A New Conceptual Framework Within Information Privacy: Meta Privacy

  • Geoff Skinner
  • Song Han
  • Elizabeth Chang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3802)


When considering information security and privacy issues most of the attention has previously focussed on data protection and the privacy of personally identifiable information (PII). What is often overlooked is consideration for the operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of computing environments has not been factored in to most methods. Metadata, or data about data, can contain many personal details about an entity. It is subject to the same risks and malicious actions personal data is exposed to. This paper presents a new perspective for information security and privacy. It is termed Meta Privacy and is concerned with the protection and privacy of information system metadata and metastructure details. We first present a formal definition for meta privacy, and then analyse the factors that encompass and influence meta privacy. In addition, we recommend some techniques for the protection of meta privacy within the information systems. Further, the paper highlights the importance of ensuring all informational elements of information systems are adequately protected from a privacy perspective.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Schwartz, P.M.: Privacy and Democracy in Cyberspace. 52 VAND. L. REV. 1609, 1610–1611 (1999)Google Scholar
  2. 2.
    Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic Databases. In: Proceedings of the 28th VLDB Conference, Hong Kong, China (2002)Google Scholar
  3. 3.
    Hes, R., Borking, J.: Privacy-Enhancing Technologies: The path to anonymity. Registratiekamer, The Hague (August 2000)Google Scholar
  4. 4.
    Goldberg, I.: Privacy-enhancing technologies for the Internet, II: Five years later. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 14–15. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  5. 5.
    Clarke, R.: Introduction to Dataveillance and Information Privacy, and Definitions and Terms (1999), http://www.anu.edu.au/people/Roger.Clarke/DV/Intro.html
  6. 6.
    Common Criteria: Common Criteria for Information Technology Evaluation (January 2004), http://www.commoncriteria.org
  7. 7.
    W3C: The platform for privacy preferences 1.0 (P3P1.0) specification. W3C Proposed Recommendation (January 2002), http://www.w3.org/TR/P3P
  8. 8.
    Webopedia: Definition of Metadata – What is Metadata (1998), http://www.webopedia.com/TERM/m/metadata.html
  9. 9.
    Massacci, F., Zannone, N.: Privacy is Linking Permission to Purpose. Technical Report University of Trento, Italy (2004)Google Scholar
  10. 10.
    Clarke, R.: Internet Privacy Concerns Confirm the Case for Intervention. ACM 42(2), 60–67 (1999)CrossRefGoogle Scholar
  11. 11.
    Rice, F.C.: Protecting Personal Data in your Microsoft Word Documents. MSDN Online Article (August 2002), http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnword2k2/html/odc_ProtectWord.asp
  12. 12.
    Extensible Markup Language (XML), World Wide Web Consortium (W3C), http://www.w3.org/XML/
  13. 13.
    Ceravolo, P., Damiani, E., De Capitani di Vimercati, S., Fugazza, C., Samarati, P.: Advanced Metadata for Privacy-Aware Representation of Credentials. In: PDM 2005, Tokyo, Japan, April 9 (2005)Google Scholar
  14. 14.
    RDF Vocabulary Description Language (RDFS). World Wide Web Consortium, http://www.w3.org/TR/rdf-schema/
  15. 15.
    Web Ontology Language (OWL). World Wide Web Consortium, http://w3.org/2004/OWL/
  16. 16.
    Agrawal, R., Kini, A., LeFevre, K., Wang, A., Xu, Y., Zhou, D.: Managing Healthcare Data Hippocratically. In: Proc. of ACM SIGMOD Intl. Conf. on Management of Data (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Geoff Skinner
    • 1
  • Song Han
    • 1
  • Elizabeth Chang
    • 1
  1. 1.School of Information SystemsCurtin University of TechnologyPerthAustralia

Personalised recommendations