Privacy risk analysis / Sourya Joyee De and Daniel Le Métayer.
Saved in:
Online Access: |
Full Text (via Morgan & Claypool) |
---|---|
Main Authors: | , |
Format: | eBook |
Language: | English |
Published: |
[San Rafael, California] :
Morgan & Claypool,
2016.
|
Series: | Synthesis lectures on information security, privacy, and trust (Online) ;
# 17. |
Subjects: |
Table of Contents:
- 1. Introduction
- 2. Terminology
- 2.1 Personal data
- 2.2 Stakeholders
- 2.3 Risk sources
- 2.4 Feared events
- 2.5 Privacy harms
- 2.6 Privacy risks
- 2.7 Privacy risk analysis
- 3. Processing system
- 3.1 System attributes
- 3.2 Illustration: the BEMS system
- 4. Personal data
- 4.1 European and U.S. views
- 4.2 Identifiability and anonymization
- 4.3 Categories of data
- 4.4 Personal data attributes
- 4.4.1 Attributes related to the nature of the data
- 4.4.2 Attributes related to the format of the data
- 4.4.3 Attributes related to the context
- 4.4.4 Attributes related to control
- 4.5 Illustration: the BEMS system
- 5. Stakeholders
- 5.1 The nature of the stakeholders
- 5.2 Stakeholder categories
- 5.3 Stakeholder attributes
- 5.4 Illustration: the BEMS system
- 6. Risk sources
- 6.1 Risk source attributes
- 6.1.1 Nature of the risk sources
- 6.1.2 Motivation
- 6.1.3 Resources
- 6.2 Illustration: the BEMS system
- 7. Feared events
- 7.1 Variations in terminology
- 7.2 Feared event categories
- 7.3 Feared event attributes
- 7.4 Illustration: the BEMS system
- 8. Privacy harms
- 8.1 The nature of privacy harms
- 8.1.1 Variations on privacy harms
- 8.1.2 Recognition of privacy harms by law
- 8.2 Categories of privacy harms
- 8.3 Attributes of privacy harms
- 8.3.1 Victims
- 8.3.2 Extent
- 8.3.3 Severity
- 8.4 Illustration: the BEMS system
- 9. Privacy risk analysis
- 9.1 Scope and objectives of a PIA
- 9.2 DPIA template for smart grid and smart metering
- 9.3 Privacy risk analysis in existing frameworks
- 9.4 Key steps of a privacy risk analysis
- 9.5 Illustration: evaluation of the risks for the BEMS system
- 10. Conclusion
- A. Summary of categories and attributes of the components of a privacy risk analysis
- B. Definitions of personal data across regulations and standards
- C. Definitions of stakeholders across regulations and standards
- D. Privacy risk analysis components in existing frameworks
- Bibliography
- Authors' biographies.