An information privacy taxonomy for collaborative environments

Purpose – Information Privacy is becoming an increasingly important field of research with many new definitions and terminologies. Along similar rates of increase are the use, uptake and expansion of collaborative environments (CEs). There is a need for a better understanding and classification of information privacy concepts and terms. The purpose of this paper is to provide a taxonomy of information privacy in CEs. The knowledge provided from an information privacy taxonomy can be used to formulate better information privacy policies, practices, and privacy enhancing technologies.Design/methodology/approach – Through the hierarchical classification and categorization of information privacy concepts and principles an organized representation of these components has been produced. Each area was well surveyed and researched and then classified into a number of sub‐categories according to their nature and relevance.Findings – A taxonomy was successfully developed with the identification of three high level ...

[1]  David Chaum,et al.  Achieving Electronic Privacy , 1992 .

[2]  Marc Langheinrich,et al.  Privacy Invasions in Ubiquitous Computing , 2002 .

[3]  Geoff Skinner,et al.  Defining and Protecting Meta Privacy: A New Conceptual Framework Within Information Privacy , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).

[4]  Michael Waidner,et al.  Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data , 2002, Privacy Enhancing Technologies.

[5]  Yitao Duan,et al.  Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments , 2004, Privacy Enhancing Technologies.

[6]  Michael Backes,et al.  Efficient comparison of enterprise privacy policies , 2004, SAC '04.

[7]  Birgit Pfitzmann,et al.  A Toolkit for Managing Enterprise Privacy Policies , 2003, ESORICS.

[8]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[9]  Ramakrishnan Srikant,et al.  Implementing P3P using database technology , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).

[10]  Carlos Jensen,et al.  Privacy in Digital Environments: Empowering Users , 2002 .

[11]  Alfred Kobsa,et al.  Preserving Privacy in Awareness Systems , 2004, Wissen in Aktion.

[12]  David Chaum,et al.  Security without Identification: Card Computers to make Big Brother Obsolete , 1985 .

[13]  David Chaum,et al.  A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations , 1986, CRYPTO.

[14]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[15]  P. Schwartz Privacy and Democracy in Cyberspace , 2000 .

[16]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[17]  Günter Karjoth,et al.  A privacy policy model for enterprises , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[18]  Victoria Bellotti,et al.  What You Don't Know Can Hurt You: Privacy in Collaborative Computing , 1996, BCS HCI.

[19]  Elizabeth D. Mynatt,et al.  Enabling privacy management in ubiquitous com-puting environments through trust and reputation syste , 2002 .

[20]  David Chaum,et al.  Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms , 1985, EUROCRYPT.