In practice, consent is often conceptualized as a coarse-grained procedural necessity, implemented as a once-off act. This can result in a misalignment between the consent given by an individual, and the desired data access. Consent should form part of the security process. We are developing techniques to help better understand and manage consent, and thereby provide assurance to the data processor that consent is adequately addressed in any data access or other data activity.
- Rooney, V. M., & Foley, S. N. (2018). On online consent maturity model: moving from acceptable use towards ethical practice. In New Security Paradigms Workshop (NSPW 2018). ACM press. Retrieved from http://simonfoley.org/pubs/nspw2018.pdf [link]
- Foley, S. N., & Rooney, V. M. (2018). A Grounded Theory approach to security policy elicitation. Information and Computer Security Journal, 26(4), 454–471. https://doi.org/10.1108/ICS-12-2017-0086 [link]
- Rooney, V. M., & Foley, S. N. (2017). What users want: adapting qualitative research methods to security policy requirements elicitation. In Proceedings of the International Workshop on Security and Privacy Requirements Engineering, SECPRE 2017. Retrieved from http://simonfoley.org/pubs/secpre2017.pdf [link]