A Survey of Methodologies for Protecting Privacy of User Data Within Enterprise Information Infrastructure

Handbook of Research on Cyber Crime and Information PrivacyAdvances in Information Security, Privacy, and Ethics(2021)

引用 0|浏览0
暂无评分
摘要
During recent years, especially after the introduction of data protection regulations by different countries, protecting the privacy of user data has become an important research topic. Different threads of information privacy research have emerged, particularly in the areas of eliciting privacy requirements, incorporating privacy by design, performing privacy impact assessments, developing privacy enhancement techniques, implementing those techniques for privacy compliance, verifying privacy compliance, etc. Privacy engineering is integral to all phases of data lifecycle, right from privacy requirement elicitation to compliance verification. This chapter covers a brief survey of notable privacy researches and models proposed for different phases of privacy engineering (i.e., privacy requirement engineering, privacy by design, privacy impact assessment, privacy compliance, and modeling approaches for privacy in enterprise infrastructure). Models and frameworks have been chosen based on the relevance of their applicability in modeling and implementing privacy within an enterprise.
更多
查看译文
关键词
protecting privacy,user data
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要