Privacy in the digital age: a review of information privacy research in information systems

F Bélanger, RE Crossler - MIS quarterly, 2011 - JSTOR
Information privacy refers to the desire of individuals to control or have some influence over
data about themselves. Advances in information technology have raised concerns about …

Personal information exchanging system, personal information providing apparatus, data processing method therefor, and computer program therefor

M Hatakeyama - US Patent App. 13/133,287, 2011 - Google Patents
A personal information providing apparatus 100 includes: a policy storage unit 102 that
stores an approved privacy policy; a policy temporary storage unit 104 that temporarily …

Modularity is the key a new approach to social media privacy policies

S Das, J Dev, K Srinivasan - Proceedings of the 7th Mexican Conference …, 2018 - dl.acm.org
Social media privacy policies are the legal documents which provide inside information
about the collection, storage, and access to user data. These policies are often long and …

Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms

L Liu, H Zhu, Z Huang - Expert Systems with Applications, 2011 - Elsevier
Web services collaborations are highly automatic, dynamic, heterogeneous, and lack
protection against corruption of processes. These characteristics impose high risks on the …

Towards a base ontology for privacy protection in service-oriented architecture

D Garcia, MBF Toledo, MAM Capretz… - … on Service-Oriented …, 2009 - ieeexplore.ieee.org
The service consumer's confidence in the protection of their privacy is an important factor for
the success of electronic services (e-services). It may increase if the service provider offers a …

[PDF][PDF] A simultaneous routing tree construction and fanout optimization algorithm

AH Salek, J Lou, M Pedram - Proceedings of the 1998 IEEE/ACM …, 1998 - dl.acm.org
MSTMCT-This paper presents an optimal algorithm for solving the problem of simultaneous
fanout optimkation and routing tree construction for an ordered set of critical sinks. The …

A web service privacy framework based on a policy approach enhanced with ontologies

DZG Garcia, MBF de Toledo - 2008 11th IEEE International …, 2008 - ieeexplore.ieee.org
The Web service technology facilitates the automated use of electronic services on the Web.
It offers benefits, mainly the system interoperability support, but it also raises privacy …

Using information flow analysis to detect implicit information leaks for web service composition

J Jiang, Z Huang, W Ma, Y Cao - Frontiers of Information Technology & …, 2018 - Springer
Abstract Information leak, which can undermine the compliance of web-service-composition
business processes for some policies, is one of the major concerns in web service …

[PDF][PDF] Reference architectures for privacy preservation in cloud-based IoT applications

ID Addo, SI Ahamed, SS Yau, A Buduru - IJSC, 2014 - academia.edu
As the promise of the Internet of Things (IoT) materializes in our everyday lives, we are often
challenged with a number of concerns regarding the efficacy of the current data privacy …

Privacy preserving policy framework: User-aware and user-driven

S Das, J Dev, LJ Camp - TPRC47: The 47th Research Conference …, 2019 - papers.ssrn.com
Privacy policies outline and structure data collection and access management for online
services or websites. These policies are often too long, complex, and convoluted for an …