Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Multi-Dimensional Privacy Protection for Digital Collaborations.
Geoff Skinner
Pages - 22 - 31     |    Revised - 15-06-2007     |    Published - 30-06-2007
Volume - 1   Issue - 1    |    Publication Date - June 2007  Table of Contents
Information Privacy, Privacy, Evaluator Module (PEM), Manual Privacy Management (MPM), Community Observed Privacy (COP), TLC-PP
In order to sustain privacy in digital collaborative environments a comprehensive multidimensional privacy protecting framework is required. Such information privacy solutions for collaborations must incorporate environmental factors and influences in order to provide a holistic information privacy solution. Our Technical, Legal, and Community Privacy Protecting (TLC-PP) framework addresses the problems associated with the multi-facetted notion of privacy. The three key components of the TLC-PP framework are merged together to provide complete solutions for collaborative environment stakeholders and users alike. The application of the TLC-PP framework provides a significant contribution to the delivery of a Privacy Augmented Collaborative Environment (PACE).
CITED BY (4)  
1 May, M., & Sébastien, G. (2011).Privacy Concerns in E-learning: Is Using Tracking System a Thread. International Journal of Information and Education Technology, 1(1), 1-8.
2 May, M., & George, S. (2011, May). Using students tracking data in E-learning: Are we always aware of security and privacy concerns?. In Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on (pp. 10-14). IEEE.
3 Kane, A. M. (2010).On the use of continued fractions for electronic cash. International Journal of Computer Science and Security, 4(1), 136-148.
4 Andrade, M., & Ferreira, M. A. M. (2009).Criminal and civil identification with DNA databases using Bayesian networks. International Journal of Security, 3(4), 65-74.
1 Directory of Open Access Journals (DOAJ)
2 Google Scholar
3 ScientificCommons
4 Academic Index
5 CiteSeerX
6 refSeek
8 Socol@r
9 ResearchGATE
10 Bielefeld Academic Search Engine (BASE)
11 Scribd
12 WorldCat
13 slideshare
15 PdfSR
16 Free-Books-Online
1 K. Borcea-Pfitzmann, K. Liesebach, and A. Pfitzmann, “Establishing a Privacy-Aware Collaborative eLearning Environment,” in Proceedings of the EADTU Annual Conference 2005: Towards Lisbon 2010: Collaboration for Innovative Content in Lifelong Open and Flexible Learning, Rome, November 2005.
2 J. Feigenbaum and D.J Weitzner, “Report on the 2006 TAMI/PORTIA Workshop on Privacy and Accountability,” Workshop on Privacy and Accountability, Massachusetts Institute of Technology, MA USA, June 2006.
3 I.L. Ballesteros, “New Collaborative Working Environments 2020,” Report on industry-led FP7 consultations and 3rd Report of the Experts Group on Collaboration@Work, European Commission, February 2006.
4 R. Clarke, “Privacy as a Means of Engendering Trust in Cyberspace,” June 2001, http://www.anu.edu.au/people/Roger.Clarke/DV/eTrust.html.
5 European Commission, “Technologies for Digital Ecosystems”, http://www.digitalecosystems. org
6 R. Clarke, “Introduction to Dataveillance and Information Privacy, and Definitions of Terms”, http://www.anu.edu.au/people/Roger.Clarke/DV/Intro.html, September, 1999.
7 EPIC, “Privacy and Human Rights 2003”, Electronic Privacy Information Centre, http://www.epic.org.
8 I. Goldberg, “Privacy-enhancing technologies for the Internet II: Five years later”, PET 2002, San Francisco, 2002.
9 R.M. Davison, R. Clarke, J. Smith, D. Langford, and B. Kuo, “Information Privacy in a Globally Networked Society: Implications for IS Research”, Communications of the Association for Information Systems, Volume 12, 2003, 341-365.
10 G.W. van Blarkom, J.J. Borking, and J.G.E. Olk, “Handbook of Privacy and Privacy- Enhancing Technologies”, Privacy Incorporated Software Agent (PISA) Consortium, The Hague, 2003.
11 G. Skinner and E. Chang, “A Conceptual Framework for Information Privacy and Security in Collaborative Environments”, International Journal of Computer Science and Network Security, Vol. 6 No. 2B, Feburary 28, 2006.
12 D.A. Gritzalis, “Embedding privacy in IT applications development” Information Management and Computer Security, Vol. 12 No. 1, 2004.
13 JJ. Cadiz and A. Gupta, “Privacy Interfaces for Collaboration,” Technical Report MSR-TR- 2001-82, Microsoft Corporation, 2001.
14 M/Cyclopedia of New Media, “Virtual Communities – Privacy Issues,” Creative Industries Faculty, QUT, http://wiki.media-culture,org.au/.
15 J.B. Spira, “Privacy in the collaborative business environment,” KM World, November 2004, http://www.kmworld.com/ReadArticle.aspx?ArticleID=9595.
16 G. Skinner and E. Chang, “PP-SDLC The Privacy Protecting Systems Development Life Cycle”, IPSI-2005 FRANCE, April 23 till April 26, 2005.
17 R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, “Hippocratic Databases”, 28th International Conference on Very Large Databases (VLDB), Hong Kong, 2002.
18 G. Skinner and E. Chang, “Fair Privacy Principles and Preferences (F3P) – Evaluating Context Based Privacy Preferences”, The 10th WSEAS International Conference on Computers, ICCOMP-06, Vouliagmeni, Athens, Greece, July 13-15, 2006.
19 M. Ackerman, T. Darrell and D.J. Weitzner, “Privacy in Context”, Massachusetts Institute of Technology Discussion Paper, http://www.eecs.umich.edu/~ackerm/pub/01a12/contextprivacy. final.pdf.
20 L.F. Cranor, “The Role of Privacy Enhancing Technologies,” Centre for Democracy and Technologies, March 2007, http://www.cdt.org/privacy/ccp/roleoftechnology1.shtml.
21 G. Danezis, “An Introduction to Privacy Enhancing Technologies,” presented at Internet Society Geneva's Monthly Conferences Cycle, Geneva, Switzerland, July 2004.
22 Meta Group Report, “Privacy Enhancing Technologies,” Ministry of Science and Technology, Denmark, March 2005.
23 G. Skinner, S. Han, S. and E. Chang, E., “Shield Privacy: A conceptual framework for Information Privacy and Data Access Controls”, WSEAS Transactions on Computers, Issue 6, vol. 5, June 2006, pp. 1375-1381.
24 G. Skinner and M. Miller, “Managing Privacy, Trust, Security, and Context Relationships Using Weighted Graph Representations”, WSEAS International Journal of Information Science and Applications, Issue 2, vol. 3, February 2005, pp. 283-290.
25 G. Skinner, S. Han, and E. Chang, “Integration of Situational and Reward Elements for Fair Privacy Principles and Preferences (F3P)”, in proceedings of IEEE International Conference on Industrial Technology (ICIT2006), Mumbai, India, December, 2006.
26 G. Skinner and E. Chang, “An Environmentally Adaptive Conceptual Framework for Addressing Information Privacy Issues in Digital Ecosystems”, in proceedings of 2007 IEEE International Conference on Digital Ecosystems and Technologies, Cairns, Australia, February, 2007.
27 G. Skinner and E. Chang, “Information Privacy Concerns in Quantum Computational Distributed Environments,” International Journal of Information Security and Privacy, 1(3), July-September 2007, pp. 1-12.
Mr. Geoff Skinner
- Australia