scholarly journals Risk Analysis for Protecting Personal Information in IoT Environments

2016 ◽  
Vol 15 (4) ◽  
pp. 41-62
Author(s):  
Ae Ri Lee ◽  
Beomsoo Kim ◽  
Jaeyoung Jang
Author(s):  
George O. M. Yee

The growth of electronic services (e-services) has resulted in large amounts of personal information in the hands of service organizations like banks, insurance companies, and online retailers. This has led to the realization that such information must be protected, not only to comply with privacy regulations but also and more importantly, to attract clients. One important dimension of this goal is to design e-services that protect privacy. In this paper, the author proposes a design approach that incorporates privacy risk analysis of UML diagrams to minimize privacy risks in the final design. The approach iterates between the risk analysis and design modifications to eliminate the risks until a design is obtained that is close to being risk free.


2010 ◽  
Vol 1 (2) ◽  
pp. 18-34 ◽  
Author(s):  
George O. M. Yee

The growth of electronic services (e-services) has resulted in large amounts of personal information in the hands of service organizations like banks, insurance companies, and online retailers. This has led to the realization that such information must be protected, not only to comply with privacy regulations but also and more importantly, to attract clients. One important dimension of this goal is to design e-services that protect privacy. In this paper, the author proposes a design approach that incorporates privacy risk analysis of UML diagrams to minimize privacy risks in the final design. The approach iterates between the risk analysis and design modifications to eliminate the risks until a design is obtained that is close to being risk free.


2020 ◽  
Vol 43 ◽  
Author(s):  
John Corbit ◽  
Chris Moore

Abstract The integration of first-, second-, and third-personal information within joint intentional collaboration provides the foundation for broad-based second-personal morality. We offer two additions to this framework: a description of the developmental process through which second-personal competence emerges from early triadic interactions, and empirical evidence that collaboration with a concrete goal may provide an essential focal point for this integrative process.


2002 ◽  
Vol 30 (3) ◽  
pp. 466-474

In In re Pharmatrak, Inc. Privacy Litigation, website users brought suit claiming that major pharmaceutical corporations and a web monitoring company violated three federal statutes protecting electronic communications and data by collecting web traffic data and personal information about website users. On August 13,2002, the District Court of Massachusetts dismissed these allegations, holding that the defendants were parties to the communications and thus exempted under the statutory language.The court also found that plaintiffs had not suffered an amount of damages required to sustain private action.


2010 ◽  
Vol 58 (S 01) ◽  
Author(s):  
J Schönebeck ◽  
B Reiter ◽  
O Haye ◽  
D Böhm ◽  
M Ismail ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document