Abstract
Individuals interact with organizations in many different capacities (e.g. as clients, as employees). Many of these interactions require the individual to submit her personal information to the organization, which may claim compliance with privacy policy. It is important to assess this compliance quantitatively. This paper describes an approach for quantitatively assessing the likelihood that an organization will comply with privacy policy.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Carnegie Mellon Software Engineering Institute: Welcome to the CMMI Web Site. Visited April 14, 2008 at: http://www.sei.cmu.edu/cmmi/
Enright, K.P.:Privacy Audit Checklist Visited Ma 6, 2006 at: http://cyber.law.harvard.edu/clinical/privacyaudit.html
Goldberg, I., Wagner, D., Brewer, E.: Privacy-Enhancing Technologies for the Internet. Proceedings, 42nd IEEE Computer Society International Conference (COMPCON’97), 103-109 (1997)
International Organization for Standardization: Management Standards. Visited April 16, 2008 at: http://www.iso.org/iso/management standards.htm
Salter, C., Sami Saydjari, S., Schneier, B., Wallner, J.: Towards a Secure System Engineering Methodology. Proceedings of the New Security Paradigms Workshop (1998)
Treasury Board of Canada: The Privacy Impact Assessment Guidelines:AFramework to Manage Privacy Risk. Visited May 6, 2006, at: http://www.tbs-sct.gc.ca/pgol-pged/piatp-pfefvp/course1/mod2/mod2-5 e.asp
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Yee, G.O., Korba, L., Song, R. (2008). Assessing the Likelihood of Privacy Policy Compliance. In: Jajodia, S., Samarati, P., Cimato, S. (eds) Proceedings of The Ifip Tc 11 23rd International Information Security Conference. SEC 2008. IFIP – The International Federation for Information Processing, vol 278. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09699-5_52
Download citation
DOI: https://doi.org/10.1007/978-0-387-09699-5_52
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-09698-8
Online ISBN: 978-0-387-09699-5
eBook Packages: Computer ScienceComputer Science (R0)