Privacy policies and practices: inside the organizational maze
Communications of the ACM
A study of student privacy issues at Stanford University
Communications of the ACM - Robots: intelligence, versatility, adaptivity
Privacy of medical records: IT implications of HIPAA
ACM SIGCAS Computers and Society
Use of a P3P user agent by early adopters
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
A Privacy Policy Model for Enterprises
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Patient Privacy in Electronic Prescription Transfer
IEEE Security and Privacy
Web Privacy with P3p
A security policy model for clinical information systems
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Privacy Technology Lessons from Healthcare
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Natural-Language Processing Support for Developing Policy-Governed Software Systems
TOOLS '01 Proceedings of the 39th International Conference and Exhibition on Technology of Object-Oriented Languages and Systems (TOOLS39)
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Inside JetBlue's Privacy Policy Violations
IEEE Security and Privacy
Privacy in information technology: designing to enable privacy policy management in organizations
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
The talent system: TEXTRACT architecture and data model
SEALTS '03 Proceedings of the HLT-NAACL 2003 workshop on Software engineering and architecture of language technology systems - Volume 8
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
A citizen privacy protection model for e-government mashup services
dg.o '08 Proceedings of the 2008 international conference on Digital government research
Collective information practice: emploring privacy and security as social and cultural phenomena
Human-Computer Interaction
Privacy protection in government mashups
Information Polity - Government Information Sharing and Integration: Combining the Social and the Technical. Papers from the 9th International Conference on Digital Government Research (d.g.o.2008)
Optimizing a policy authoring framework for security and privacy policies
Proceedings of the Sixth Symposium on Usable Privacy and Security
Risk communication design: video vs. text
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
A machine learning solution to assess privacy policy completeness: (short paper)
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Automated extraction of security policies from natural-language software documents
Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering
Are Online Privacy Policies Readable?
International Journal of Information Security and Privacy
User Perceptions of Security Technologies
International Journal of Information Security and Privacy
Tuning an HCI curriculum for master students to address interactive critical systems aspects
HCI'13 Proceedings of the 15th international conference on Human-Computer Interaction: human-centred design approaches, methods, tools, and environments - Volume Part I
Hi-index | 0.00 |
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980's and 1990's. Design to make information easily accessible, without particular attention to issues such as whether an individual had a desire or right to control access to and use of particular information was seen as the more pressing goal. We believe that there will be an increasing awareness of a fundamental need to address privacy concerns in information technology, and that doing so will require an understanding of policies that govern information use as well as the development of technologies that can implement such policies. The research reported here describes our efforts to design a privacy management workbench which facilitates privacy policy authoring, implementation, and compliance monitoring. This case study highlights the work of identifying organizational privacy requirements, analyzing existing technology, on-going research to identify approaches that address these requirements, and iteratively designing and validating a prototype with target users for flexible privacy technologies.