|
|
|
|
LEADER |
00000nam a2200000ui 4500 |
001 |
b10030302 |
003 |
CoU |
005 |
20160918164205.0 |
006 |
m eo d |
007 |
cr cn |||m|||a |
008 |
160918s2016 caua foab 000 0 eng d |
020 |
|
|
|a 9781627059879
|q ebook
|
020 |
|
|
|z 9781627054256
|q print
|
024 |
7 |
|
|a 10.2200/S00724ED1V01Y201607SPT017
|
035 |
|
|
|a (MOCL)sdl201607sdl017
|
035 |
|
|
|a (CaBNVSL)swl00406839
|
035 |
|
|
|a (OCoLC)958585817
|
040 |
|
|
|a CaBNVSL
|b eng
|e rda
|c CaBNVSL
|d CaBNVSL
|
050 |
|
4 |
|a BF637.P74
|b .D46 2016
|
100 |
1 |
|
|a De, Sourya Joyee,
|e author.
|0 http://id.loc.gov/authorities/names/no2016154888.
|
245 |
1 |
0 |
|a Privacy risk analysis /
|c Sourya Joyee De and Daniel Le Métayer.
|
264 |
|
1 |
|a [San Rafael, California] :
|b Morgan & Claypool,
|c 2016.
|
300 |
|
|
|a 1 PDF (xv, 117 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent.
|
337 |
|
|
|a computer
|b c
|2 rdamedia.
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier.
|
490 |
1 |
|
|a Synthesis lectures on information security, privacy, and trust,
|x 1945-9750 ;
|v # 17.
|
500 |
|
|
|a Part of: Synthesis digital library of engineering and computer science.
|
504 |
|
|
|a Includes bibliographical references (pages 101-115)
|
505 |
0 |
|
|a 1. Introduction --
|
505 |
8 |
|
|a 2. Terminology -- 2.1 Personal data -- 2.2 Stakeholders -- 2.3 Risk sources -- 2.4 Feared events -- 2.5 Privacy harms -- 2.6 Privacy risks -- 2.7 Privacy risk analysis --
|
505 |
8 |
|
|a 3. Processing system -- 3.1 System attributes -- 3.2 Illustration: the BEMS system --
|
505 |
8 |
|
|a 4. Personal data -- 4.1 European and U.S. views -- 4.2 Identifiability and anonymization -- 4.3 Categories of data -- 4.4 Personal data attributes -- 4.4.1 Attributes related to the nature of the data -- 4.4.2 Attributes related to the format of the data -- 4.4.3 Attributes related to the context -- 4.4.4 Attributes related to control -- 4.5 Illustration: the BEMS system --
|
505 |
8 |
|
|a 5. Stakeholders -- 5.1 The nature of the stakeholders -- 5.2 Stakeholder categories -- 5.3 Stakeholder attributes -- 5.4 Illustration: the BEMS system --
|
505 |
8 |
|
|a 6. Risk sources -- 6.1 Risk source attributes -- 6.1.1 Nature of the risk sources -- 6.1.2 Motivation -- 6.1.3 Resources -- 6.2 Illustration: the BEMS system --
|
505 |
8 |
|
|a 7. Feared events -- 7.1 Variations in terminology -- 7.2 Feared event categories -- 7.3 Feared event attributes -- 7.4 Illustration: the BEMS system --
|
505 |
8 |
|
|a 8. Privacy harms -- 8.1 The nature of privacy harms -- 8.1.1 Variations on privacy harms -- 8.1.2 Recognition of privacy harms by law -- 8.2 Categories of privacy harms -- 8.3 Attributes of privacy harms -- 8.3.1 Victims -- 8.3.2 Extent -- 8.3.3 Severity -- 8.4 Illustration: the BEMS system --
|
505 |
8 |
|
|a 9. Privacy risk analysis -- 9.1 Scope and objectives of a PIA -- 9.2 DPIA template for smart grid and smart metering -- 9.3 Privacy risk analysis in existing frameworks -- 9.4 Key steps of a privacy risk analysis -- 9.5 Illustration: evaluation of the risks for the BEMS system --
|
505 |
8 |
|
|a 10. Conclusion -- A. Summary of categories and attributes of the components of a privacy risk analysis -- B. Definitions of personal data across regulations and standards -- C. Definitions of stakeholders across regulations and standards -- D. Privacy risk analysis components in existing frameworks -- Bibliography -- Authors' biographies.
|
520 |
3 |
|
|a This fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis. The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or system that processes personal data. However, if existing privacy impact assessment frameworks and guidelines provide a good deal of details on organizational aspects (including budget allocation, resource allocation, stakeholder consultation, etc.), they are much vaguer on the technical part, in particular on the actual risk assessment task. For privacy impact assessments to keep up their promises and really play a decisive role in enhancing privacy protection, they should be more precise with regard to these technical aspects. This book is an excellent resource for anyone developing and/or currently running a risk analysis as it defines the notions of personal data, stakeholders, risk sources, feared events, and privacy harms all while showing how these notions are used in the risk analysis process. It includes a running smart grids example to illustrate all the notions discussed in the book.
|
588 |
|
|
|a Title from PDF title page (viewed on September 18, 2016)
|
650 |
|
0 |
|a Privacy
|x Risk assessment.
|
700 |
1 |
|
|a Le Métayer, D.
|q (Daniel),
|e author.
|0 http://id.loc.gov/authorities/names/n91075009
|1 http://isni.org/isni/0000000110374653.
|
776 |
0 |
8 |
|i Print version:
|z 9781627054256.
|
830 |
|
0 |
|a Synthesis lectures on information security, privacy, and trust (Online) ;
|v # 17.
|0 http://id.loc.gov/authorities/names/no2008164680.
|
856 |
4 |
8 |
|u https://colorado.idm.oclc.org/login?url=http://dx.doi.org/10.2200/S00724ED1V01Y201607SPT017
|z Full Text (via Morgan & Claypool)
|
907 |
|
|
|a .b10030302x
|b 03-19-20
|c 03-12-18
|
998 |
|
|
|a web
|b 03-12-18
|c b
|d b
|e -
|f eng
|g cau
|h 0
|i 1
|
907 |
|
|
|a .b10030302x
|b 07-24-19
|c 03-12-18
|
944 |
|
|
|a MARS - RDA ENRICHED
|
907 |
|
|
|a .b10030302x
|b 03-12-18
|c 03-12-18
|
956 |
|
|
|a Synthesis
|
999 |
f |
f |
|i 94363bfb-91f1-5521-b696-40d914106aed
|s 920b876c-d3c5-5d43-96c4-36a9554e7bad
|
952 |
f |
f |
|p Can circulate
|a University of Colorado Boulder
|b Online
|c Online
|d Online
|e BF637.P74 .D46 2016
|h Library of Congress classification
|i web
|n 1
|