IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Survey of Methodologies for Protecting Privacy of User Data Within Enterprise Information Infrastructure

A Survey of Methodologies for Protecting Privacy of User Data Within Enterprise Information Infrastructure
View Sample PDF
Author(s): Asmita Manna (Jadavpur University, India), Anirban Sengupta (Jadavpur University, India)and Chandan Mazumdar (Jadavpur University, India)
Copyright: 2021
Pages: 23
Source title: Handbook of Research on Cyber Crime and Information Privacy
Source Author(s)/Editor(s): Maria Manuela Cruz-Cunha (Polytechnic Institute of Cávado and Ave, Portugal)and Nuno Mateus-Coelho (Lusófona University, Portugal)
DOI: 10.4018/978-1-7998-5728-0.ch003

Purchase

View A Survey of Methodologies for Protecting Privacy of User Data Within Enterprise Information Infrastructure on the publisher's website for pricing and purchasing information.

Abstract

During recent years, especially after the introduction of data protection regulations by different countries, protecting the privacy of user data has become an important research topic. Different threads of information privacy research have emerged, particularly in the areas of eliciting privacy requirements, incorporating privacy by design, performing privacy impact assessments, developing privacy enhancement techniques, implementing those techniques for privacy compliance, verifying privacy compliance, etc. Privacy engineering is integral to all phases of data lifecycle, right from privacy requirement elicitation to compliance verification. This chapter covers a brief survey of notable privacy researches and models proposed for different phases of privacy engineering (i.e., privacy requirement engineering, privacy by design, privacy impact assessment, privacy compliance, and modeling approaches for privacy in enterprise infrastructure). Models and frameworks have been chosen based on the relevance of their applicability in modeling and implementing privacy within an enterprise.

Related Content

Chirag Sharma, Amanpreet Kaur, Priyanka Datta, Yonis Gulzar. © 2025. 30 pages.
M. Johnpaul, Raam Sai Bharadwaj Miryala, Marica Mazurek, G. Jayaprakashnarayana, Ramesh Kumar Miryala. © 2025. 28 pages.
Jatin Arora, Gaganpreet Kaur, Monika Sethi, Saravjeet Singh. © 2025. 20 pages.
L. A. Anto Gracious, L. Sudha, B. Chitra, Gaganpreet Kaur, V. Sathya, P. Kabitha, R. Siva Subramanian. © 2025. 28 pages.
Bhavik Singla, Anuj Kumar Jain, Gaganpreet Kaur, Nitin Jain, Vishal Jain. © 2025. 28 pages.
P. Vijayalakshmi, K. Subashini, B. Selvalakshmi, G. Sudhakar, Anand Anbalagan, N. Bharathiraja, Gaganpreet Kaur. © 2025. 22 pages.
Djamel Saba, Abdelkader Hadidi. © 2025. 28 pages.
Body Bottom