E-Services Privacy: Needs, Approaches, Challenges, Models, and Dimensions

E-Services Privacy: Needs, Approaches, Challenges, Models, and Dimensions

Osama Shata (Specializing Engineering Office, Egypt)
Copyright: © 2006 |Pages: 21
DOI: 10.4018/978-1-59140-914-4.ch004
OnDemand PDF Download:
$37.50

Abstract

This chapter introduces several aspects related to e-privacy such as needs, approaches, challenges, and models. It argues that e-privacy protection, although being of interest to many parties such as industry, government, and individuals, is very difficult to achieve since these stakeholders often have conflicting needs and requirements and may even have conflicting understanding of e-privacy. So finding one model or one approach to e-privacy protection that may satisfy these stakeholders is a challenging task. Furthermore, the author hopes that this chapter will present an acceptable definition for e-privacy and use this definition to discuss various aspects of e-privacy protection such as principles of developing e-privacy policies, individuals and organizations needs of various privacy issues, challenges of adopting and coping with e-privacy policies, tools and models to support e-privacy protection in both public and private networks, related legislations that protect or constraint e-privacy, and spamming and Internet censorship in the context of e-privacy. The author hopes that understanding these aspects will assist researchers in developing policies and systems that will bring the conflict in e-privacy protection needs of individuals, industry, and government into better alignment.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Acknowledgments
Chapter 1
Scott Flinn, Scott Buffett
This chapter discusses privacy from the perspective of the consumer of e-services. It proposes a technique for risk management assessment designed... Sample PDF
Exercising the Right of Privacy
$37.50
Chapter 2
Barbara Carminati, Elena Ferrari, Patrick C.K. Hung
A Web service is a software system that supports interoperable application-to-application interactions over a network. Web services are based on a... Sample PDF
Privacy Issues in the Web Services Architecture
$37.50
Chapter 3
Maria Y.L. Fung, John Paynter
The increased use of the Internet and latest information technologies such as wireless computing is revolutionizing the healthcare industry by... Sample PDF
The Impact of Information Technology in Healthcare Privacy
$37.50
Chapter 4
Osama Shata
This chapter introduces several aspects related to e-privacy such as needs, approaches, challenges, and models. It argues that e-privacy protection... Sample PDF
E-Services Privacy: Needs, Approaches, Challenges, Models, and Dimensions
$37.50
Chapter 5
Martine C. Menard
This chapter discusses how implementing network and computer security can protect privacy of Internet users. It argues that personal identifiable... Sample PDF
Privacy Protection Through Security
$37.50
Chapter 6
Ronggong Song, Larry Korba, George Yee
Pseudonym technology is attracting more and more attention and, together with privacy violations, is becoming a major issue in various e-services.... Sample PDF
Pseudonym Technology for E-Services
$37.50
Chapter 7
Carlisle Adams, Katerine Barbieri
This chapter presents technological measures for privacy enforcement (techniques that can be used to ensure that an organization’s privacy promises... Sample PDF
Privacy Enforcement in E-Services Environments
$37.50
Chapter 8
Ed Simon
This chapter describes how two new XML-based technologies, XACML (eXtensible Access Control Markup Language) and SAML (Security Assertion Markup... Sample PDF
Protecting Privacy Using XML, XACML, and SAML
$37.50
Chapter 9
Larry Korba, Ronggong Song, George Yee
There have been a number of recent developments in architectures for privacy management. These architectures may be applied to the development of... Sample PDF
Privacy Management Architecture Privacy Technologies
$37.50
Chapter 10
Michael Weis, Babak Esfandiari
In this chapter we propose a modeling framework for assessing privacy technologies. The main contribution of the framework is that it allows us to... Sample PDF
Modeling Method for Assessing Privacy Technologies
$37.50
Chapter 11
George Yee, Larry Korba, Ronggong Song
The growth of the Internet has been accompanied by a proliferation of e-services, especially in the area of e-commerce (e.g., Amazon.com, eBay.com).... Sample PDF
Legislative Based for Personal Privacy Policy Specification
$37.50
About the Authors