The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2008 vol.12)
pp: 54-61
Michael Hecker , Curtin University of Technology
Tharam S. Dillon , Curtin University of Technology
Elizabeth Chang , Curtin University of Technology
ABSTRACT
Privacy is becoming increasingly important due to the advent of e-commerce. E-commerce applications frequently require customers to divulge many personal details about themselves that must be protected carefully in accordance with privacy principles and regulations. Here, the authors define a privacy ontology to support the provision of privacy and help derive the level of privacy associated with e-commerce transactions and applications. The privacy ontology provides a framework against which e-commerce sites can benchmark their privacy policies and implementations.
INDEX TERMS
privacy, e-commerce, e-commerce applications, privacy regulations, ontologies, privacy ontology
CITATION
Michael Hecker, Tharam S. Dillon, Elizabeth Chang, "Privacy Ontology Support for E-Commerce", IEEE Internet Computing, vol.12, no. 2, pp. 54-61, March/April 2008, doi:10.1109/MIC.2008.41
REFERENCES
1. M. Hansen et al., Overview of Existing Assurance Methods in the Area of Privacy and IT Security, tech. report D5.1.a, PRIME Consortium, 2004; www.prime-project.eu/prime_products/reports assur/.
2. "Another Week, Another Identity Theft Scandal: Recent Data Security Breaches Underscore Need for Stronger Identity Theft Protections," ConsumersUnion.org, 2005; www.consumersunion.org/creditmatters/creditmattersupdates 002244.html.
3. R. Herold, The Privacy Management Toolkit Version 1, D.J. Lineman, ed., Information Shield Publishing, 2005.
4. H. Cavusoglu, B. Mishra, and S. Raghunathan, "The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers," Int'l J. Electronic Commerce, vol. 9, no. 1, 2004, pp. 69–104.
5. A.R.A. Bouguettaya and M.Y. Eltoweissy, "Privacy on the Web: Facts, Challenges, and Solutions," IEEE Security &Privacy, vol. 1, no. 6, 2003, pp. 40–49.
6. L. Cranor et al., "The Platform for Privacy Preferences 1.0 (P3P1.0)," and "A P3P Preference Exchange Language 1.0 (APPEL1.0)," World Wide Web Consortium (W3C) specifications, 16 Apr. 2002; www.w3.orgP3P/ and www.w3.org/TRP3P-preferences/.
7. M. Schumacher, "Security Engineering with Patterns: Toward a Security Core Ontology," LNCS 2754, Springer-Verlag, 2003, pp. 87–96.
8. L. Kagal et al., "Security and Privacy Challenges in Open and Dynamic Environments," Computer, vol. 39, no. 6, 2006, pp. 89–91.
9. E. Chang, T.S. Dillon, and F.K. Hussain, Trust and Reputation for Service-Oriented Environments, John Wiley &Sons, 2006.
10. P. Spyns, R. Meersman, and M. Jarrar, "Data Modelling versus Ontology Engineering," Special Interest Group on Management of Data (SIGMOD), vol. 31, 2002, pp. 12–17.
11. "Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data," Official J. European Communities (OJEC), vol. L, no. 281, 1995, pp. 31–50.
12. R. Leenes, J. Schallaböck, and M. Hansen, "PRIME White Paper v2," Privacy and Identity Management for Europe, June 2007, www.prime-project.eu/prime_productswhitepaper /.
13. J. Huizenga, Handbook of Privacy and Privacy-Enhancing Technologies: The Case of Intelligent Software Agents, College Bescherming Persoonsgegevens, 2003.
14. A.M. Hecker and T.S. Dillon, "Ontological Privacy Support for the Medical Domain," Proc. eHPass National e-Health Privacy and Security Symposium, Queensland Univ. of Technology, 2006.
15. I. Niles and A. Pease, "Towards a Standard Upper Ontology," Proc. Int'l Conf. Formal Ontology in Information Systems, 2001, pp. 2–9.
24 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool