Shield privacy: A conceptual framework for information privacy and data access controls
Access Status
Authors
Date
2006Type
Metadata
Show full item recordCitation
Source Title
Faculty
School
Remarks
Permission to provide open access to the full text of this document is being obtained.
During this period, access to the full text is restricted.
Open access, where it can be provided, will be available as soon as possible.
Collection
Abstract
With the increasing number of proposals and approaches to privacy protection, it has become very difficult to build information systems that provide comprehensive protection for a very broad range of information privacy issues. Proposals to information privacy are normally based on one or a combination of the four major models of privacy protection. That is, Comprehensive Privacy Laws, Sectoral Privacy Laws, Privacy Self-Regulation, and Technologies of Privacy. Used without direction or by not following privacy by design principles results in the ineffective privacy protection. What is required is a complete solution, that gives due consideration to all models, and is easily integrated in to all types of environments. In this paper we address this problem by providing a privacy solution for integration into information systems called Shield Privacy. The Shield Privacy solution provides an effective system wide approach to privacy protection. It integrates relevant components from the various privacy models while also providing comprehensive information security through privacy influences data access controls.
Related items
Showing items related by title, author, creator and subject.
-
Skinner, Geoffrey; Chang, Elizabeth (2006)There are numerous information privacy approaches based on the four major models of privacy protection. That is, Comprehensive Privacy Laws, Sectoral Privacy Laws, Privacy Self-Regulation, and Technologies of Privacy. ...
-
Skinner, Geoff; Han, Song; Chang, Elizabeth (2006)There are numerous information privacy approaches based on the four major models of privacy protection. That is, Comprehensive Privacy Laws, Sectoral Privacy Laws, Privacy Self-Regulation, and Technologies of Privacy. ...
-
Skinner, Geoffrey; Han, Song; Chang, Elizabeth (2005)Preserving Privacy and the protection of personally identifiable information (PII) have been of increasing interest over the last few years. Many privacy advocates, and a significant portion of the general public, feared ...