycards.cs.washington.edu/index.htmlGoogle ScholarGoogle Scholar
  31. C-131/12 Google Spain v AEPD and Mario Costeja GonzalezGoogle ScholarGoogle Scholar
  32. US Federal Trade Commission, Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers, 2012 pp. 22--32Google ScholarGoogle Scholar
  33. Yeung K. Design for Regulation in J van Den Hoven et al (Eds) Handbook of Ethics, Values and Technological Design, Springer, 2014.Google ScholarGoogle Scholar

Index Terms

  1. Playing the Legal Card: Using Ideation Cards to Raise Data Protection Issues within the Design Process

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
      April 2015
      4290 pages
      ISBN:9781450331456
      DOI:10.1145/2702123

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 18 April 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CHI '15 Paper Acceptance Rate486of2,120submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

      Upcoming Conference

      CHI '24
      CHI Conference on Human Factors in Computing Systems
      May 11 - 16, 2024
      Honolulu , HI , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader