Privacy Compliance Requirements in Workflow Environments

Privacy Compliance Requirements in Workflow Environments

Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Nikolaos L. Dellas, Dimitra I. Kaklamani, Iakovos S. Venieris
ISBN13: 9781522571131|ISBN10: 1522571132|EISBN13: 9781522571148
DOI: 10.4018/978-1-5225-7113-1.ch092
Cite Chapter Cite Chapter

MLA

Koukovini, Maria N., et al. "Privacy Compliance Requirements in Workflow Environments." Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2019, pp. 1845-1866. https://doi.org/10.4018/978-1-5225-7113-1.ch092

APA

Koukovini, M. N., Papagiannakopoulou, E. I., Lioudakis, G. V., Dellas, N. L., Kaklamani, D. I., & Venieris, I. S. (2019). Privacy Compliance Requirements in Workflow Environments. In I. Management Association (Ed.), Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications (pp. 1845-1866). IGI Global. https://doi.org/10.4018/978-1-5225-7113-1.ch092

Chicago

Koukovini, Maria N., et al. "Privacy Compliance Requirements in Workflow Environments." In Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1845-1866. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7113-1.ch092

Export Reference

Mendeley
Favorite

Abstract

Workflow management systems are used to run day-to-day applications in numerous domains, often including exchange and processing of sensitive data. Their native “leakage-proneness,” being the consequence of their distributed and collaborative nature, calls for sophisticated mechanisms able to guarantee proper enforcement of the necessary privacy protection measures. Motivated by the principles of Privacy by Design and its potential for workflow environments, this chapter investigates the associated issues, challenges, and requirements. With the legal and regulatory provisions regarding privacy in information systems as a baseline, the chapter elaborates on the challenges and derived requirements in the context of workflow environments, taking into account the particular needs and implications of the latter. Further, it highlights important aspects that need to be considered regarding, on the one hand, the incorporation of privacy-enhancing features in the workflow models themselves and, on the other, the evaluation of the latter against privacy provisions.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.