Grounding Privacy-by-Design for Information Systems

نویسندگان

  • Shan Chen
  • Mary-Anne Williams
چکیده

The Privacy-by-Design approach has gained an increasing acceptance for privacy management in the privacy community. However, there is still a research gap in methodologies for implementing this approach and a need to develop frameworks and systems to support Privacy-by-Design practice. In an attempt to bridge this gap, this paper uncovers hidden issues of the Privacy-by-Design approach as a means to derive privacy requirements for implementing information systems with privacy embedded by design.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Back-flashover Investigation of HV Transmission Lines Using Transient Modeling of the Grounding Systems

The article presents the transients analysis of the substation grounding systems and transmission line tower footing resistances which can affect to the back-flashover (BF) or overvoltage across insulator chain in an HV power systems by using EMTP-RV software. The related transient modeling of the grounding systems is based on a transmission line (TL) model with considering the soil ionization....

متن کامل

A Sudy on Information Privacy Issue on Social Networks

In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...

متن کامل

Grounding Data Purpose And Data Usage For Better Privacy Requirements Development: An Information System Perspective

Data purpose is a central concept to modeling privacy requirements for information systems. Existing purpose-centric approaches for privacy protection have mainly focused on access control. The problem of ensuring the consistency between data purpose and data usage has been under-addressed. Given the lack of practical purpose-centric solutions, we argue that a grounded understanding of the unde...

متن کامل

Crafting Requirements for Mobile and Pervasive Emergency Response based on Privacy and Security by Design Principles

According to fundamental principles of the Privacy by Design approach, the consultation of privacy issues should be embedded into analysis and design of information systems, from the early stages of system planning to implementation. In this article, the authors extend this perspective towards Privacy and Security by Design. Exemplary focusing on mobile and pervasive emergency response, as a sp...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013