Show simple item record

dc.contributor.authorSkinner, Geoffrey
dc.contributor.authorHan, Song
dc.contributor.authorChang, Elizabeth
dc.date.accessioned2017-01-30T11:47:50Z
dc.date.available2017-01-30T11:47:50Z
dc.date.created2008-11-12T23:32:33Z
dc.date.issued2006
dc.identifier.citationSkinner, G. and Han, Song and Chang, Elizabeth. 2006. Shield privacy: A conceptual framework for information privacy and data access controls. WSEAS Transactions on Computers 5 (6): 1375-1382.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/15092
dc.description.abstract

With the increasing number of proposals and approaches to privacy protection, it has become very difficult to build information systems that provide comprehensive protection for a very broad range of information privacy issues. Proposals to information privacy are normally based on one or a combination of the four major models of privacy protection. That is, Comprehensive Privacy Laws, Sectoral Privacy Laws, Privacy Self-Regulation, and Technologies of Privacy. Used without direction or by not following privacy by design principles results in the ineffective privacy protection. What is required is a complete solution, that gives due consideration to all models, and is easily integrated in to all types of environments. In this paper we address this problem by providing a privacy solution for integration into information systems called Shield Privacy. The Shield Privacy solution provides an effective system wide approach to privacy protection. It integrates relevant components from the various privacy models while also providing comprehensive information security through privacy influences data access controls.

dc.publisherWSEAS Press
dc.relation.urihttp://www.worldses.org/journals/computers/computers-june2006.doc
dc.subjectinformation privacy
dc.subjectHippocratic policies
dc.subjectpersonally identifiable information
dc.subjectdata security
dc.subjectShield Privacy
dc.subjectPII
dc.titleShield privacy: A conceptual framework for information privacy and data access controls
dc.typeJournal Article
dcterms.source.volume5
dcterms.source.number6
dcterms.source.startPage1375
dcterms.source.endPage1382
dcterms.source.titleWSEAS Transactions on Computers
curtin.note

Permission to provide open access to the full text of this document is being obtained.

curtin.note

During this period, access to the full text is restricted.

curtin.note

Open access, where it can be provided, will be available as soon as possible.

curtin.departmentCentre for Extended Enterprises and Business Intelligence
curtin.identifierEPR-1235
curtin.accessStatusFulltext not available
curtin.facultyCurtin Business School


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record