A Case Study: The Deficiency of Information Security Assurance Practice of a Financial Institute in the Protection of Privacy Information

被引:0
|
作者
Ng, R. [1 ]
Dong, L. [1 ]
机构
[1] Ryerson Univ, Ted Rogers Sch Informat Technol Management, Toronto, ON, Canada
关键词
D O I
10.1109/UMEDIA.2008.4570912
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Driven by business efficiencies and the need for a competitive advantage, enterprises are now collecting more clients' information to increase market share and to offer better services. The hyper-growth of business and competition increases the implementation of ubiquitous and pervasive computing. Such implementations have created a privacy void, in which clients' information is sent over from machines to machines without the assurance of information security. information security assurance (IA) aims to restore clients' confidence level by ensuring confidentiality, integrity and availability of their information. This paper suggests a holistic and systems approach to deploying information security assurance and illustrates the approach by using a case of inappropriate information privacy practices in a large Canadian financial institute.
引用
收藏
页码:332 / 337
页数:6
相关论文
共 50 条
  • [1] Privacy Law Protection Based on the Information Security Assurance Algorithm
    Wang, Zhanjiang
    Yue, Qifeng
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [2] Capturing semantics for information security and privacy assurance
    Chowdhury, Mohammad M. R.
    Chamizo, Javier
    Noll, Josef
    Gomez, Juan Miguel
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2008, 5061 : 105 - +
  • [3] Information Assurance, Privacy, and Security in Ubiquitous Questionnaire
    Goto, Yuichi
    Cheng, Jingde
    FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 619 - 624
  • [4] A Case Study on Privacy Information Protection in Campus
    Lu, Tsung-Hui
    Lee, Zne-Jung
    IEEE INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND ENGINEERING (ICSSE 2013), 2013, : 419 - 424
  • [5] Balancing data protection and privacy - The case of information security sensor systems
    Naarttijarvi, Markus
    COMPUTER LAW & SECURITY REVIEW, 2018, 34 (05) : 1019 - 1038
  • [6] The Security and Privacy Protection of Hospital Information System
    Wang, Na
    Wang, Jin-guo
    3RD INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND DEVELOPMENT (ICSSD 2017), 2017, : 212 - 214
  • [7] The Personal Information Privacy Protection Strategy in Social Security Information System
    Wang, Xuefang
    Xue, Hongrong
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 2, 2012, 289 : 718 - +
  • [8] SPORTS DATA PRIVACY PROTECTION AND INFORMATION SECURITY MANAGEMENT
    Jin, Biao
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (05): : 4390 - 4398
  • [9] Information Security Threats and Information Assurance
    Yalman, Yildiray
    Yesilyurt, Murat
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2013, 2 (03): : 247 - 252
  • [10] A NEW MODEL FOR INFORMATION SECURITY ASSURANCE IN ORGANIZATIONS - PROPOSAL AND CASE STUDY
    Tiganoaia, Bogdan
    MANAGEMENT - FACING NEW TECHNOLOGY CHALLENGES, ICMIE 2013, 2013, : 189 - 196