Usable privacy and security for personal information management

被引:15
|
作者
Karat, CM [1 ]
Brodie, C [1 ]
Karat, J [1 ]
机构
[1] IBM Corp, TJ Watson Res Ctr, Hawthorne, NY 10532 USA
关键词
D O I
10.1145/1107458.1107491
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
IBM T.J. Watson Research Center in Hawthorne, NY, focuses on the design and development of policy SPARCLE, authoring and transformation tools that enable organizations to create machine-readable policies for real-time enforcement decisions. Usable privacy and security technology is a critical need in the management of personal information, and should be a part of the initial design considerations for technology applications, systems, and devices that involves personal information collection, access, and communications. SPARCLE will enable individuals to be able to know that the policies are enforced within the organizations by their own processes. The prototype workbench transforms natural language rules through the use of natural language parsing technology into machine-readable XML code. The tools promise to give organizations a verifiable path from the written form of privacy rule to real-time enforcement decisions regarding access to personal information.
引用
收藏
页码:56 / 57
页数:2
相关论文
共 50 条
  • [21] Privacy of Personal Information
    Mondal S.
    Gharote M.S.
    Lodha S.P.
    Queue, 2022, 20 (03): : 41 - 87
  • [22] Information security and privacy
    Pieprzyk, J
    Safavi-Naini, R
    AUSTRALIAN COMPUTER JOURNAL, 1999, 31 (02): : 33 - 33
  • [23] INFORMATION SECURITY AND PRIVACY
    Bui, Tung
    Clemons, Eric
    Streff, Kevin
    PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 4702 - 4702
  • [24] A Study on Information Security Management with Personal Data Protection
    Huang, Chien-Cheng
    Farn, Kwo-Jean
    Lin, Frank Yeong-Sung
    2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 624 - 630
  • [25] Research on the personal privacy information protection problem based on computer security technology
    Zhong, Shuangxi
    Zhang, Min
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 917 - 923
  • [26] Prototyping Usable Privacy and Security Systems: Insights from Experts
    Mathis, Florian
    Vaniea, Kami
    Khamis, Mohamed
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2022, 38 (05) : 468 - 490
  • [27] Fifteenth symposium on usable privacy and security message from the chairs
    Lipford, Heather Richter
    Mazurek, Michelle
    Reeder, Rob
    Proceedings of the 15th Symposium on Usable Privacy and Security, SOUPS 2019, 2019,
  • [28] INTEGRATED INCIDENT MANAGEMENT MODEL FOR DATA PRIVACY AND INFORMATION SECURITY
    Dombora, Sandor
    XIV INTERNATIONAL MAY CONFERENCE ON STRATEGIC MANAGEMENT, VOL XIV, ISSUE (1) (2018), 2018, 14 (01): : 319 - 328
  • [29] Security and Privacy in Information Management in a Distributed Environment for Public Organizations
    Toapanta, Segundo Moises Toapanta
    Teran Terranova, Yaritza Julieth
    Naranjo Sanchez, Bertha Alice
    Mafla Gallegos, Luis Enrique
    FUZZY SYSTEMS AND DATA MINING VI, 2020, 331 : 378 - 389
  • [30] A usable security paradigm for information asset protection
    Ronchi, C
    Zakhidov, S
    ISSE 2005 - Securing Electronic Business Processes, 2005, : 432 - 439