A conceptual framework for information security and privacy
MetadataShow full item record
The WSEAS home page is available at : http://www.wseas.org
There are numerous information privacy approaches based on the four major models of privacy protection. That is, Comprehensive Privacy Laws, Sectoral Privacy Laws, Privacy Self-Regulation, and Technologies of Privacy. These solutions, used individually or without proper system privacy design considerations, have not been very effective. This is because there has been little in the way of instruction on how developers and designers are supposed to use these privacy tools. In this paper we address the problem by providing a privacy solution for integration into information systems called Shield Privacy. The Shield Privacy solution provides an effective system wide approach to privacy protection. It integrates relevant components from the various privacy models. We have implemented our Shield Privacy in a collaborative environment application. In this paper we also describe the prototype and discuss its advantages and areas of future work.
Showing items related by title, author, creator and subject.
Skinner, Geoffrey; Han, Song; Chang, Elizabeth (2006)With the increasing number of proposals and approaches to privacy protection, it has become very difficult to build information systems that provide comprehensive protection for a very broad range of information privacy ...
Skinner, Geoffrey; Chang, Elizabeth (2006)There are numerous information privacy approaches based on the four major models of privacy protection. That is, Comprehensive Privacy Laws, Sectoral Privacy Laws, Privacy Self-Regulation, and Technologies of Privacy. ...
Skinner, Geoffrey; Han, Song; Chang, Elizabeth (2005)Preserving Privacy and the protection of personally identifiable information (PII) have been of increasing interest over the last few years. Many privacy advocates, and a significant portion of the general public, feared ...