Usable privacy and security for personal information management

被引:16
|
作者
Karat, CM [1 ]
Brodie, C [1 ]
Karat, J [1 ]
机构
[1] IBM Corp, TJ Watson Res Ctr, Hawthorne, NY 10532 USA
关键词
D O I
10.1145/1107458.1107491
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
IBM T.J. Watson Research Center in Hawthorne, NY, focuses on the design and development of policy SPARCLE, authoring and transformation tools that enable organizations to create machine-readable policies for real-time enforcement decisions. Usable privacy and security technology is a critical need in the management of personal information, and should be a part of the initial design considerations for technology applications, systems, and devices that involves personal information collection, access, and communications. SPARCLE will enable individuals to be able to know that the policies are enforced within the organizations by their own processes. The prototype workbench transforms natural language rules through the use of natural language parsing technology into machine-readable XML code. The tools promise to give organizations a verifiable path from the written form of privacy rule to real-time enforcement decisions regarding access to personal information.
引用
收藏
页码:56 / 57
页数:2
相关论文
共 50 条
  • [41] Advances in Information Security and Privacy
    Lax, Gianluca
    Russo, Antonia
    APPLIED SCIENCES-BASEL, 2022, 12 (16):
  • [42] Workshop on Usable Privacy & Security for wearable and domestic ubIquitous DEvices (UPSIDE)
    Jung, Jaeyeon
    Kohno, Tadayoshi
    PROCEEDINGS OF THE 2014 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING (UBICOMP'14 ADJUNCT), 2014, : 1279 - 1282
  • [43] Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home
    Nurse, Jason R. C.
    Atamli, Ahmad
    Martin, Andrew
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY, AND TRUST, 2016, 9750 : 255 - 267
  • [44] Research on Data Security and Privacy Protection Strategies in Hospital Information Management
    Zhang, Xiuying
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [45] Personal and Ubiquitous Computing Issue on privacy and security
    Schmandt, Chris
    Ackerman, Mark
    PERSONAL AND UBIQUITOUS COMPUTING, 2004, 8 (06) : 389 - 390
  • [46] Chatbot Security and Privacy in the Age of Personal Assistants
    Ye, Winson
    Li, Qun
    2020 IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC 2020), 2020, : 388 - 393
  • [47] A framework for protecting personal information and privacy
    Zheng, Hongying
    Yuan, Quan
    Chen, Jianyong
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2867 - 2874
  • [48] Personal Information Classification for Privacy Negotiation
    Jang, Injoo
    Yoo, Hyeong Seon
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1117 - 1122
  • [49] Internet privacy, technology, and personal information
    Price, Marjorie S.
    ETHICS AND INFORMATION TECHNOLOGY, 2020, 22 (02) : 163 - 173
  • [50] Personal information privacy and emerging technologies
    Conger, Sue
    Pratt, Joanne H.
    Loch, Karen D.
    INFORMATION SYSTEMS JOURNAL, 2013, 23 (05) : 401 - 417