企业信息基础设施中用户数据隐私保护方法综述

Asmita Manna, A. Sengupta, C. Mazumdar
{"title":"企业信息基础设施中用户数据隐私保护方法综述","authors":"Asmita Manna, A. Sengupta, C. Mazumdar","doi":"10.4018/978-1-7998-5728-0.ch003","DOIUrl":null,"url":null,"abstract":"During recent years, especially after the introduction of data protection regulations by different countries, protecting the privacy of user data has become an important research topic. Different threads of information privacy research have emerged, particularly in the areas of eliciting privacy requirements, incorporating privacy by design, performing privacy impact assessments, developing privacy enhancement techniques, implementing those techniques for privacy compliance, verifying privacy compliance, etc. Privacy engineering is integral to all phases of data lifecycle, right from privacy requirement elicitation to compliance verification. This chapter covers a brief survey of notable privacy researches and models proposed for different phases of privacy engineering (i.e., privacy requirement engineering, privacy by design, privacy impact assessment, privacy compliance, and modeling approaches for privacy in enterprise infrastructure). Models and frameworks have been chosen based on the relevance of their applicability in modeling and implementing privacy within an enterprise.","PeriodicalId":115612,"journal":{"name":"Handbook of Research on Cyber Crime and Information Privacy","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Survey of Methodologies for Protecting Privacy of User Data Within Enterprise Information Infrastructure\",\"authors\":\"Asmita Manna, A. Sengupta, C. Mazumdar\",\"doi\":\"10.4018/978-1-7998-5728-0.ch003\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"During recent years, especially after the introduction of data protection regulations by different countries, protecting the privacy of user data has become an important research topic. Different threads of information privacy research have emerged, particularly in the areas of eliciting privacy requirements, incorporating privacy by design, performing privacy impact assessments, developing privacy enhancement techniques, implementing those techniques for privacy compliance, verifying privacy compliance, etc. Privacy engineering is integral to all phases of data lifecycle, right from privacy requirement elicitation to compliance verification. This chapter covers a brief survey of notable privacy researches and models proposed for different phases of privacy engineering (i.e., privacy requirement engineering, privacy by design, privacy impact assessment, privacy compliance, and modeling approaches for privacy in enterprise infrastructure). Models and frameworks have been chosen based on the relevance of their applicability in modeling and implementing privacy within an enterprise.\",\"PeriodicalId\":115612,\"journal\":{\"name\":\"Handbook of Research on Cyber Crime and Information Privacy\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Handbook of Research on Cyber Crime and Information Privacy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/978-1-7998-5728-0.ch003\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Handbook of Research on Cyber Crime and Information Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-7998-5728-0.ch003","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

近年来,特别是各国出台数据保护法规后,保护用户数据隐私已成为一个重要的研究课题。不同的信息隐私研究线索已经出现,特别是在引出隐私要求,通过设计纳入隐私,执行隐私影响评估,开发隐私增强技术,实施这些技术来遵守隐私,验证隐私遵守等领域。隐私工程是数据生命周期所有阶段不可或缺的一部分,从隐私需求引出到合规性验证。本章简要介绍了针对隐私工程不同阶段(即隐私需求工程、隐私设计、隐私影响评估、隐私遵从性和企业基础架构中的隐私建模方法)提出的著名隐私研究和模型。模型和框架的选择是基于它们在企业内建模和实现隐私方面的适用性的相关性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Survey of Methodologies for Protecting Privacy of User Data Within Enterprise Information Infrastructure
During recent years, especially after the introduction of data protection regulations by different countries, protecting the privacy of user data has become an important research topic. Different threads of information privacy research have emerged, particularly in the areas of eliciting privacy requirements, incorporating privacy by design, performing privacy impact assessments, developing privacy enhancement techniques, implementing those techniques for privacy compliance, verifying privacy compliance, etc. Privacy engineering is integral to all phases of data lifecycle, right from privacy requirement elicitation to compliance verification. This chapter covers a brief survey of notable privacy researches and models proposed for different phases of privacy engineering (i.e., privacy requirement engineering, privacy by design, privacy impact assessment, privacy compliance, and modeling approaches for privacy in enterprise infrastructure). Models and frameworks have been chosen based on the relevance of their applicability in modeling and implementing privacy within an enterprise.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Survey of Methodologies for Protecting Privacy of User Data Within Enterprise Information Infrastructure Practical Align Overview of the Main Frameworks Used by the Companies to Prevent Cyber Incidents Interdisciplinary Training and Mentoring for Cyber Security in Companies Modeling a Cyber Defense Business Ecosystem of Ecosystems Self-Driving Robotic Cars
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1