A new conceptual framework within information privacy: Meta privacy
When considering information security and privacy issues most of the attention has previously focussed on data protection and the privacy of personally identifiable information (PII). What is often overlooked is consideration for the operational and transactional data. Specifically, the security and...
| Main Authors: | Skinner, Geoffrey, Han, Song, Chang, Elizabeth |
|---|---|
| Format: | Conference Paper |
| Published: |
Springer-Verlag
2005
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/16874 |
Similar Items
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A framework of privacy shield in organizational information systems
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
PP-SDLC The privacy protecting systems development life cycle
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
An introduction to a taxonomy of information privacy in collaborative environments
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Dynamic user reconfigurable privacy and trust settigs for collaborative industrial environments
by: Skinner, G
Published: (2005)
by: Skinner, G
Published: (2005)
A projection of the future effects of quantum computation on information privacy and information security
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A conceptual framework for privacy policy negotiation in web services
by: Wu, Chen, et al.
Published: (2006)
by: Wu, Chen, et al.
Published: (2006)
Integration of situational and reward elements for fair privacy principles and preferences (F3P)
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Privacy Perceptions of Twitter Users in Saudi Arabia.
by: ALAMR, BADR
Published: (2018)
by: ALAMR, BADR
Published: (2018)
A framework for the design of privacy preserving pervasive health care
by: Moncrieff, Simon, et al.
Published: (2009)
by: Moncrieff, Simon, et al.
Published: (2009)
A generic privacy ontology and its applications to different domains
by: Hecker, Michael
Published: (2009)
by: Hecker, Michael
Published: (2009)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
New framework for authentication and authorization for e-health service systems
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Secure e-transactions protocol using intelligent mobile agents with fair privacy
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Special theme on privacy and the Internet of Things
by: Chamberlain, Alan, et al.
Published: (2018)
by: Chamberlain, Alan, et al.
Published: (2018)
From privacy impact assessment to Social Impact Assessment
by: Edwards, Lilian, et al.
Published: (2016)
by: Edwards, Lilian, et al.
Published: (2016)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Repacking ‘privacy’ for a networked world
by: Crabtree, Andy, et al.
Published: (2017)
by: Crabtree, Andy, et al.
Published: (2017)
Toward a Revolution in Australian Children’s Data and Privacy
by: Leaver, Tama, et al.
Published: (2023)
by: Leaver, Tama, et al.
Published: (2023)
Privacy and the Health Industry
by: Carew-Reid, Anne
Published: (2003)
by: Carew-Reid, Anne
Published: (2003)
Use of ontology technology for standardization of medical records and dealing with associated privacy issues
by: Hadzic, Maja, et al.
Published: (2006)
by: Hadzic, Maja, et al.
Published: (2006)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
Safeguarding privacy from criminal process
by: Purshouse, Joe
Published: (2017)
by: Purshouse, Joe
Published: (2017)
Digital privacy and personal, social and civic agency: refugees' experiences
by: Voigts, Matthew
Published: (2020)
by: Voigts, Matthew
Published: (2020)
Understanding smartphone users' awareness of security and privacy in downloading third-party applications - A survey in UK and Japan
by: Kawakubo, Noriko
Published: (2013)
by: Kawakubo, Noriko
Published: (2013)
Privacy Concerns and Acceptance of Government Surveillance in Australia
by: Thompson, Nik, et al.
Published: (2018)
by: Thompson, Nik, et al.
Published: (2018)
The privacy concerns in location based services: protection approaches and remaining challenges
by: Basiri, Anahid, et al.
Published: (2016)
by: Basiri, Anahid, et al.
Published: (2016)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
A framework of authentication and authorization for e-health services
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Identity management policy and unlinkability: a comparative case study of the US and Germany
by: Rosner, Gilad L.
Published: (2014)
by: Rosner, Gilad L.
Published: (2014)
Does high e-government adoption assure stronger security? A cross-country analysis of Australia and Thailand.
by: Thompson, Nik, et al.
Published: (2019)
by: Thompson, Nik, et al.
Published: (2019)
Privacy and confidentiality: perspectives of mental health consumers and carers in pharmacy settings
by: Hattingh, H. Laetitia, et al.
Published: (2015)
by: Hattingh, H. Laetitia, et al.
Published: (2015)
Similar Items
-
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006) -
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006) -
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006) -
A conceptual framework for information privacy and security in collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006) -
A framework of privacy shield in organizational information systems
by: Skinner, Geoffrey, et al.
Published: (2005)