{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T00:48:55Z","timestamp":1771634935153,"version":"3.50.1"},"reference-count":46,"publisher":"MDPI AG","issue":"20","license":[{"start":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T00:00:00Z","timestamp":1570665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/M001636\/1"],"award-info":[{"award-number":["EP\/M001636\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N028260\/2"],"award-info":[{"award-number":["EP\/N028260\/2"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The EU\u2019s General Data Protection Regulation (GDPR) has recently come into effect and insofar as Internet of Things (IoT) applications touch EU citizens or their data, developers are obliged to exercise due diligence and ensure they undertake Data Protection by Design and Default (DPbD). GDPR mandates the use of Data Protection Impact Assessments (DPIAs) as a key heuristic enabling DPbD. However, research has shown that developers generally lack the competence needed to deal effectively with legal aspects of privacy management and that the difficulties of complying with regulation are likely to grow considerably. Privacy engineering seeks to shift the focus from interpreting texts and guidelines or consulting legal experts to embedding data protection within the development process itself. There are, however, few examples in practice. We present a privacy-oriented, flow-based integrated development environment (IDE) for building domestic IoT applications. The IDE enables due diligence in (a) helping developers reason about personal data during the actual in vivo construction of IoT applications; (b) advising developers as to whether or not the design choices they are making occasion the need for a DPIA; and (c) attaching and making available to others (including data processors, data controllers, data protection officers, users and supervisory authorities) specific privacy-related information that has arisen during an application\u2019s development.<\/jats:p>","DOI":"10.3390\/s19204380","type":"journal-article","created":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T03:07:11Z","timestamp":1570763231000},"page":"4380","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Privacy Engineering for Domestic IoT: Enabling Due Diligence"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0857-7341","authenticated-orcid":false,"given":"Tom","family":"Lodge","sequence":"first","affiliation":[{"name":"School of Computer Science, University of Nottingham, Nottingham NG7 2RD, UK"}]},{"given":"Andy","family":"Crabtree","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Nottingham, Nottingham NG7 2RD, UK"}]}],"member":"1968","published-online":{"date-parts":[[2019,10,10]]},"reference":[{"key":"ref_1","unstructured":"(2016). General Data Protection Regulation. Off. J. Eur. Union, 59, 1\u201388. Available online: https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=OJ%3AL%3A2016%3A119%3ATOC."},{"key":"ref_2","unstructured":"Article 29 Working Party (2019, July 18). Guidelines on Data Protection Impact Assessment (DPIA); European Commission: Brussels, WP248 rev.01. Available online: https:\/\/ec.europa.eu\/newsroom\/article29\/item-detail.cfm?item_id=611236."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s11948-010-9236-0","article-title":"Emotional Engineers: Toward Morally Responsible Design","volume":"18","author":"Roeser","year":"2012","journal-title":"Sci. Eng. Ethics"},{"key":"ref_4","unstructured":"Balebako, R., Marsh, A., Lin, J., Hong, J., and Cranor, L.F. (2014, January 23\u201326). The Privacy and Security Behaviors of Smartphone App Developers. Proceedings of the Network and Distributed System Security Workshop on Useable Security, San Diego, CA, USA. Available online: https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2017\/09\/01_2-paper.pdf."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MSP.2014.70","article-title":"Improving App Privacy: Nudging App Developers to Protect User Privacy","volume":"12","author":"Balebako","year":"2014","journal-title":"IEEE Secur. Priv."},{"key":"ref_6","unstructured":"Jain, S., and Lindqvist, J. (2014, January 23\u201326). Should I Protect You? Understanding Developers\u2019 Behavior to Privacy-Preserving APIs. Proceedings of the Network and Distributed System Security Workshop on Useable Security, San Diego, CA, USA. Available online: https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2017\/09\/01_1-paper.pdf."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Van Der Sype, Y.S., and Maalej, W. (2014, January 26). On Lawful Disclosure of Personal User Data: What Should App Developers Do?. Proceedings of the IEEE 7th International Workshop on Requirements Engineering and Law, Karlskrona, Sweden.","DOI":"10.1109\/RELAW.2014.6893479"},{"key":"ref_8","unstructured":"Consumers International (2019, July 18). Connection and Protection in the Digital Age: The Internet of Things and Challenges for Consumer Protection, Consumers International. Available online: https:\/\/www.consumersinternational.org\/media\/1292\/connection-and-protection-the-internet-of-things-and-challenges-for-consumer-protection.pdf."},{"key":"ref_9","unstructured":"Graf, C., Wolkerstorfer, P., Geben, A., and Tscheligi, M. (2010, January 21\u201326). A Pattern Collection for Privacy Enhancing Technology. Proceedings of the 2nd International Conference on Pervasive Patterns and Applications, Lisbon, Portugal. Available online: https:\/\/www.researchgate.net\/publication\/228579692_A_Pattern_Collection_for_Privacy_Enhancing_Technology."},{"key":"ref_10","unstructured":"(2019, July 22). ICO DPIA Checklist. Available online: https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/guide-to-the-general-data-protection-regulation-gdpr\/accountability-and-governance\/data-protection-impact-assessments\/."},{"key":"ref_11","unstructured":"(2019, July 22). OASIS Privacy Management Reference Model. Available online: https:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=pmrm."},{"key":"ref_12","unstructured":"(2019, July 22). NIST Privacy Framework, Available online: https:\/\/www.nist.gov\/privacy-framework."},{"key":"ref_13","unstructured":"(2019, July 22). LINDDUN Privacy Threat Modeling. Available online: https:\/\/linddun.org\/."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/TSE.2008.88","article-title":"Engineering Privacy","volume":"35","author":"Spiekermann","year":"2009","journal-title":"IEEE Trans. Softw. Eng."},{"key":"ref_15","unstructured":"Cavoukian, A. (2009). Privacy by Design: The 7 Foundational Principles, Information and Privacy Commissioner of Ontario, Canada."},{"key":"ref_16","unstructured":"Article 29 Working Party (2019, July 18). The Future of Privacy; European Commission: Brussels, WP168. Available online: https:\/\/ec.europa.eu\/justice\/article-29\/documentation\/opinion-recommendation\/files\/2009\/wp168_en.pdf."},{"key":"ref_17","unstructured":"(2010, January 27\u201329). Resolution on Privacy by Design. Proceedings of the 32nd International Conference of Data Protection and Privacy Commissioners, Jerusalem, Israel. Available online: https:\/\/edps.europa.eu\/sites\/edp\/files\/publication\/10-10-27_jerusalem_resolutionon_privacybydesign_en.pdf."},{"key":"ref_18","unstructured":"(2019, July 18). Towards a Thriving Data-driven Economy; EUR-lex: COM(2014)442 Final. Available online: http:\/\/ec.europa.eu\/newsroom\/dae\/document.cfm?action=display&doc_id=6210."},{"key":"ref_19","unstructured":"(2019, July 18). Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace. Available online: https:\/\/edps.europa.eu\/sites\/edp\/files\/publication\/13-06-14_cyber_security_en.pdf."},{"key":"ref_20","unstructured":"Troncosco, C. (2019, July 18). Engineering Privacy by Design. Available online: https:\/\/summerschool-croatia.cs.ru.nl\/2017\/slides\/Engineering%20privacy%20by%20design.pdf."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Luger, E., Urquhart, L., Rodden, T., and Golembewski, M. (2015, January 18\u201323). Playing the Legal Card: Using Ideation Cards to Raise Data Protection Issues within the Design Process. Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, Seoul, Korea.","DOI":"10.1145\/2702123.2702142"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Fatema, K., Debruyne, C., Lewis, D., Morrison, J.P., and Mazed, A.-A. (2016, January 22\u201326). A Semi-Automated Methodology for Extracting access control rules from the European Data Protection Directive. Proceedings of the IEEE Security and Privacy Workshops, San Jose, CA, USA.","DOI":"10.1109\/SPW.2016.16"},{"key":"ref_23","unstructured":"Singh, J., Pasquier, T., Bacon, J., Powles, J., Diaconu, R., and Eyers, D. (2016, January 12\u201316). Policy-driven Middleware for a Legally-Compliant Internet of Things. Proceedings of the 17th International Middleware Conference, Trento, Italy."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Pandit, H.J., Fatema, K., O\u2019Sullivan, D., and Lewis, D. (2018, January 3\u20137). GDPRtEXT-GDPR as a Linked Data Resource. Proceedings of the 15th European Semantic Web Conference, Heraklion, Greece.","DOI":"10.1007\/978-3-319-93417-4_31"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Corrales, M., Jur\u010dys, P., and Kousiouris, G. (2019, July 18). Smart Contracts and Smart Disclosure: Coding a GDPR Compliance Framework. Available online: https:\/\/www.researchgate.net\/publication\/323625892_Smart_Contracts_and_Smart_Disclosure_Coding_a_GDPR_Compliance_Framework.","DOI":"10.2139\/ssrn.3121658"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Hafiz, M. (2006, January 21\u201323). A Collection of Privacy Design Patterns. Proceedings of the 2006 Conference on Pattern Languages of Programs, Portland, OR, USA.","DOI":"10.1145\/1415472.1415481"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1002\/spe.1131","article-title":"A Pattern Language for Developing Privacy Enhancing Technologies","volume":"43","author":"Hafiz","year":"2011","journal-title":"Softw. Pract. Exp."},{"key":"ref_28","unstructured":"Pearson, S., and Benameur, A. (2010, January 2\u20136). Decision Support System for Design for Privacy. Proceedings of the Prime Life 2010, Helsingborg, Sweden. Available online: http:\/\/dl.ifip.org\/db\/conf\/primelife\/primelife2010\/PearsonB10.pdf."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Pearson, S., and Shen, Y. (2010, January 30\u201331). Context-aware Privacy Design Pattern Selection. Proceedings of the 7th International Conference on Trust, Privacy and Security in Digital Business, Bilbao, Spain.","DOI":"10.1007\/978-3-642-15152-1_7"},{"key":"ref_30","unstructured":"(2019, July 18). Privacy Patterns. Available online: https:\/\/privacypatterns.org."},{"key":"ref_31","unstructured":"Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., and Sheth, A.N. (2010, January 4\u20136). TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. Proceedings of the 9th USENIX Conference on Operating Systems and Implementation, Vancouver, BC, Canada. Available online: https:\/\/www.usenix.org\/legacy\/event\/osdi10\/tech\/full_papers\/Enck.pdf."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., and McDaniel, P. (2014, January 9\u201311). FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps. Proceedings of the 35th Annual ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh, UK.","DOI":"10.1145\/2594291.2594299"},{"key":"ref_33","unstructured":"Celik, Z.B., Babum, L., Sikder, A., Aksu, H., Tan, G., McDaniel, P., and Uluagac, A.S. (2018, January 15\u201317). Sensitive Information Tracking in Commodity IoT. Proceedings of the 17th USENIX Security Symposium, Baltimore, MD, USA. Available online: https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity18\/sec18-celik.pdf."},{"key":"ref_34","first-page":"9","article-title":"Static Analysis for GDPR Compliance","volume":"Volume 2058","author":"Ferrara","year":"2018","journal-title":"Proceedings of the 2nd Italian Conference on Cybersecurity"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Ferrara, P., Olivieri, L., and Spoto, F. (2018, January 13\u201314). Tailoring Taint Analysis to GDPR. Proceedings of the Annual Privacy Forum, Barcelona, Spain. Available online: http:\/\/www.pietro.ferrara.name\/2018_APF.pdf.","DOI":"10.1007\/978-3-030-02547-2_4"},{"key":"ref_36","unstructured":"(2019, July 22). Privatar Publisher. Available online: https:\/\/www.privitar.com\/publisher."},{"key":"ref_37","unstructured":"(2019, July 22). Privatar Lens. Available online: https:\/\/www.privitar.com\/lens."},{"key":"ref_38","unstructured":"Information Commissioners Office (2019, July 18). What is Personal Data?. Available online: https:\/\/ico.org.uk\/media\/for-organisations\/guide-to-the-general-data-protection-regulation-gdpr\/what-is-personal-data-1-0.pdf."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.clsr.2016.11.005","article-title":"Nobody Puts Data in a Corner? Why a New Approach to Categorising Personal Data is Required for the Obligation to Inform","volume":"33","author":"Cradock","year":"2017","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Leon, P., Ur, B., Wang, Y., Sleeper, M., Balebako, R., Shay, R., Bauer, L., Christodorescu, M., and Cranor, L.F. (2013, January 24\u201326). What Matters to Users? Factors that Affect Users\u2019 Willingness to Share Information with Online Advertisers. Proceedings of the 9th Symposium on Usable Privacy and Security, Newcastle, UK.","DOI":"10.1145\/2501604.2501611"},{"key":"ref_41","unstructured":"W3C (2019, July 22). The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. Available online: http:\/\/www.w3.org\/TR\/P3P\/#Categories."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/s40860-018-0054-5","article-title":"Building Accountability into the Internet of Things: The IoT Databox Model","volume":"4","author":"Crabtree","year":"2018","journal-title":"J. Reliab. Intell. Environ."},{"key":"ref_43","unstructured":"(2019, July 22). Node-RED. Available online: https:\/\/nodered.org\/."},{"key":"ref_44","unstructured":"(2019, July 22). Docker. Available online: https:\/\/www.docker.com\/."},{"key":"ref_45","unstructured":"(2019, September 30). Databox and IDE source code. Available online: https:\/\/github.com\/me-box\/."},{"key":"ref_46","unstructured":"(2019, September 30). Databox IDE. Available online: https:\/\/sdk.iotdatabox.com\/."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/20\/4380\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:29:08Z","timestamp":1760189348000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/20\/4380"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,10]]},"references-count":46,"journal-issue":{"issue":"20","published-online":{"date-parts":[[2019,10]]}},"alternative-id":["s19204380"],"URL":"https:\/\/doi.org\/10.3390\/s19204380","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,10]]}}}