Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Analysis

Privacy Impact Assessments (PIAs) play a crucial role in providing privacy protection for data subjects and supporting risk management. From an engineering perspective, the core of a PIA is a risk assessment, which typically follows a step-by-step process of risk identification and risk mitigation....

Full description

Saved in:
Bibliographic Details
Published inData Privacy Management, Cryptocurrencies and Blockchain Technology Vol. 11025; pp. 209 - 224
Main Authors Alshammari, Majed, Simpson, Andrew
Format Book Chapter
LanguageEnglish
Published Switzerland Springer International Publishing AG 2018
Springer International Publishing
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783030003043
3030003043
ISSN0302-9743
1611-3349
DOI10.1007/978-3-030-00305-0_16

Cover

Abstract Privacy Impact Assessments (PIAs) play a crucial role in providing privacy protection for data subjects and supporting risk management. From an engineering perspective, the core of a PIA is a risk assessment, which typically follows a step-by-step process of risk identification and risk mitigation. In order for a PIA to be holistic and effective, it needs to be complemented by an appropriate privacy risk model that considers legal, organisational, societal and technical aspects. We propose a data-centric approach for identifying and analysing potential privacy risks in a comprehensive manner.
AbstractList Privacy Impact Assessments (PIAs) play a crucial role in providing privacy protection for data subjects and supporting risk management. From an engineering perspective, the core of a PIA is a risk assessment, which typically follows a step-by-step process of risk identification and risk mitigation. In order for a PIA to be holistic and effective, it needs to be complemented by an appropriate privacy risk model that considers legal, organisational, societal and technical aspects. We propose a data-centric approach for identifying and analysing potential privacy risks in a comprehensive manner.
Author Alshammari, Majed
Simpson, Andrew
Author_xml – sequence: 1
  givenname: Majed
  surname: Alshammari
  fullname: Alshammari, Majed
  email: majed.alshammari@cs.ox.ac.uk
– sequence: 2
  givenname: Andrew
  surname: Simpson
  fullname: Simpson, Andrew
BookMark eNpVkFFPwjAQx6uiEZBv4MO-QLV33brWN0JQSTAawntT1g4mY5vrxPDtLcKLL_fP3f_-l9xvQHpVXTlC7oE9AGPpo0ol5ZRxRlkoCWUaxAUZhTEP_d-MXZI-CADKeayu_nkx75F-UKQqjfkNGQBLUAAqmdySkfefYQuZVELKPlks6x_TWh-ZKprmucu6Yu-ij7bYm-wQzXaNybrg2WhR-G009t55v3NVF725blPbuqzXh6ezWZny4At_R65zU3o3OuuQLJ-ny8krnb-_zCbjOV2jgo6uUFhucgCbCGRoUzQS0SWZYQYwVbmw0qLkqBLBII9lknCzytAyDsylfEjwdNY3bVGtXatXdb31GgKtAFEHIprrwEH_AdNHiCEUn0JNW399O99pd0xl4aPWlNnGNJ1rvRYoAXmqkXGNIPkvfFlwQQ
ContentType Book Chapter
Copyright Springer Nature Switzerland AG 2018
Copyright_xml – notice: Springer Nature Switzerland AG 2018
DBID FFUUA
DEWEY 5.8
DOI 10.1007/978-3-030-00305-0_16
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9783030003050
3030003051
EISSN 1611-3349
Editor Herrera-Joancomartí, Jordi
Rios, Ruben
Garcia-Alfaro, Joaquin
Livraga, Giovanni
Editor_xml – sequence: 1
  fullname: Herrera-Joancomartí, Jordi
– sequence: 2
  fullname: Rios, Ruben
– sequence: 3
  fullname: Livraga, Giovanni
– sequence: 4
  fullname: Garcia-Alfaro, Joaquin
EndPage 224
ExternalDocumentID EBC6281237_203_218
GroupedDBID 0D6
0DA
38.
AABBV
ACOUV
AEDXK
AEJLV
AEKFX
AEZAY
ALMA_UNASSIGNED_HOLDINGS
ANXHU
BBABE
BICGV
BJAWL
BUBNW
CVGDX
CZZ
EDOXC
FFUUA
FOYMO
I4C
IEZ
NQNQZ
OEBZI
SBO
TPJZQ
TSXQS
Z7R
Z7S
Z7U
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z88
-DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-g291t-b26d3af11d56202d72a822e5ca0a1279f6d8d283295601f48553abc2d0310e73
ISBN 9783030003043
3030003043
ISSN 0302-9743
IngestDate Wed Sep 17 03:58:04 EDT 2025
Thu May 29 01:52:43 EDT 2025
IsPeerReviewed true
IsScholarly true
LCCallNum QA76.9.A25
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-g291t-b26d3af11d56202d72a822e5ca0a1279f6d8d283295601f48553abc2d0310e73
OCLC 1052612985
PQID EBC6281237_203_218
PageCount 16
ParticipantIDs springer_books_10_1007_978_3_030_00305_0_16
proquest_ebookcentralchapters_6281237_203_218
PublicationCentury 2000
PublicationDate 2018
PublicationDateYYYYMMDD 2018-01-01
PublicationDate_xml – year: 2018
  text: 2018
PublicationDecade 2010
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Cham
PublicationSeriesSubtitle Security and Cryptology
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate Lect.Notes Computer
PublicationSubtitle ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings
PublicationTitle Data Privacy Management, Cryptocurrencies and Blockchain Technology
PublicationYear 2018
Publisher Springer International Publishing AG
Springer International Publishing
Publisher_xml – name: Springer International Publishing AG
– name: Springer International Publishing
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Steffen, Bernhard
Pandu Rangan, C.
Kanade, Takeo
Kittler, Josef
Weikum, Gerhard
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
– sequence: 8
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
– sequence: 9
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
– sequence: 10
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
– sequence: 11
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
– sequence: 12
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
SSID ssj0002089688
ssj0002792
Score 2.09994
Snippet Privacy Impact Assessments (PIAs) play a crucial role in providing privacy protection for data subjects and supporting risk management. From an engineering...
SourceID springer
proquest
SourceType Publisher
StartPage 209
SubjectTerms Potential Privacy Risks
Privacy Harms
Privacy Impact Assessments (PIA)
Privacy Risk Models
Subject Data
Title Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Analysis
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6281237&ppg=218
http://link.springer.com/10.1007/978-3-030-00305-0_16
Volume 11025
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT9wwELVge6l6gH6pUIp86G3lKrGz-eC2oC0UFVRV24qb5dhOiyoFWAJS-fXM2E42m-6FXqLdJJtY87LOzHjeG0I-5kWSlRDggOemc5aYKmWljVNWFCiDWpXgoSMb-ew8PfmRnF5MLnqMa2SXNOUn_bCWV_I_qMI-wBVZsk9Atrso7IDPgC9sAWHYDpzf1TSrr2VRjRp_W1zeY8P2ZRWLy3wu_l43V9pJL8F_18swH8Jr64_-rS7rf_Lp4YlxFbR48thrGmNRUXuDL55N6eiMWI0-7RQ9x2euCbVnvWB5nTsctE76SYU4HyQV2qTiIC3Zy4xNj1cCUXgRuujKSy51Myt4L5O183S_NAN-xlwowyAeWSOLzcMEvSqLPTs8Sjl4JyKTPBIST7q-YdhNDFfdQ2uVTbIJYxuRZ9PZ6defXe6NR3mR5jlSfbpxezGm5fcezXLdMFcCksEaunNN5tvkBdJVKPJIYOAvyYatX5GttlkHDXP3a_I9wEtVTTt4aYCXenjhmKGIH13CS3vwHoSDAdw3ZP55Nj86YaGhBvvFi7hhJU-NUFUcG_B6I24yrsA_tBOtIhXzrKhSkxvsXYVBc1yhbpBQpeYG9WNtJt6SUX1V23eEJtjUzGY2UWqSCFOqDOaCyBY6FjYXWu8Q1ppHulX_UGqsvTFu5QC7HTJubSjx9FvZymmD8aWQYHfpjC_R-LtPvPp78nz5kO-RUbO4sx_Al2zK_fBoPAIIzHFM
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Data+Privacy+Management%2C+Cryptocurrencies+and+Blockchain+Technology&rft.atitle=Towards+an+Effective+Privacy+Impact+and+Risk+Assessment+Methodology%3A+Risk+Analysis&rft.date=2018-01-01&rft.pub=Springer+International+Publishing+AG&rft.isbn=9783030003043&rft.volume=11025&rft_id=info:doi/10.1007%2F978-3-030-00305-0_16&rft.externalDBID=218&rft.externalDocID=EBC6281237_203_218
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6281237-l.jpg