Advertisement

Towards Collecting and Linking Personal Information for Complete Personal Online Identity Modelling

  • Frans F. Blauw
  • Sebastiaan H. von Solms
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10901)

Abstract

Online identities of users are fragmented amongst multiple websites and online applications (service providers). These identity fragments will contain critical personally identifiable information. Very often, a user is unaware that their personal information is stored by a service provider. In this paper we describe a model – Personal Information Collection and Collation (PICoCo) – used to assemble identity fragments of users and form a complete identity model of a natural person. The ultimate goal is to allow service providers to verify incoming data, but also for a user to discover where their data is being stored. The description of PICoCo includes collection, classification, collation, validation, verification, and discovery.

Keywords

Service design Information visualization Personally identifiable information Privacy 

References

  1. 1.
    Blauw, F.F., von Solms, S.H.: Towards quantifying and defining privacy metrics for online users. In: 2017 IST-Africa Week Conference (IST-Africa), pp. 1–9, May 2017Google Scholar
  2. 2.
    Boardman, R., Sasse, M.A.: Stuff goes into the computer and doesn’t come out: a cross-tool study of personal information management. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 583–590. ACM (2004)Google Scholar
  3. 3.
  4. 4.
    Council of European Union: Council Directive 95/46/EC (EU) (1995). http://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX:31995L0046
  5. 5.
    Council of European Union: Council Regulation (EU) 2016/679 (2016). http://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX:32016R0679
  6. 6.
    Krishnamurthy, B., Wills, C.E.: On the leakage of personally identifiable information via online social networks. In: Proceedings of the 2nd ACM Workshop on Online Social Networks, WOSN 2009, pp. 7–12. ACM, New York (2009). http://doi.acm.org/10.1145/1592665.1592668
  7. 7.
    McCallister, E., Grance, T., Scarfone, K.A.: Guide to protecting the confidentiality of personally identifiable information (PII). Technical report (2010). http://ws680.nist.gov/publication/get_pdf.cfm?pub_id=904990
  8. 8.
    Milberg, S.J., Burke, S.J., Smith, H.J., Kallman, E.A.: Values, personal information privacy, and regulatory approaches. Commun. ACM 38(12), 65–74 (1995)CrossRefGoogle Scholar
  9. 9.
    Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41(1), 100–126 (2007)CrossRefGoogle Scholar
  10. 10.
    Oxford University Press: Definition of natural person. https://en.oxforddictionaries.com/definition/natural_person
  11. 11.
    Phelps, J., Nowak, G., Ferrell, E.: Privacy concerns and consumer willingness to provide personal information. J. Public Policy Mark. 19(1), 27–41 (2000)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Academy of Computer Science and Software EngineeringUniversity of JohannesburgJohannesburgSouth Africa

Personalised recommendations