Introduction to Privacy Engineering for Business and Management
Abstract
This paper gives an introduction to the fundamental concepts of privacy and its risk management counterpart. Basic research into the subjects of cybersecurity, cloud computing, intrusion detection, and application containers... [ view full abstract ]
This paper gives an introduction to the fundamental concepts of privacy and its risk management counterpart. Basic research into the subjects of cybersecurity, cloud computing, intrusion detection, and application containers has generated a discipline that safeguards the availability, accuracy, authenticity, confidentiality, and integrity of information stored and processed by modern computer systems. The concepts apply to government, business, education, and private individuals. But, what about the privacy of individuals addressed by information systems? The protection of personally identifiable information (PII) is covered somewhat by information security principles, but the critical aspects of personal privacy are far less developed. A trustworthy system meets the critical requirements of its stated purpose. A system with trustworthy privacy attributes meets specific needs of information systems concerning the creation, collection, use, processing, retention, dissemination, and disclosure of PII. The methods of identifying privacy problems are covered, and techniques for designing trustworthy systems are supplied. Three objectives are described: predictability, manageability, and disassociability. Finally, vocabulary and examples are included.
Authors
-
Harry Katzan
(Webster University)
Topic Area
Topics: Information Technology, Decision Support Systems, and Cybersecurity - click here w
Session
IT3 » IT Issues - I (11:30 - Thursday, 5th October, West A)
Paper
Privacy_Engineering_Abstract.pdf
Presentation Files
The presenter has not uploaded any presentation files.