Usable privacy and security for personal information management

被引:15
|
作者
Karat, CM [1 ]
Brodie, C [1 ]
Karat, J [1 ]
机构
[1] IBM Corp, TJ Watson Res Ctr, Hawthorne, NY 10532 USA
关键词
D O I
10.1145/1107458.1107491
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
IBM T.J. Watson Research Center in Hawthorne, NY, focuses on the design and development of policy SPARCLE, authoring and transformation tools that enable organizations to create machine-readable policies for real-time enforcement decisions. Usable privacy and security technology is a critical need in the management of personal information, and should be a part of the initial design considerations for technology applications, systems, and devices that involves personal information collection, access, and communications. SPARCLE will enable individuals to be able to know that the policies are enforced within the organizations by their own processes. The prototype workbench transforms natural language rules through the use of natural language parsing technology into machine-readable XML code. The tools promise to give organizations a verifiable path from the written form of privacy rule to real-time enforcement decisions regarding access to personal information.
引用
收藏
页码:56 / 57
页数:2
相关论文
共 50 条
  • [1] Usable Privacy and Security in Personal Health Records
    Carrion, Inma
    Fernandez-Aleman, Jose L.
    Toval, Ambrosio
    HUMAN-COMPUTER INTERACTION - INTERACT 2011, PT IV, 2011, 6949 : 36 - 43
  • [2] Usable Security and Privacy for Security and Privacy Workers
    Zurko, Mary Ellen
    Haney, Julie
    IEEE SECURITY & PRIVACY, 2023, 21 (01) : 8 - 10
  • [3] Usable privacy and security
    De Luca, Alexander
    von Zezschwitz, Emanuel
    IT-INFORMATION TECHNOLOGY, 2016, 58 (05): : 215 - 216
  • [4] PRIVACY - SECURITY OF COMPUTERIZED PERSONAL INFORMATION
    OCONNOR, KP
    INFORMATION PRIVACY, 1979, 1 (03): : 120 - 123
  • [5] Usable Security und Privacy
    Simone Fischer-Hübner
    Luigi Lo Iacono
    Sebastian Möller
    Datenschutz und Datensicherheit - DuD, 2010, 34 (11) : 773 - 782
  • [6] Privacy and Security Usable Security: How to Get It
    Lampson, Butler
    COMMUNICATIONS OF THE ACM, 2009, 52 (11) : 25 - 27
  • [7] Enhancing Research into Usable Privacy and Security
    Birge, Colin
    SIGDOC'09: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON DESIGN OF COMMUNICATION, 2009, : 221 - 225
  • [8] Security and Privacy in Distributed Information Management
    Ogiela, Marek R.
    Ogiela, Lidia
    Ogiela, Urszula
    2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2014, : 73 - 78
  • [9] The Personal Information Privacy Protection Strategy in Social Security Information System
    Wang, Xuefang
    Xue, Hongrong
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 2, 2012, 289 : 718 - +
  • [10] Game theoretical analysis of usable security and privacy
    Justine, Cynara
    Prasad, Rendhir R.
    Thomas, Ciza
    SECURITY AND PRIVACY, 2021, 4 (05):