You are previewing Privacy Protection Measures and Technologies in Business Organizations.
O'Reilly logo
Privacy Protection Measures and Technologies in Business Organizations

Book Description

Why are tools needed to build privacy into business processes? As in most endeavors, tools can help, and in an application area where, for example, privacy may be resisted in favor of the fallacious argument of higher profits, tools are needed. Most professionals have heard of the Privacy Impact Assessment (Warren et al., 2008). This is a tool that evaluates the impact to privacy of a proposed change to business practice. Prior to the introduction of this tool, such impacts to privacy were either done in an ineffective way or not even considered. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards is a collection of research on privacy protection technologies and their application in business organizations. Providing insights and support professionals concerned with the management of expertise, knowledge, information, and organizational development in different types of business organizations and environments. This book will be composed of professionals and researchers working in the field of privacy protection in various disciplines.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  5. Foreword
  6. Preface
    1. Current Situation with Business Protection of Privacy
    2. Challenges and Opportunities
    3. Organization of this Book
    4. Conclusion
  7. Acknowledgment
  8. Section 1: Privacy Protection Technology Applicable to Business
    1. Chapter 1: Privacy Enhancing Technologies for Information Control
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MARKET OPPORTUNITIES FOR PETs
      5. A Survey of PETs Suitable for Business Organizations
      6. Case Study: The Rise and Fall of P3P
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    2. Chapter 2: User-Centric Privacy Management in Future Network Infrastructure
      1. Abstract
      2. INTRODUCTION
      3. Background
      4. Privacy in Identity Management (IdM)
      5. User-Centric Privacy Management in Future Network Infrastructure
      6. Integration of IdM in Business Environments
      7. FUTURE RESEARCH DIRECTIONS
      8. Conclusion
    3. Chapter 3: Leveraging Access Control for Privacy Protection
      1. Abstract
      2. Introduction
      3. Background
      4. Access Control Mechanisms
      5. Context-Awareness
      6. Semantics in Access Control
      7. PrivacY–Aware Access Control
      8. Analysis and Discussion
      9. Conclusion and Future Research Directions
    4. Chapter 4: Self-Protecting Access Control
      1. Abstract
      2. INTRODUCTION
      3. PRIVACY VIA ACCESS CONTROL IN THE WEB CONTEXT
      4. CRYPTOGRAPHIC ACCESS CONTROL FOR PRIVACY ENFORCEMENT
      5. SELF-PROTECTING CRYPTOGRAPHIC ACCESS CONTROL
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    5. Chapter 5: Privacy Hash Table
      1. ABSTRACT
      2. INTRODUCTION
      3. Related Work
      4. PRELIMINARIES
      5. GENERALIZATION RELATIONSHIP
      6. MINIMAL GENERALIZATION
      7. PROOF-OF-CONCEPT EXPERIMENTS
      8. CONCLUSION AND FUTURE WORK
    6. Chapter 6: Developing Secure Business Processes
      1. Abstract
      2. Introduction
      3. Security in Early Stages of Software Development
      4. Secure Business Process Definition: Our Proposal
      5. Case Study
      6. Conclusion and Future Work
    7. Chapter 7: Privacy by Design
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PbD ORIGINS (1996~2001)
      5. DEVELOPMENT OF CONCEPTS (2001–2009)
      6. PRIVACY BY DESIGN CURRENT AND FUTURE PROSPECTS (2009 –)
      7. SUMMARY AND CONCLUSION
  9. Section 2: Privacy Protection in Specific Business Domains
    1. Chapter 8: Privacy Considerations for Electronic Health Records
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. HEALTH INFORMATION PRIVACY
      5. Solutions and Recommendations
      6. CONCLUSION
    2. Chapter 9: Privacy Protection Issues for Healthcare Wellness Clouds
      1. Abstract
      2. INTRODUCTION
      3. BACKGROUND
      4. WELLNESS CLOUD ISSUES
      5. THE WELNESS CLOUD ARCHITECTURE
      6. PRIVACY PROTECTION IN DATA COLLECTION
      7. PRIVACY PROTECTION WITHIN THE CLOUD
      8. PRIVACY PRESERVATION IN WELLNESS ANALYTICS
      9. IMPLICATIONS AND FUTURE WORK
      10. Conclusion
    3. Chapter 10: Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems
      1. Abstract
      2. INTRODUCTION
      3. Background
      4. PROVIDING SECURITY AND PRIVACY IN DIGITAL VIDEO SURVEILLANCE
      5. PROOF OF CONCEPT IMPLEMENTATION
      6. FUTURE RESEARCH DIRECTIONS
      7. Conclusion
    4. Chapter 11: Protecting Privacy by Secure Computation
      1. ABSTRACT
      2. Introduction
      3. Related Work
      4. BACKGROUND
      5. Computing the Entire Social Network
      6. Computing SNA Metrics
      7. Implementation Issues
      8. Conclusion
    5. Chapter 12: A Dynamic Privacy Manager for Compliance in Pervasive Computing
      1. Abstract
      2. INTRODUCTION
      3. Methodology
      4. THEORETICAL FRAMEWORK
      5. SOLUTIONS AND RECCOMENDATIONS
      6. IMPLEMENTATION
      7. DISCUSSION
      8. FUTURE RESEARCH DIRECTIONS
      9. Conclusion
  10. Section 3: Privacy Related Analyses and Evaluations
    1. Chapter 13: Harm Mitigation from the Release of Personal Identity Information
      1. Abstract
      2. Introduction
      3. DATA GOVERNANCE BEST PRACTICES
      4. CONSEQUENCES OF DATA BREACHES
      5. TYPES OF IDENTITY THEFT
      6. HARM MITIGATION
      7. COSTS OF BREACHES TO ORGANIZATIONS
      8. COSTS OF BREACHES TO INDIVIDUALS
      9. CREDIT MONITORING SERVICES
      10. VULNERABLE POPULATIONS
      11. FROM PROVABLE DAMAGES TO HARM FROM EXPOSURE
      12. FUTURE RESEARCH DIRECTIONS
      13. CONCLUSION
    2. Chapter 14: Consumer Privacy Protection in the European Union
      1. ABSTRACT
      2. Introduction
      3. Current EU Legal Framework for Data Privacy Protection
      4. Future Legislative Reform for Consumer Privacy Protection
      5. Conclusion and Recommendation
  11. Compilation of References
  12. About the Contributors