Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards

Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards

George O.M. Yee (Aptus Research Solutions Inc. and Carleton University, Canada)
Indexed In: SCOPUS
Release Date: December, 2011|Copyright: © 2012 |Pages: 420
DOI: 10.4018/978-1-61350-501-4
ISBN13: 9781613505014|ISBN10: 1613505019|EISBN13: 9781613505021
Hardcover:
Available
$185.00
TOTAL SAVINGS: $185.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$166.50
List Price: $185.00
10% Discount:-$18.50
TOTAL SAVINGS: $18.50
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$220.00
TOTAL SAVINGS: $220.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Why are tools needed to build privacy into business processes? As in most endeavors, tools can help, and in an application area where, for example, privacy may be resisted in favor of the fallacious argument of higher profits, tools are needed. Most professionals have heard of the Privacy Impact Assessment (Warren et al., 2008). This is a tool that evaluates the impact to privacy of a proposed change to business practice. Prior to the introduction of this tool, such impacts to privacy were either done in an ineffective way or not even considered.

Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards is a collection of research on privacy protection technologies and their application in business organizations. Providing insights and support professionals concerned with the management of expertise, knowledge, information, and organizational development in different types of business organizations and environments. This book will be composed of professionals and researchers working in the field of privacy protection in various disciplines.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Complying with Privacy Laws and Regulations
  • Consumer Private Information in Business Organizations
  • Discovering or Delimiting Private Information
  • Facilitating the Adoption of Privacy Protection Measures
  • Gauging the Effectiveness of Privacy Protection Measures
  • Introducing Privacy Protection Measures
  • Legal Aspects of Privacy Protection in Business
  • Privacy Enhancing Technologies Applicable to Business
  • Privacy Related Business Standards
  • Requirements for Privacy Protection Measures
Reviews and Testimonials

I would highly recommend this book to anyone who is interested in conducting research on privacy, getting educated on privacy, or who wishes to enforce privacy policies.

– Dr. Bhavani Thuraisingham, University of Texas at Dallas, USA
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
George Yee is a Consultant and an Adjunct Professor with the Dept. of Systems and Computer Engineering, Carleton University, Ottawa, Canada. He was previously a Senior Research Officer for over 7 years in the Information Security Group, National Research Council Canada (NRC). Prior to the NRC, he had significant experience as a member of scientific staff and manager at Bell-Northern Research and Nortel Networks. George received his Ph.D. in Electrical Engineering from Carleton University and is a member of Professional Engineers Ontario. In addition, he is a Certified Information Systems Security Professional (CISSP) and a Certified Software Development Professional (CSDP). George’s research interests as an Adjunct Professor lie in the engineering of reliable systems, involving security, fault tolerance, performance, and correctness.
Editorial Policy
In order to ensure the highest ethical practices are achieved for each book, IGI Global provides a full document of policies and guidelines that all editors, authors, and reviewers are expected to follow. View Full Editorial Policy
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.
Editorial Review Board
  • Carlisle Adams, University of Ottawa, Canada
  • Martin Gilje Jaatun, SINTEF ICT, Norway
  • Latifur Khan, University of Texas at Dallas, USA
  • Steve Marsh, Communications Research Centre Canada, Canada
  • Andrew S. Patrick, Office of the Privacy Commissioner of Canada, Canada
  • Siani Pearson, HP Labs, UK
  • Ed Simon, XMLsec Inc., Canada 
  • Ronggong Song, Defence Research and Development Canada, Canada