Privacy risk analysis / Sourya Joyee De and Daniel Le Métayer.

Saved in:
Bibliographic Details
Online Access: Full Text (via Morgan & Claypool)
Main Authors: De, Sourya Joyee (Author), Le Métayer, D. (Daniel) (Author)
Format: eBook
Language:English
Published: [San Rafael, California] : Morgan & Claypool, 2016.
Series:Synthesis lectures on information security, privacy, and trust (Online) ; # 17.
Subjects:
Table of Contents:
  • 1. Introduction
  • 2. Terminology
  • 2.1 Personal data
  • 2.2 Stakeholders
  • 2.3 Risk sources
  • 2.4 Feared events
  • 2.5 Privacy harms
  • 2.6 Privacy risks
  • 2.7 Privacy risk analysis
  • 3. Processing system
  • 3.1 System attributes
  • 3.2 Illustration: the BEMS system
  • 4. Personal data
  • 4.1 European and U.S. views
  • 4.2 Identifiability and anonymization
  • 4.3 Categories of data
  • 4.4 Personal data attributes
  • 4.4.1 Attributes related to the nature of the data
  • 4.4.2 Attributes related to the format of the data
  • 4.4.3 Attributes related to the context
  • 4.4.4 Attributes related to control
  • 4.5 Illustration: the BEMS system
  • 5. Stakeholders
  • 5.1 The nature of the stakeholders
  • 5.2 Stakeholder categories
  • 5.3 Stakeholder attributes
  • 5.4 Illustration: the BEMS system
  • 6. Risk sources
  • 6.1 Risk source attributes
  • 6.1.1 Nature of the risk sources
  • 6.1.2 Motivation
  • 6.1.3 Resources
  • 6.2 Illustration: the BEMS system
  • 7. Feared events
  • 7.1 Variations in terminology
  • 7.2 Feared event categories
  • 7.3 Feared event attributes
  • 7.4 Illustration: the BEMS system
  • 8. Privacy harms
  • 8.1 The nature of privacy harms
  • 8.1.1 Variations on privacy harms
  • 8.1.2 Recognition of privacy harms by law
  • 8.2 Categories of privacy harms
  • 8.3 Attributes of privacy harms
  • 8.3.1 Victims
  • 8.3.2 Extent
  • 8.3.3 Severity
  • 8.4 Illustration: the BEMS system
  • 9. Privacy risk analysis
  • 9.1 Scope and objectives of a PIA
  • 9.2 DPIA template for smart grid and smart metering
  • 9.3 Privacy risk analysis in existing frameworks
  • 9.4 Key steps of a privacy risk analysis
  • 9.5 Illustration: evaluation of the risks for the BEMS system
  • 10. Conclusion
  • A. Summary of categories and attributes of the components of a privacy risk analysis
  • B. Definitions of personal data across regulations and standards
  • C. Definitions of stakeholders across regulations and standards
  • D. Privacy risk analysis components in existing frameworks
  • Bibliography
  • Authors' biographies.