Skip to main content

Private Data Management in Collaborative Environments

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4674))

Abstract

Organizations are under increasing pressures to manage all of the personal data concerning their customers and employees in a responsible manner. With the advancement of information and communication technologies, improved collaboration, and the pressures of marketing, it is very difficult to locate personal data is, let alone manage its use. In this paper, we outline the challenges of managing personally identifiable information in a collaborative environment, and describe a software prototype we call SNAP (Social Networking Applied to Privacy). SNAP uses automated workflow discovery and analysis, in combination with various text mining techniques, to support automated enterprise management of personally identifiable information.

National Research Council Paper Number 49356.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Korba, L., Song, R., Yee, G., Patrick, A.: Automated social network analysis for collaborative work. In: Luo, Y. (ed.) CDVE 2006. LNCS, vol. 4101, Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Luhn’s Algorithm on Wikipedia (last accessed March 20 2007), http://en.wikipedia.org/wiki/Luhn_algorithm

  3. Java programming language, available at: http://java.sun.com/ (March 2007)

  4. Jade Platform (March 2007), available at: http://sharon.cselt.it/projects/jade/

  5. Ashley, P., Powers, C., Schunter, M.: From privacy promises to privacy management: a new approach for enforcing privacy throughout an enterprise. In: Proc. of the, New Security Paradigms Workshop, Virginia Beach, Virgina, pp. 43–50 (2002)

    Google Scholar 

  6. SPARCKLE (Server Privacy ARchitecture and CapabiLity Enablement) policy Workbench, IBM Watson Labs (March 2007), available at: http://domino.watson.ibm.com/comm/research.nsf/pages/r.security.innovation2.html

  7. Heck, M.: Guard your data against insider threats, Oakley, Reconnex, Tablus and Vontu prevent costly data leaks (March 2007), available at: http://www.infoworld.com/article/06/01/13/73680_03TCdataleak_1.html

  8. Bhattacharya, J., Dass, R.: Kapoor, Vishal, Chakraborti, D., Gupta, S.K.: PRIVDAM: privacy violation detection and monitoring using data mining (March 2007), available at: http://ideas.repec.org/p/iim/iimawp/2005-07-01.html

  9. Carminati, B., Ferrari, E.: Trusted privacy manager: a system for privacy enforcement of outsourced data. In: Proc. of the 21st workshop on Data Engineering, April 5-8, 2005, pp. 1195–1203 (2005)

    Google Scholar 

  10. Aura, T., Kuhn, T.A., Roe, M.: Scanning Electronic Documents for Personally Identifiable Information. In: Proc. of the 5th ACM Workshop on Privacy in Electronic Society, Alexandria, Virgina, pp. 41–50 (2006)

    Google Scholar 

  11. Patrick, A.S., Briggs, P., Marsh, S.: Designing systems that people will trust. In: Cranor, L., Garfinkel, S. (eds.) Security and Usability: Designing Secure Systems That People Can Use, O’Reilly & Associates (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yuhua Luo

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Korba, L. et al. (2007). Private Data Management in Collaborative Environments. In: Luo, Y. (eds) Cooperative Design, Visualization, and Engineering. CDVE 2007. Lecture Notes in Computer Science, vol 4674. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74780-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74780-2_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74779-6

  • Online ISBN: 978-3-540-74780-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics