The Community for Technology Leaders
RSS Icon
Issue No.04 - July/August (2009 vol.11)
pp: 52-55
George F. Hurlburt , Change Index
Keith W. Miller , University of Illinois at Springfield
Jamison M. Day , Bauer College of Business, University of Houston
The concepts of privacy and security are distinct, but they're often considered synonymously when applied to computational systems. This article explores the conceptual differences between computational privacy and security and suggests four mutually exclusive models that define four different fundamental approaches to privacy and security during design. It's crucial that developers make a conscious and explicit decision how the two concepts should be approached early during system design.
Security, privacy, software development, IT professional
George F. Hurlburt, Keith W. Miller, Jeffrey M. Voas, Jamison M. Day, "Privacy and/or Security: Take Your Pick", IT Professional, vol.11, no. 4, pp. 52-55, July/August 2009, doi:10.1109/MITP.2009.81
1. J. Zar, "Privacy and Security as Assets: Beyond Risk Thinking to Profitable Payback," Proc. Global Telecommunications Conf., IEEE CS Press, 2008, pp. 1–6.
2. M. Newman, A. Barabasi, and D. Watts, Structure and Dynamics of Networks, Princeton Univ. Press, 2006, pp. 167–181.
3. H. Jones and J.H. Soltren, "Facebook: Threats to Privacy," Project MAC: MIT Project on Mathematics and Computing, Mass. Inst. Tech., 2005; fall05-papersfacebook.pdf.
4. R. Andrews, "Facebook Reverses Privacy Terms Change, Goes to Users for Help," The Washington Post,18 Feb. 2009.
5. D. Beer and R. Burrows, "Sociology and, of, and in Web 2.0: Some Initial Considerations," Sociological Research Online, vol. 12, no. 5, 2007;
374 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool