Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards

Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards

Indexed In: SCOPUS
Release Date: December, 2011|Copyright: © 2012 |Pages: 420
DOI: 10.4018/978-1-61350-501-4
ISBN13: 9781613505014|ISBN10: 1613505019|EISBN13: 9781613505021
Hardcover:
Available
$185.00
TOTAL SAVINGS: $185.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$185.00
TOTAL SAVINGS: $185.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$185.00
TOTAL SAVINGS: $185.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$185.00
TOTAL SAVINGS: $185.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$220.00
TOTAL SAVINGS: $220.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$220.00
TOTAL SAVINGS: $220.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$700.00
TOTAL SAVINGS: $700.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

Why are tools needed to build privacy into business processes? As in most endeavors, tools can help, and in an application area where, for example, privacy may be resisted in favor of the fallacious argument of higher profits, tools are needed. Most professionals have heard of the Privacy Impact Assessment (Warren et al., 2008). This is a tool that evaluates the impact to privacy of a proposed change to business practice. Prior to the introduction of this tool, such impacts to privacy were either done in an ineffective way or not even considered.

Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards is a collection of research on privacy protection technologies and their application in business organizations. Providing insights and support professionals concerned with the management of expertise, knowledge, information, and organizational development in different types of business organizations and environments. This book will be composed of professionals and researchers working in the field of privacy protection in various disciplines.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Complying with Privacy Laws and Regulations
  • Consumer Private Information in Business Organizations
  • Discovering or Delimiting Private Information
  • Facilitating the Adoption of Privacy Protection Measures
  • Gauging the Effectiveness of Privacy Protection Measures
  • Introducing Privacy Protection Measures
  • Legal Aspects of Privacy Protection in Business
  • Privacy Enhancing Technologies Applicable to Business
  • Privacy Related Business Standards
  • Requirements for Privacy Protection Measures
Reviews & Statements

I would highly recommend this book to anyone who is interested in conducting research on privacy, getting educated on privacy, or who wishes to enforce privacy policies.

– Dr. Bhavani Thuraisingham, University of Texas at Dallas, USA
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
George Yee is a Consultant and an Adjunct Professor with the Dept. of Systems and Computer Engineering, Carleton University, Ottawa, Canada. He was previously a Senior Research Officer for over 7 years in the Information Security Group, National Research Council Canada (NRC). Prior to the NRC, he had significant experience as a member of scientific staff and manager at Bell-Northern Research and Nortel Networks. George received his Ph.D. in Electrical Engineering from Carleton University and is a member of Professional Engineers Ontario. In addition, he is a Certified Information Systems Security Professional (CISSP) and a Certified Software Development Professional (CSDP). George’s research interests as an Adjunct Professor lie in the engineering of reliable systems, involving security, fault tolerance, performance, and correctness.
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.
Editorial Advisory Board
  • Carlisle Adams, University of Ottawa, Canada
  • Martin Gilje Jaatun, SINTEF ICT, Norway
  • Latifur Khan, University of Texas at Dallas, USA
  • Steve Marsh, Communications Research Centre Canada, Canada
  • Andrew S. Patrick, Office of the Privacy Commissioner of Canada, Canada
  • Siani Pearson, HP Labs, UK
  • Ed Simon, XMLsec Inc., Canada 
  • Ronggong Song, Defence Research and Development Canada, Canada