A conceptual framework for information privacy and security in collaborative environments
There are numerous information privacy approaches based on the four major models of privacy protection. That is, Comprehensive Privacy Laws, Sectoral Privacy Laws, Privacy Self-Regulation, and Technologies of Privacy. These solutions, used individually or without proper system privacy design conside...
| Main Authors: | Skinner, Geoffrey, Chang, Elizabeth |
|---|---|
| Format: | Journal Article |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://paper.ijcsns.org/07_book/200602/200602C10.pdf http://hdl.handle.net/20.500.11937/28187 |
Similar Items
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
A framework of privacy shield in organizational information systems
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Dynamic user reconfigurable privacy and trust settigs for collaborative industrial environments
by: Skinner, G
Published: (2005)
by: Skinner, G
Published: (2005)
PP-SDLC The privacy protecting systems development life cycle
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
An information privacy taxonomy for collaborative environments
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A taxonomy for information privacy in virtual collaborations
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
A conceptual framework for privacy policy negotiation in web services
by: Wu, Chen, et al.
Published: (2006)
by: Wu, Chen, et al.
Published: (2006)
An introduction to a taxonomy of information privacy in collaborative environments
by: Skinner, Geoff, et al.
Published: (2006)
by: Skinner, Geoff, et al.
Published: (2006)
The computational view of information privacy enhancing technologies
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
A projection of the future effects of quantum computation on information privacy and information security
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Integration of situational and reward elements for fair privacy principles and preferences (F3P)
by: Skinner, Geoffrey, et al.
Published: (2006)
by: Skinner, Geoffrey, et al.
Published: (2006)
Privacy Perceptions of Twitter Users in Saudi Arabia.
by: ALAMR, BADR
Published: (2018)
by: ALAMR, BADR
Published: (2018)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Secure e-transactions protocol using intelligent mobile agents with fair privacy
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
New framework for authentication and authorization for e-health service systems
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
A framework for the design of privacy preserving pervasive health care
by: Moncrieff, Simon, et al.
Published: (2009)
by: Moncrieff, Simon, et al.
Published: (2009)
Toward a Revolution in Australian Children’s Data and Privacy
by: Leaver, Tama, et al.
Published: (2023)
by: Leaver, Tama, et al.
Published: (2023)
A framework of authentication and authorization for e-health services
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Identity management policy and unlinkability: a comparative case study of the US and Germany
by: Rosner, Gilad L.
Published: (2014)
by: Rosner, Gilad L.
Published: (2014)
A generic privacy ontology and its applications to different domains
by: Hecker, Michael
Published: (2009)
by: Hecker, Michael
Published: (2009)
Special theme on privacy and the Internet of Things
by: Chamberlain, Alan, et al.
Published: (2018)
by: Chamberlain, Alan, et al.
Published: (2018)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Measuring attitude towards personal data for adaptive cybersecurity
by: Addae, Joyce Hoese, et al.
Published: (2017)
by: Addae, Joyce Hoese, et al.
Published: (2017)
Understanding smartphone users' awareness of security and privacy in downloading third-party applications - A survey in UK and Japan
by: Kawakubo, Noriko
Published: (2013)
by: Kawakubo, Noriko
Published: (2013)
Does high e-government adoption assure stronger security? A cross-country analysis of Australia and Thailand.
by: Thompson, Nik, et al.
Published: (2019)
by: Thompson, Nik, et al.
Published: (2019)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
The practical politics of sharing personal data
by: Tolmie, Peter, et al.
Published: (2017)
by: Tolmie, Peter, et al.
Published: (2017)
Understanding the challenges of using personal data in media experiences
by: Sailaja, Neelima
Published: (2020)
by: Sailaja, Neelima
Published: (2020)
From privacy impact assessment to Social Impact Assessment
by: Edwards, Lilian, et al.
Published: (2016)
by: Edwards, Lilian, et al.
Published: (2016)
Secure electronic commerce with mobile agents
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Use of ontology technology for standardization of medical records and dealing with associated privacy issues
by: Hadzic, Maja, et al.
Published: (2006)
by: Hadzic, Maja, et al.
Published: (2006)
Repacking ‘privacy’ for a networked world
by: Crabtree, Andy, et al.
Published: (2017)
by: Crabtree, Andy, et al.
Published: (2017)
Researching the transparency of personal data sharing: designing a concert receipt
by: Styliari, Tatiana C., et al.
Published: (2016)
by: Styliari, Tatiana C., et al.
Published: (2016)
Low-Cost RFID Identification Variation
by: Lin, K., et al.
Published: (2006)
by: Lin, K., et al.
Published: (2006)
Similar Items
-
A conceptual framework for information security and privacy
by: Skinner, Geoff, et al.
Published: (2006) -
Shield privacy: A conceptual framework for information privacy and data access controls
by: Skinner, Geoffrey, et al.
Published: (2006) -
Defining and protecting meta privacy: A new conceptual framework within information privacy
by: Skinner, Geoffrey, et al.
Published: (2006) -
A new conceptual framework within information privacy: Meta privacy
by: Skinner, Geoffrey, et al.
Published: (2005) -
A framework of privacy shield in organizational information systems
by: Skinner, Geoffrey, et al.
Published: (2005)