Avoiding Unintended Flows of Personally Identifiable Information : Enterprise Identity Management and Online Social Networks
This work addresses potentially occurring unintended flows of personally identifiable information (PII) within two fields of research, i.e., enterprise identity management and online social networks. For that, we investigate which pieces of PII can how often be gathered, correlated, or even be infer...
Saved in:
Main Author: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
KIT Scientific Publishing
2013
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_41743 | ||
005 | 20210211 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20210211s2013 xx |||||o ||| 0|eng d | ||
020 | |a KSP/1000036269 | ||
020 | |a 9783731500940 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.5445/KSP/1000036269 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
100 | 1 | |a Labitzke, Sebastian |4 auth | |
245 | 1 | 0 | |a Avoiding Unintended Flows of Personally Identifiable Information : Enterprise Identity Management and Online Social Networks |
260 | |b KIT Scientific Publishing |c 2013 | ||
300 | |a 1 electronic resource (XVIII, 196 p. p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a This work addresses potentially occurring unintended flows of personally identifiable information (PII) within two fields of research, i.e., enterprise identity management and online social networks. For that, we investigate which pieces of PII can how often be gathered, correlated, or even be inferred by third parties that are not intended to get access to the specific pieces of PII. Furthermore, we introduce technical measures and concepts to avoid unintended flows of PII. | ||
540 | |a All rights reserved |4 http://oapen.org/content/about-rights | ||
546 | |a English | ||
653 | |a Big Data Analytics | ||
653 | |a Enterprise Identity and Access Management | ||
653 | |a Online Social Networks | ||
653 | |a SAML | ||
653 | |a Facebook | ||
856 | 4 | 0 | |a www.oapen.org |u https://www.ksp.kit.edu/9783731500940 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/41743 |7 0 |z DOAB: description of the publication |