Defining and protecting meta privacy: A new conceptual framework within information privacy
|dc.identifier.citation||Skinner, G. and Han, Song and Chang, Elizabeth. 2006. : Defining and protecting meta privacy: A new conceptual framework within information privacy, in Barga, R.S. and Zhou, X. (ed), 2nd International Workshop on Privacy and Data Management (PDM), Apr 08 2006. Atlanta, USA: IEEE Computer Society Press.|
When considering information security and privacy issues most of the attention has previously focused on data protection and the privacy of personally identifiable information (PII). What is often overlooked is consideration for the operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of computing environments has not been factored in to most methods. Metadata, or data about data, can contain many personal details about an entity. It is subject to the same risks and malicious actions personal data is exposed to. This paper presents a new perspective for information security and privacy. It is termed Meta Privacy and is concerned with the protection and privacy of information system metadata and metastructure details. We first present a formal definition for Meta Privacy, and then analyze the factors that encompass and influence Meta Privacy. In addition, we recommend some techniques for the protection of Meta Privacy within the information systems. Further, the paper highlights the importance of ensuring all informational elements of information systems are adequately protected from a privacy perspective.
|dc.publisher||IEEE Computer Society Press|
|dc.subject||personally identifiable information|
|dc.subject||protecting meta privacy|
|dc.title||Defining and protecting meta privacy: A new conceptual framework within information privacy|
|dcterms.source.title||Proceedings of the 2nd International Workshop on Privacy and Data Management (PDM) in conjunctions with the 22nd International Conference on Data Engineering (ICDE)|
|dcterms.source.series||Proceedings of the 2nd International Workshop on Privacy and Data Management (PDM) in conjunctions with the 22nd International Conference on Data Engineering (ICDE)|
|dcterms.source.conference||2nd International Workshop on Privacy and Data Management (PDM)|
|dcterms.source.conference-start-date||Apr 08 2006|
Copyright 2006 IEEE
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
|curtin.department||Centre for Extended Enterprises and Business Intelligence|
|curtin.faculty||Curtin Business School|