publication . Thesis

Enhancing user's privacy : developing a model for managing and testing the lifecycle of consent and revocation

Agrafiotis, Ioannis;
Open Access English
  • Country: United Kingdom
Abstract
Increasingly, people turn to the Internet for access to services, which often require\ud disclosure of a significant amount of personal data. Networked technologies have\ud enabled an explosive growth in the collection, storage and processing of personal\ud information with notable commercial potential. However, there are asymmetries in\ud relation to how people are able to control their own information when handled by\ud enterprises. This raises significant privacy concerns and increases the risk of privacy\ud breaches, thus creating an imperative need for mechanisms offering information\ud control functionalities.\ud To address the lack of controls in online e...
Subjects
free text keywords: T1
Related Organizations
144 references, page 1 of 10

[1] http://www.networkworld.com/news/2012/012612-privacy-scandals-255357. html?hpg1=bn, 2012.

[3] A. Acquisti. Nudging privacy: The behavioral economics of personal information. Security & Privacy, IEEE, 7(6):82{85, 2009.

[4] A. Acquisti and R. Gross. Imagined communities: Awareness, information sharing, and privacy on the facebook. In Privacy enhancing technologies, pages 36{58. Springer, 2006. [OpenAIRE]

[5] A. Acquisti and J. Grossklags. Privacy attitudes and privacy behavior. Economics of information security, pages 165{178, 2004.

[6] I. Agra otis, P. Bramhall, S Creese, M. Goldsmith, L. Hooper, P. Hopkins, K. Hughes, N Mo at, and S. Pearson. Encore compliance framework. Technical report, Technical Report D5.1, Computer Science Department of Oxford, Oxford, 2012.

[7] I. Agra otis, S. Creese, and M. Goldsmith. Developing a strategy for automated privacy testing suites. Privacy and Identity Management for Life, pages 32{44, 2012.

[8] I. Agra otis, S. Creese, and M. Goldsmith. Formalising requirements for a biobank case study using a logic for consent and revocation. Privacy and Identity Management for Life, pages 232{244, 2012.

[9] I. Agra otis, S. Creese, M. Goldsmith, and N. Mo at. Requirements formalisation. Technical report, Technical Report, University of Oxford, Department of Computer Science, 2012.

[10] I. Agra otis, S. Creese, M. Goldsmith, and N. Papanikolaou. Reaching for informed revocation: Shutting o the tap on personal data. Privacy and Identity Management for Life, pages 246{258, 2010.

[11] I. Agra otis, S. Creese, M. Goldsmith, and N. Papanikolaou. Applying formal methods to detect and resolve ambiguities in privacy requirements. Privacy and Identity Management for Life, pages 271{282, 2011.

[12] R. Agrawal, P. Bird, T. Grandison, J. Kiernan, S. Logan, and W. Rjaibi. Extending relational database systems to automatically enforce privacy policies. In Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on, pages 1013{1022. IEEE, 2005. [OpenAIRE]

[13] B.J. Alge, G.A. Ballinger, S. Tangirala, and J.L. Oakley. Information privacy in organizations: Empowering creative and extrarole performance. Journal of Applied Psychology, 91(1):221, 2006. [OpenAIRE]

[14] A.L. Allen. Uneasy access: Privacy for women in a free society. Rowman & Littleeld Pub Inc, 1988.

[15] A.L. Allen. Coercing privacy. Wm. & Mary L. Rev., 40:723, 1998.

[16] I.O. Angell and S. Smithson. Information Systems Management. Macmillan, London, 1991.

144 references, page 1 of 10
Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue