Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

A roadmap for comprehensive online privacy policy management

Published: 01 July 2007 Publication History

Abstract

A framework supporting the privacy policy life cycle helps guide the kind of research to consider before sound privacy answers may be realized.

References

[1]
Acquisti, A. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the ACM Electronic Commerce Conference. ACM Press, NY, 2004, 21--29.
[2]
Antón, A.I., Earp, J.B., Bolchini, D., He, Q., Jensen, C., and Stufflebeam, W. The lack of clarity in financial privacy policies and the need for standardization. IEEE Security & Privacy 2, 2 (2004), 36--45.
[3]
Antón, A.I., He, Q., and Baumer, D. The complexity underlying JetBlue's privacy policy violations. IEEE Security & Privacy (to appear).
[4]
Ashley, P. A privacy logging and reporting framework. In Proceedings of the Asia Pacific Information Technology Security Conference (University of Queensland, May 24--27, 2004).
[5]
Bell, D. and LaPadula, L. Secure Computer Systems: Mathematical Foundations. Technical Report MTR-2547 1. MITRE Corporation, Mar. 1973.
[6]
Earp, J.B., Baumer, D.L., and Poindexter, J.C. Modeling privacy values with experimental economics. Workshop on Privacy in the Electronic Society (Washington, D.C., Oct. 28, 2004).
[7]
Karjoth, G., Schunter, M., and Van Herreweghe, E. Translating privacy practices into privacy promises---How to promise what you can keep. In Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks. June 2003, 135--146.
[8]
Karjoth, G., Schunter, M., and Waidner, M. Platform for enterprise privacy practices: Privacy-enabled management of customer data. In Proceedings of the Second International Workshop on Privacy Enhancing Technologies, LNCS 2482, (2003), 69--84.
[9]
Li, N., Yu, T., and Antón, A.I. A semantics-based approach to privacy languages. CERIAS Technical Report TR 2003--28. Purdue University, Nov. 2003.
[10]
Schunter, M., Van Herreweghen, E., and Waidner, M. Expressive privacy promises---How to improve the Platform for Privacy Preferences (P3P). Position paper for W3C Workshop on the Future of P3P (available at www.w3.org/2002/p3p-ws/pp/ibm-zuerich.pdf).
[11]
Schutzer, D.M. Citigroup P3P position paper. Position paper for W3C Workshop on the Future of P3P (available at www.w3.org/2002/p3p-ws/pp/ibm-zuerich.pdf).
[12]
W3C. Platform for Privacy Preferences (P3P) project; www.w3.org/P3P/

Cited By

View all
  • (2022)Is Your Policy Compliant?Proceedings of the 21st Workshop on Privacy in the Electronic Society10.1145/3559613.3563195(89-102)Online publication date: 7-Nov-2022
  • (2022)Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design GuidelinesACM Computing Surveys10.1145/350228855:3(1-37)Online publication date: 3-Feb-2022
  • (2022)Data practices of internet of medical things: A look from privacy policy perspectivesSmart Health10.1016/j.smhl.2022.10034226(100342)Online publication date: Dec-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 50, Issue 7
Creating a science of games
July 2007
120 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/1272516
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 2007
Published in CACM Volume 50, Issue 7

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)169
  • Downloads (Last 6 weeks)14
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Is Your Policy Compliant?Proceedings of the 21st Workshop on Privacy in the Electronic Society10.1145/3559613.3563195(89-102)Online publication date: 7-Nov-2022
  • (2022)Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design GuidelinesACM Computing Surveys10.1145/350228855:3(1-37)Online publication date: 3-Feb-2022
  • (2022)Data practices of internet of medical things: A look from privacy policy perspectivesSmart Health10.1016/j.smhl.2022.10034226(100342)Online publication date: Dec-2022
  • (2021)PurExtSecurity and Communication Networks10.1155/2021/55525012021Online publication date: 1-Jan-2021
  • (2021)Understanding the influence of privacy protection functions on continuance usage of push notification serviceAslib Journal of Information Management10.1108/AJIM-04-2021-0121ahead-of-print:ahead-of-printOnline publication date: 16-Nov-2021
  • (2021)Provenance‐based data flow control mechanism for Internet of thingsTransactions on Emerging Telecommunications Technologies10.1002/ett.393432:5Online publication date: 7-May-2021
  • (2020)Sticky Policies: A SurveyIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2019.293635332:12(2481-2499)Online publication date: 1-Dec-2020
  • (2020)Privacy-deprived e-commerce: the efficacy of consumer privacy policies on China's e-commerce websites from a legal perspectiveInformation Technology & People10.1108/ITP-03-2019-0117ahead-of-print:ahead-of-printOnline publication date: 21-Aug-2020
  • (2019)RSL-IL4PrivacyRequirements Engineering10.1007/s00766-018-0305-224:1(1-26)Online publication date: 1-Mar-2019
  • (2018)Towards a Privacy-Aware Quantified Self Data Management FrameworkProceedings of the 23nd ACM on Symposium on Access Control Models and Technologies10.1145/3205977.3205997(173-184)Online publication date: 7-Jun-2018
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media