George O.M. Yee

George Yee is a Consultant and an Adjunct Professor with the Dept. of Systems and Computer Engineering, Carleton University, Ottawa, Canada. He was previously a Senior Research Officer for over 7 years in the Information Security Group, National Research Council Canada (NRC). Prior to the NRC, he had significant experience as a member of scientific staff and manager at Bell-Northern Research and Nortel Networks. George received his Ph.D. in Electrical Engineering from Carleton University and is a member of Professional Engineers Ontario. In addition, he is a Certified Information Systems Security Professional (CISSP) and a Certified Software Development Professional (CSDP). George’s research interests as an Adjunct Professor lie in the engineering of reliable systems, involving security, fault tolerance, performance, and correctness.

Publications

Designing Sound Security Metrics
George O.M. Yee. © 2019. 21 pages.
This article begins with an introduction to security metrics, describing the need for security metrics, followed by a discussion of the nature of security metrics, including the...
Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards
George O.M. Yee. © 2012. 420 pages.
Why are tools needed to build privacy into business processes? As in most endeavors, tools can help, and in an application area where, for example, privacy may be resisted in...
Estimating the Privacy Protection Capability of a Web Service Provider
George Yee. © 2012. 22 pages.
The growth of the Internet has been accompanied by the growth of Web services (e.g., e-commerce, e-health, etc.), leading to important provisions put in place to protect the...
Towards Designing E-Services that Protect Privacy
George O. M. Yee. © 2012. 16 pages.
The growth of electronic services (e-services) has resulted in large amounts of personal information in the hands of service organizations like banks, insurance companies, and...
Estimating the Privacy Protection Capability of a Web Service Provider
George O.M. Yee. © 2010. 22 pages.
The growth of the Internet has been accompanied by the growth of Web services (e.g., e-commerce, e-health, etc.), leading to important provisions put in place to protect the...
Security Personalization for Internet and Web Services
George Yee, Larry Korba. © 2010. 25 pages.
The growth of the Internet has been accompanied by the growth of Internet services (e.g., e-commerce, e-health). This proliferation of services and the increasing attacks on them...
Towards Designing E-Services that Protect Privacy
George O. M. Yee. © 2010. 17 pages.
The growth of electronic services (e-services) has resulted in large amounts of personal information in the hands of service organizations like banks, insurance companies, and...
Estimating the Privacy Protection Capability of a Web Service Provider
George O.M. Yee. © 2009. 22 pages.
The growth of the Internet has been accompanied by the growth of Web services (e.g., e-commerce, e-health, etc.), leading to important provisions put in place to protect the...
Security and Privacy in Distance Education
George Yee. © 2009. 8 pages.
Many applications and tools have been developed to support the design and delivery of distance learning courses. Unfortunately, many of these applications have only cursory...
Avoiding Pitfalls in Policy-Based Privacy Management
George O.M. Yee. © 2009. 19 pages.
The growth of the Internet is increasing the deployment of e-services in such areas as e-commerce, e-learning, and e-health. In parallel, the providers and consumers of such...
Building Consumer Trust for Internet E-Commerce
George Yee. © 2009. 15 pages.
The growth of the Internet is increasing the deployment of e-commerce B2C services within such areas as e-retailing, e-learning, and e-health. However, a major impediment to the...
Security Personalization for Internet and Web Services
George O.M. Yee, Larry Korba. © 2008. 23 pages.
The growth of the Internet has been accompanied by the growth of Internet services (e.g., e-commerce, e-health). This proliferation of services and the increasing attacks on them...
Privacy Rights Management: Implementation Scenarios
Larry Korba, Ronggong Song, George Yee. © 2008. 13 pages.
Managing privacy is important because organizations must meet legislative and organizational requirements. Some countries, such as the United States of America, have a patchwork...
Legislative Based for Personal Privacy Policy Specification
George Yee, Larry Korba, Ronggong Song. © 2008. 12 pages.
The growth of the Internet has been accompanied by a proliferation of e-services, especially in the area of e-commerce (e.g., Amazon.com, eBay.com). However, consumers of these...
Privacy Management Architecture Privacy Technologies
Larry Korba, Ronggong Song, George Yee. © 2008. 27 pages.
There have been a number of recent developments in architectures for privacy management. These architectures may be applied to the development of e-services. This chapter...
Privacy and Security in E-Learning
George Yee, Yuefei Xu, Larry Korba, Khalil El-Khatib. © 2008. 17 pages.
For a variety of advantages, universities and other organizations are resorting to e-learning to provide instruction online. While many advances have been made in the mechanics...
Privacy and Security in E-Learning
Khalil El-Khatib, Larry Korba, Yuefei Xu, George Yee. © 2008. 17 pages.
For a variety of advantages, universities and other organizations are resorting to e-learning to provide instruction on-line. While many advances have been made in the mechanics...
Privacy and Trust in Agent-Supported Distributed Learning
Larry Korba, George Yee, Yuefei Xu, Ronggong Song, Andrew S. Patrick, V El-Khatib. © 2008. 32 pages.
The objective of this chapter is to explore the challenges, issues, and solutions associated with satisfying requirements for privacy and trust in agent-supported distributed...
Security and Privacy in Distance Education
George Yee. © 2008. 8 pages.
Many applications and tools have been developed to support the design and delivery of distance learning courses. Unfortunately, many of these applications have only cursory...
Security and Privacy in Distance Education
George Yee. © 2008. 9 pages.
Many applications and tools have been developed to support the design and delivery of distance learning courses. Unfortunately, many of these applications have only cursory...
Trust in E-Services: Technologies, Practices and Challenges
Ronggong Song, Larry Korba, George Yee. © 2007. 334 pages.
The tremendous growth of the Internet is successfully making a variety of e-services a part of citizens' everyday life. E-services such as: Web-banking, Web shopping...
Privacy Rights Management: Implementation Scenarios
Larry Korba, Ronggong Song, George Yee. © 2007. 14 pages.
Managing privacy is important because organizations must meet legislative and organizational requirements. Some countries, such as the United States of America, have a patchwork...
Semi-Automatic Derivation and Application of Personal Privacy Policies
George Yee. © 2007. 18 pages.
The recent fast growth of the Internet has been accompanied by a similarly fast growth in the availability of Internet e-business services (e.g., electronic book seller service...
Privacy and Security in E-Learning
George Yee, Yuefei Xu, Larry Korba, Khalil El-Khatib. © 2007. 24 pages.
For a variety of advantages, universities and other organizations are resorting to e-learning to provide instruction online. While many advances have been made in the mechanics...
Building Consumer Trust for Internet E-Commerce
George Yee. © 2007. 17 pages.
The growth of the Internet is increasing the deployment of e-commerce B2C services within such areas as e-retailing, e-learning, and e-health. However, a major impediment to the...
Privacy Protection for E-Services
George Yee. © 2006. 304 pages.
There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy preserving e-services. Privacy...
Semi-Automated Seeding of Personal Privacy Policies in E-Services
George Yee, Larry Korba. © 2006. 8 pages.
The rapid growth of the Internet has been accompanied by a proliferation of e-services targeting consumers. E-services are available for banking, shopping, learning, government...
Pseudonym Technology for E-Services
Ronggong Song, Larry Korba, George Yee. © 2006. 31 pages.
Pseudonym technology is attracting more and more attention and, together with privacy violations, is becoming a major issue in various e-services. Current e-service systems make...
Privacy Management Architecture Privacy Technologies
Larry Korba, Ronggong Song, George Yee. © 2006. 31 pages.
There have been a number of recent developments in architectures for privacy management. These architectures may be applied to the development of e-services. This chapter...
Legislative Based for Personal Privacy Policy Specification
George Yee, Larry Korba, Ronggong Song. © 2006.
The growth of the Internet has been accompanied by a proliferation of e-services, especially in the area of e-commerce (e.g., Amazon.com, eBay.com). However, consumers of these...
Semiautomatic Derivation and Use of Personal Privacy Policies in E-Business
George Yee, Larry Korba. © 2005. 16 pages.
The growth of the Internet has been accompanied by the growth of Internet e-business services (e.g., electronic bookseller services, electronic stock-transaction services). This...
Privacy and Trust in Agent-Supported Distributed Learning
Larry Korba, George Yee, Yuefei Xu, Song Ronggong, Andrew S Patrick, Khalil El-Khatib. © 2005. 48 pages.
The objective of this chapter is to explore the challenges, issues, and solutions associated with satisfying requirements for privacy and trust in agent-supported distributed...
Privacy and Trust in E-Government
George Yee, Khalil El-Khatib, Larry Korba, Andrew S. Patrick, Ronggong Song, Yuefei Xu. © 2005. 46 pages.
This chapter explores the challenges, issues, and solutions associated with satisfying requirements for privacy and trust in e-government. Accordingly, the first section presents...
Security and Privacy in Distance Education
George Yee. © 2005. 8 pages.
Many applications and tools have been developed to support the design and delivery of distance learning courses. Unfortunately, many of these applications have only cursory...
Privacy Policies and Their Negotiation in Distance Education
George Yee, Larry Korba. © 2004. 28 pages.
This chapter begins by introducing the reader to privacy policies, e-services, and privacy management. It then derives the contents of a privacy policy and explains “policy...
Privacy and Security in E-Learning
Khalil El-Khatib, Larry Korba, Yuefei Xu, George Yee. © 2003. 19 pages.
For a variety of advantages, universities and other organizations are resorting to e-learning to provide instruction on-line. While many advances have been made in the mechanics...