Pen-based interaction techniques for organizing material on an electronic whiteboard
Proceedings of the 10th annual ACM symposium on User interface software and technology
Toward a secure system engineering methodolgy
Proceedings of the 1998 workshop on New security paradigms
Privacy-enhancing technologies for the Internet
COMPCON '97 Proceedings of the 42nd IEEE International Computer Conference
Bilateral E-services Negotiation Under Uncertainty
SAINT '03 Proceedings of the 2003 Symposium on Applications and the Internet
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Hi-index | 0.00 |
The growth of the Internet has been accompanied by the growth of e-services (e.g. e-commerce, e-health). This proliferation of e-services has put large quantities of customer private information in the hands of service providers, who in many cases have mishandled the information to the detriment of customer privacy. As a result, government bodies have put in place privacy legislation that spells out the privacy rights of customers and how their private information is to be handled. Service providers are required to comply with this privacy legislation. This paper proposes a cooperative visualization technique that can be employed by service providers to understand how private information flows within their organizations, as a way of identifying privacy risks or vulnerabilities that can lead to violations of privacy legislation. The description of the technique includes a model of how an e-service uses private information, a graphical notation for the visualization, and an application example.