The Integrated Privacy Model: Building a Privacy Model in the Business Processes of the Enterprise
نویسنده
چکیده
This paper discusses the challenges that faced in the “DigNet” age in terms of privacy and proposes a framework for privacy protection. This framework is integral in ensuring that personal data protection is impeded part of business processes of any systems that are involved in collecting, disseminating, and accessing an individual’s data. The cooperation and partnership between nations in passing privacy laws is essential and requires some building blocks. In this paper, the author argues that the building blocks should be integrated into the business processes and take into consideration three main domains: governments’ legislation, entity’s policies and procedures, and data protection controls. The proposed conceptual framework helps organizations develop data protection in their business processes, assess the privacy issues in their organization, protect the interests of their customers, increase their value proposition to customers, and make it easier to identify the impact of privacy on their business.
منابع مشابه
An Integrated Enterprise Resources Planning (ERP) Framework forFlexible Manufacturing SystemsUsing Business Intelligence (BI)Tools
Nowadays Business intelligence (BI) tools provide optimal decision making, analyzing, controlling and monitoring of operations in enterprise systems like enterprise resource planning (ERP) and mainly refer to strong decision making methods used in online analytical processing, reporting and data analysis, such as improve internal processes, analysis of resources, information needs analysis, red...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملAssessment of privacy using the meaning structure method: case of Mashhad social housings
The present study is an attempt to find out processual and functional aspects of privacy regulation in a dialectical investigation. For this purpose, 180 samples are selected from among mothers of families in Mashhad, Iran using random sampling. In this study, "meaning structure" method has been applied. Samples participated in Laddering Interview. Analyses are set in Content-Goal Table. Based ...
متن کاملPrivacy-Enabled Services for Enterprises
The IBM Enterprise Privacy Architecture (EPA) is a methodology for enterprises to provide an enhanced and well-defined level of privacy to their customers. EPA is structured in four building blocks. The privacy regulation analysis identifies and structures the applicable regulations. The management reference model enables an enterprise to define and enforce an enterprise privacy strategy and th...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJISP
دوره 4 شماره
صفحات -
تاریخ انتشار 2010