{"title":"组织信息系统中的隐私保护框架","authors":"G. Skinner, Song Han, E. Chang","doi":"10.1109/ICMB.2005.4","DOIUrl":null,"url":null,"abstract":"Preserving privacy and the protection of personally identifiable information (PH) has been of increasing interest over the last few years. Many privacy advocates, and a significant portion of the general public, feared that the new initiatives used in an attempt to fight terrorism, would have a serious impact on an individual's right and ability to protect their privacy. This paper proposes a new framework for preserving privacy for individuals along with the protection of personally identifiable information. We have termed it privacy shield. Through the application of anonymity and privacy principles in design, the privacy protecting separation of data, the use of public key infrastructure, and the application of our information system Hippocratic policies, we provide a framework of privacy shield to protect an information system user's personal data.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A framework of privacy shield in organizational information systems\",\"authors\":\"G. Skinner, Song Han, E. Chang\",\"doi\":\"10.1109/ICMB.2005.4\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Preserving privacy and the protection of personally identifiable information (PH) has been of increasing interest over the last few years. Many privacy advocates, and a significant portion of the general public, feared that the new initiatives used in an attempt to fight terrorism, would have a serious impact on an individual's right and ability to protect their privacy. This paper proposes a new framework for preserving privacy for individuals along with the protection of personally identifiable information. We have termed it privacy shield. Through the application of anonymity and privacy principles in design, the privacy protecting separation of data, the use of public key infrastructure, and the application of our information system Hippocratic policies, we provide a framework of privacy shield to protect an information system user's personal data.\",\"PeriodicalId\":275276,\"journal\":{\"name\":\"International Conference on Mobile Business (ICMB'05)\",\"volume\":\"102 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-07-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Mobile Business (ICMB'05)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICMB.2005.4\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Mobile Business (ICMB'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMB.2005.4","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A framework of privacy shield in organizational information systems
Preserving privacy and the protection of personally identifiable information (PH) has been of increasing interest over the last few years. Many privacy advocates, and a significant portion of the general public, feared that the new initiatives used in an attempt to fight terrorism, would have a serious impact on an individual's right and ability to protect their privacy. This paper proposes a new framework for preserving privacy for individuals along with the protection of personally identifiable information. We have termed it privacy shield. Through the application of anonymity and privacy principles in design, the privacy protecting separation of data, the use of public key infrastructure, and the application of our information system Hippocratic policies, we provide a framework of privacy shield to protect an information system user's personal data.