The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July/August (2009 vol.11)
pp: 52-55
George F. Hurlburt , Change Index
Keith W. Miller , University of Illinois at Springfield
Jamison M. Day , Bauer College of Business, University of Houston
ABSTRACT
The concepts of privacy and security are distinct, but they're often considered synonymously when applied to computational systems. This article explores the conceptual differences between computational privacy and security and suggests four mutually exclusive models that define four different fundamental approaches to privacy and security during design. It's crucial that developers make a conscious and explicit decision how the two concepts should be approached early during system design.
INDEX TERMS
Security, privacy, software development, IT professional
CITATION
George F. Hurlburt, Keith W. Miller, Jeffrey M. Voas, Jamison M. Day, "Privacy and/or Security: Take Your Pick", IT Professional, vol.11, no. 4, pp. 52-55, July/August 2009, doi:10.1109/MITP.2009.81
REFERENCES
1. J. Zar, "Privacy and Security as Assets: Beyond Risk Thinking to Profitable Payback," Proc. Global Telecommunications Conf., IEEE CS Press, 2008, pp. 1–6.
2. M. Newman, A. Barabasi, and D. Watts, Structure and Dynamics of Networks, Princeton Univ. Press, 2006, pp. 167–181.
3. H. Jones and J.H. Soltren, "Facebook: Threats to Privacy," Project MAC: MIT Project on Mathematics and Computing, Mass. Inst. Tech., 2005; http://www-swiss.ai.mit.edu/6.805/student-papers/ fall05-papersfacebook.pdf.
4. R. Andrews, "Facebook Reverses Privacy Terms Change, Goes to Users for Help," The Washington Post,18 Feb. 2009.
5. D. Beer and R. Burrows, "Sociology and, of, and in Web 2.0: Some Initial Considerations," Sociological Research Online, vol. 12, no. 5, 2007; www.socresonline.org.uk/12/517.html.
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool