Abstract
Organizations are under increasing pressures to manage all of the personal data concerning their customers and employees in a responsible manner. With the advancement of information and communication technologies, improved collaboration, and the pressures of marketing, it is very difficult to locate personal data is, let alone manage its use. In this paper, we outline the challenges of managing personally identifiable information in a collaborative environment, and describe a software prototype we call SNAP (Social Networking Applied to Privacy). SNAP uses automated workflow discovery and analysis, in combination with various text mining techniques, to support automated enterprise management of personally identifiable information.
National Research Council Paper Number 49356.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Korba, L., Song, R., Yee, G., Patrick, A.: Automated social network analysis for collaborative work. In: Luo, Y. (ed.) CDVE 2006. LNCS, vol. 4101, Springer, Heidelberg (2006)
Luhn’s Algorithm on Wikipedia (last accessed March 20 2007), http://en.wikipedia.org/wiki/Luhn_algorithm
Java programming language, available at: http://java.sun.com/ (March 2007)
Jade Platform (March 2007), available at: http://sharon.cselt.it/projects/jade/
Ashley, P., Powers, C., Schunter, M.: From privacy promises to privacy management: a new approach for enforcing privacy throughout an enterprise. In: Proc. of the, New Security Paradigms Workshop, Virginia Beach, Virgina, pp. 43–50 (2002)
SPARCKLE (Server Privacy ARchitecture and CapabiLity Enablement) policy Workbench, IBM Watson Labs (March 2007), available at: http://domino.watson.ibm.com/comm/research.nsf/pages/r.security.innovation2.html
Heck, M.: Guard your data against insider threats, Oakley, Reconnex, Tablus and Vontu prevent costly data leaks (March 2007), available at: http://www.infoworld.com/article/06/01/13/73680_03TCdataleak_1.html
Bhattacharya, J., Dass, R.: Kapoor, Vishal, Chakraborti, D., Gupta, S.K.: PRIVDAM: privacy violation detection and monitoring using data mining (March 2007), available at: http://ideas.repec.org/p/iim/iimawp/2005-07-01.html
Carminati, B., Ferrari, E.: Trusted privacy manager: a system for privacy enforcement of outsourced data. In: Proc. of the 21st workshop on Data Engineering, April 5-8, 2005, pp. 1195–1203 (2005)
Aura, T., Kuhn, T.A., Roe, M.: Scanning Electronic Documents for Personally Identifiable Information. In: Proc. of the 5th ACM Workshop on Privacy in Electronic Society, Alexandria, Virgina, pp. 41–50 (2006)
Patrick, A.S., Briggs, P., Marsh, S.: Designing systems that people will trust. In: Cranor, L., Garfinkel, S. (eds.) Security and Usability: Designing Secure Systems That People Can Use, O’Reilly & Associates (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Korba, L. et al. (2007). Private Data Management in Collaborative Environments. In: Luo, Y. (eds) Cooperative Design, Visualization, and Engineering. CDVE 2007. Lecture Notes in Computer Science, vol 4674. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74780-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-74780-2_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74779-6
Online ISBN: 978-3-540-74780-2
eBook Packages: Computer ScienceComputer Science (R0)