Learn More
Since the late 1970's Dr. Alan Westin has conducted over 30 privacy surveys. For each of his surveys, Westin has created one or more Privacy Indexes to summarize his results and to show trends in privacy concerns. Many privacy researchers are interested in using these privacy indexes as benchmarks to which they can compare their own survey results. However,(More)
The mobile Internet is a fast growing technology that introduces new privacy risks. We argue that, since privacy legislation alone is not sufficient to protect the user's privacy, technical solutions to enhance informational privacy of individuals are also needed. This paper introduces mCrowds, a privacy-enhancing technology that combines the concept of a(More)
The protection of privacy has been on the policy agenda since Alan Westin first published his seminal work, Privacy and Freedom, in 1967. 1 The book was followed swiftly by a series of governmental studies in France, the United Kingdom, Canada, Sweden, and the United States, 2 and each of these countries subsequently passed data protection laws based on(More)
commissioned by the Markle Foundation. The survey examined public opinions on the potential and privacy considerations of individually controlled electronic personal health records (PHRs). It is the first national survey to explore consumer perceptions about PHRs in the context of the entrance of Google, Intuit, Microsoft, Revolution Health and WebMD in the(More)
Regulation and consumer backlash is forcing many organisations to re-evaluate the way they handle personal information (PII 1). As a first step in managing their personal information enterprises are implementing privacy logging and reporting that allows them to identify when personal information has been accessed, by whom, and for what purpose. This paper(More)
Alan Westin's well-known and often-used privacy segmentation fails to describe privacy markets or consumer choices accurately. The segmentation divides survey respondents into " privacy fundamentalists, " " privacy pragmatists, " and the " privacy unconcerned. " It describes the average consumer as a " privacy pragmatist " who influences market offerings by(More)
This paper presents the results of research into the privacy policies of organizations based on a questionnaire completed after site visits. Results were analyzed and presented by industry category. The model used was the four criteria of notice, access, choice and security that were designated by the FTC as Fair Information Practices. The data demonstrate(More)
Information security policies play an important role in achieving information security. Confidentiality, Integrity, and Availability are classic information security goals attained by enforcing appropriate security policies. Workflow Management Systems (WfMSs) also benefit from inclusion of these policies to maintain the security of business-critical data.(More)
— — Foreword The Social Security Administration in 1982 announced its Systems Moderni­ zation Plan (SMP), designed to restructure and extensively upgrade its data-handling systems. The agency told Congress that, without this major upgrading, there might be serious disruption of its services, which are essential to the wel­ fare of millions of Americans. The(More)