Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards

  • 10h 30m
  • George O.M. Yee (ed)
  • IGI Global
  • 2012

Why are tools needed to build privacy into business processes? As in most endeavors, tools can help, and in an application area where, for example, privacy may be resisted in favor of the fallacious argument of higher profits, tools are needed. Most professionals have heard of the Privacy Impact Assessment (Warren et al., 2008). This is a tool that evaluates the impact to privacy of a proposed change to business practice. Prior to the introduction of this tool, such impacts to privacy were either done in an ineffective way or not even considered.

Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards is a collection of research on privacy protection technologies and their application in business organizations. Providing insights and support professionals concerned with the management of expertise, knowledge, information, and organizational development in different types of business organizations and environments. This book will be composed of professionals and researchers working in the field of privacy protection in various disciplines.

About the Editor

George Yee is a Consultant and an Adjunct Professor with the Dept. of Systems and Computer Engineering, Carleton University, Ottawa, Canada. He was previously a Senior Research Officer for over 7 years in the Information Security Group, National Research Council Canada (NRC). Prior to the NRC, he had significant experience as a member of scientific staff and manager at Bell-Northern Research and Nortel Networks. George received his Ph.D. in Electrical Engineering from Carleton University and is a member of Professional Engineers Ontario. In addition, he is a Certified Information Systems Security Professional (CISSP) and a Certified Software Development Professional (CSDP). George’s research interests as an Adjunct Professor lie in the engineering of reliable systems, involving security, fault tolerance, performance and correctness.

In this Book

  • Privacy Enhancing Technologies for Information Control
  • User-Centric Privacy Management in Future Network Infrastructure
  • Leveraging Access Control for Privacy Protection: A Survey
  • Self-Protecting Access Control: On Mitigating Privacy Violations with Fault Tolerance
  • Privacy Hash Table
  • Developing Secure Business Processes: A Model Driven Approach
  • Privacy by Design: Origins, Meaning, and Prospects for Assuring Privacy and Trust in the Information Era
  • Privacy Considerations for Electronic Health Records
  • Privacy Protection Issues for Healthcare Wellness Clouds
  • Ensuring Privacy and Confidentiality in Digital Video Surveillance Systems
  • Protecting Privacy by Secure Computation: Privacy in Social Network Analysis
  • A Dynamic Privacy Manager for Compliance in Pervasive Computing
  • Harm Mitigation from the Release of Personal Identity Information
  • Consumer Privacy Protection in the European Union: Legislative Reform Driven by Current Technological Challenges
SHOW MORE
FREE ACCESS