A Model-Based Privacy Compliance Checker

A Model-Based Privacy Compliance Checker

Siani Pearson, Damien Allison
Copyright: © 2012 |Pages: 18
ISBN13: 9781613503232|ISBN10: 1613503237|EISBN13: 9781613503249
DOI: 10.4018/978-1-61350-323-2.ch611
Cite Chapter Cite Chapter

MLA

Pearson, Siani, and Damien Allison. "A Model-Based Privacy Compliance Checker." Cyber Crime: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, IGI Global, 2012, pp. 1379-1396. https://doi.org/10.4018/978-1-61350-323-2.ch611

APA

Pearson, S. & Allison, D. (2012). A Model-Based Privacy Compliance Checker. In I. Management Association (Ed.), Cyber Crime: Concepts, Methodologies, Tools and Applications (pp. 1379-1396). IGI Global. https://doi.org/10.4018/978-1-61350-323-2.ch611

Chicago

Pearson, Siani, and Damien Allison. "A Model-Based Privacy Compliance Checker." In Cyber Crime: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, 1379-1396. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-61350-323-2.ch611

Export Reference

Mendeley
Favorite

Abstract

Increasingly, e-business organisations are coming under pressure to be compliant to a range of privacy legislation, policies and best practice. There is a clear need for high-level management and administrators to be able to assess in a dynamic, customisable way the degree to which their enterprise complies with these. We outline a solution to this problem in the form of a model-driven automated privacy process analysis and configuration checking system. This system models privacy compliance constraints, automates the assessment of the extent to which a particular computing environment is compliant and generates dashboard-style reports that highlight policy failures. We have developed a prototype that provides this functionality in the context of governance audit; this includes the development of software agents to gather information on-the-fly regarding selected privacy enhancing technologies and other aspects of enterprise system configuration. This approach may also be tailored to enhance the assurance provided by existing governance tools.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.