Abstract
This paper provides the results of the privacy impact assessment conducted for the PROACTIVE solutions and its subsequent privacy by design integration process. PROACTIVE is a solution for fostering coordination and communication between stakeholders before and during CBRNe events focusing on providing guidance to vulnerable populations. Based on extensive fieldwork activities with practitioners and vulnerable groups, the results of the analysis reveal the main risk focus, including the need to filter data by competent authorities (data controllers) and potential solutions for each of them, which allow establishing standard procedures for systems used in similar contexts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
This project has received funding from the European Union’s Horizon 2020 under Grant Agreement nº 832981.
References
Borking, J., Raab, C.: Laws, PETs and other technologies for privacy protection. J. Inf. Law Technol. (JILT), 1 (2001)
Bunker, D., Mirbabaie, M., Stieglitz, S.: Convergence behaviour of bystanders: an analysis of 2016 munich shooting twitter crisis communication. In: Proceedings of the Australasian Conference on Information Systems (2017)
Cavoukian, A.: Privacy by Design. The 7 Foundational Principles Implementation and Mapping of Fair Information Practices (2009). https://www.ipc.on.ca/wp-content/uploads/resources/pbd-implement-7found-principles.pdf
Chen, J., Wilkinson, D., Richardson, R.B., Waruszynski, B.: Issues, considerations and recommendations on emergency preparedness for vulnerable population groups. Radiat. Prot. Dosim. 134, 3–4, 132–135 (2009)
Galdon Clavell, G., Valbuena Leon, M.A., Zamorano M., Marsh, I.: Legal and ethical state-of-the-art on CBRNe preparedness and response. Deliverable D8.1 of the PROACTIVE project (2021)
Guberek, T., McDonald, A., Simioni, S., Mhaidli, A.H., Toyama, K., Schaub, F.: Keeping a low profile? Technology, risk and privacy among undocumented immigrants. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, New York, NY, pp. 114:1–114:15. CHI (2018)
Hansen, M.: Top 10 mistakes in system design from a privacy perspective and privacy protection goals. In: Camenisch, J., Crispo, B., Fischer-Hübner, S., Leenes, R., Russello, G. (eds.) Privacy and Identity Management for Life. Privacy and Identity 2011. IFIP AICT, vol. 375, pp. 14–31. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31668-5_2
Heurix, J., Zimmermann, P., Neubauer, T., Fenz, S.: A taxonomy for privacy enhancing technologies. Comput. Secur. 53, 1–17 (2015)
Hignett, S., Hancox, G., Edmunds Otter, M.: Chemical, biological, radiological, nuclear and explosive (CBRNe) events: systematic literature review of evacuation, triage and decontamination for vulnerable people. Int. J. Emerg. Serv. 8(2), 175–190 (2019)
Jillson, I.A.: Ethical frameworks for CBRNE crises: toward shared concepts and their practical application. In: O’Mathúna, D., de Miguel Beriain, I. (eds.) Ethics and Law for Chemical, Biological, Radiological, Nuclear & Explosive Crises. The International Library of Ethics, Law and Technology, vol. 20, pp. 53–64. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11977-5_5
Kolev, G., Markarian, G., Polushkina, N.: Deliverable 4.1. Report on the High-level Architecture design including an interface control document. PROACTIVE (2021). https://proactive-h2020.eu/wp-content/uploads/2021/04/PROACTIVE_20210312_D4.1_V6_RINI_Report-on-the-high-level-architecture-design_revised.pdf
Lambert, P.: The Data Protection Officer: Profession, Rules, and Role. CRC Press, Boca Raton (2016)
Marwick, A., Fontaine, C., Boyd, D.: “Nobody sees it, nobody gets mad”: social media, privacy, and personal responsibility among low-SES youth. Soc. Media Soc. 3(2) (2017)
McDonald, N., Forte, A.: Privacy and vulnerable populations. In: Knijnenburg, B.P., Page, X., Wisniewski, P., Lipford, H.R., Proferes, N., Romano, J. (eds.) Modern Socio-Technical Perspectives on Privacy, pp. 337–363. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-82786-1_15)
Nicholson, W., et al.: Report on the Workshop with Vulnerable Citizens. Deliverable D3.3 of the PROACTIVE project (2021). https://www.researchgate.net/publication/360106969_CBRNe_toolkit_for_policy_makers_integrating_vulnerable_groups_in_preparedness_and_response. Accessed 28 July 2022
Nissenbaum, H.: Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law Books (2010)
Petersen, L., Havarneanu, G., Markarian, G., McCroneline, N.: CBRNe and vulnerable citizens: co-creating an app for that. In: 2019 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM), pp. 1–4. IEEE (2019)
Rubinstein, I., Good, N.: Privacy by design: a counterfactual analysis of google and Facebook privacy incident. Berkeley Technol. Law J., 1333 (2012). NYU School of Law, Public Law Research Paper No. 12–43
Toohey, K., Taylor, T.: Surveillance and securitization: a forgotten sydney olympic legacy. Int. Rev. Sociol. Sport. 47(3), 324–337 (2012)
Urban, J.M., Hoofnagle, C.J.: The privacy pragmatic as privacy vulnerable. Technical report #ID 2514381. Social Science Research Network (2014)
Urruela Mora, A.: The current legal framework on data protection in CBRNE crises: a general exposition. In: O’Mathúna, D.P., de Miguel Beriain, I. (eds.) Ethics and Law for Chemical, Biological, Radiological, Nuclear & Explosive Crises. TILELT, vol. 20, pp. 147–161. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11977-5_12
Wright, D., De Hert, P. (eds.): Privacy Impact Assessment. Springer, Dordrecht (2012). https://doi.org/10.1007/978-94-007-2543-0
Zamorano, M., Suarez Gonzalo, S., Clavell Galdon, G.: Legal and acceptability recommendations for PROACTIVE toolkit. Deliverable D8.2 of the PROACTIVE project (2021). https://www.researchgate.net/publication/360106969_CBRNe_toolkit_for_policy_makers_integrating_vulnerable_groups_in_preparedness_and_response
Zannettou, S., Sirivianos, M., Blackburn, J., Kourtellis, N.: The web of false information: rumors, fake news, hoaxes, clickbait, and various other shenanigans. Data Inf. Qual. 11(3) (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 IFIP International Federation for Information Processing
About this paper
Cite this paper
Zamorano, M.M., Newton, N., Bertelli, V., Petersen, L. (2023). Privacy by Design in CBRN Technologies Targeted to Vulnerable Groups: The Case of PROACTIVE. In: Gjøsæter, T., Radianti, J., Murayama, Y. (eds) Information Technology in Disaster Risk Reduction. ITDRR 2022. IFIP Advances in Information and Communication Technology, vol 672. Springer, Cham. https://doi.org/10.1007/978-3-031-34207-3_16
Download citation
DOI: https://doi.org/10.1007/978-3-031-34207-3_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-34206-6
Online ISBN: 978-3-031-34207-3
eBook Packages: Computer ScienceComputer Science (R0)