메뉴 건너뛰기




Volumn 128 LNBIP, Issue , 2012, Pages 148-161

Conducting a privacy impact analysis for the analysis of communication records

Author keywords

CDRs; Communication Records; PETs; PIA; Privacy; VoIP

Indexed keywords

COMMUNICATION; DATA PRIVACY; INFORMATION SCIENCE; INTERNET TELEPHONY; TELECOMMUNICATION SYSTEMS; VOICE/DATA COMMUNICATION SYSTEMS;

EID: 84867705167     PISSN: 18651348     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-33281-4_12     Document Type: Conference Paper
Times cited : (4)

References (24)
  • 1
    • 78549292872 scopus 로고    scopus 로고
    • Australian Government
    • Australian Government - Office of the Privacy Commissioner: Privacy Impact Assessment Guide. Australian Government (2010), http://www.privacy.gov. au/materials/types/download/9509/6590
    • (2010) Privacy Impact Assessment Guide
  • 2
    • 84911355897 scopus 로고    scopus 로고
    • Gartner Inc.: Gartner Inc.
    • Gartner Inc.: Gartner Magic Quadrant for Unified Communications 2010. Gartner Inc. (2010), http://msunified.net/2010/08/09/gartner-magic-quadrant-for- unified-communications-2010/
    • (2010) Gartner Magic Quadrant for Unified Communications 2010
  • 3
    • 1842538795 scopus 로고    scopus 로고
    • Privacy as contextual integrity
    • Nissenbaum, H.: Privacy as contextual integrity. Washington Law Review 79(1), 101-139 (2004)
    • (2004) Washington Law Review , vol.79 , Issue.1 , pp. 101-139
    • Nissenbaum, H.1
  • 5
    • 84911356153 scopus 로고    scopus 로고
    • Cisco Systems Inc.
    • Cisco Systems Inc.: Cisco Call Detail Records Field Descriptions. Cisco Systems Inc. (2010), http://www.cisco.com/en/US/docs/ voice-ip-comm/cucm/ service/8-5-1/cdrdef/cdrfdes.html
    • (2010) Cisco Call Detail Records Field Descriptions
  • 6
    • 79952002261 scopus 로고    scopus 로고
    • A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
    • Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 16, 3-32 (2011)
    • (2011) Requir. Eng. , vol.16 , pp. 3-32
    • Deng, M.1    Wuyts, K.2    Scandariato, R.3    Preneel, B.4    Joosen, W.5
  • 8
    • 50949085110 scopus 로고    scopus 로고
    • Addressing privacy requirements in systems design: The pris method
    • Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in systems design: the pris method. Requir. Eng. 13, 241-255 (2008)
    • (2008) Requir. Eng. , vol.13 , pp. 241-255
    • Kalloniatis, C.1    Kavakli, E.2    Gritzalis, S.3
  • 17
    • 70349571535 scopus 로고    scopus 로고
    • Privacy considerations in awareness systems. Designing with privacy in mind
    • Markopoulos, P., De Ruyter, B., Mackay, W. (eds.) Springer, London
    • Patil, S., Kobsa, A.: Privacy considerations in awareness systems. Designing with privacy in mind. In: Markopoulos, P., De Ruyter, B., Mackay, W. (eds.) Awareness Systems. Human-Computer Interaction Series, pp. 187-206. Springer, London (2009)
    • (2009) Awareness Systems. Human-Computer Interaction Series , pp. 187-206
    • Patil, S.1    Kobsa, A.2
  • 20
    • 0003729341 scopus 로고    scopus 로고
    • Internet Engineering Task Force (IETF), IETF RFC 2104
    • IETF, Hmac: Keyed-hashing for message authentication, Internet Engineering Task Force (IETF), IETF RFC 2104 (1997), http://tools.ietf.org/rfc/ rfc2104.txt
    • (1997) Hmac: Keyed-hashing for Message Authentication
  • 23
    • 78650860654 scopus 로고    scopus 로고
    • Lessons learned on the usage of call logs for security and management in IP telephony
    • Tartarelli, S., d'Heureuse, N., Niccolini, S.: Lessons learned on the usage of call logs for security and management in IP telephony. IEEE Communications Magazine 48(12), 76-82 (2010)
    • (2010) IEEE Communications Magazine , vol.48 , Issue.12 , pp. 76-82
    • Tartarelli, S.1    D'Heureuse, N.2    Niccolini, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.