Defining and Protecting Meta Privacy: A New Conceptual Framework Within Information Privacy

When considering information security and privacy issues most of the attention has previously focused on data protection and the privacy of personally identifiable information (PII). What is often overlooked is consideration for the operational and transactional data. Specifically, the security and...

Full description

Saved in:
Bibliographic Details
Published inICDEW '06 : 22nd International Conference on Data Engineering Workshops : 3-7 April 2006 p. 101
Main Authors Skinner, G., Song Han, Chang, E.
Format Conference Proceeding
LanguageEnglish
Published IEEE 2006
Subjects
Online AccessGet full text
ISBN9780769525716
0769525717
DOI10.1109/ICDEW.2006.46

Cover

Abstract When considering information security and privacy issues most of the attention has previously focused on data protection and the privacy of personally identifiable information (PII). What is often overlooked is consideration for the operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of computing environments has not been factored in to most methods. Metadata, or data about data, can contain many personal details about an entity. It is subject to the same risks and malicious actions personal data is exposed to. This paper presents a new perspective for information security and privacy. It is termed Meta Privacy and is concerned with the protection and privacy of information system metadata and metastructure details. We first present a formal definition for Meta Privacy, and then analyze the factors that encompass and influence Meta Privacy. In addition, we recommend some techniques for the protection of Meta Privacy within the information systems. Further, the paper highlights the importance of ensuring all informational elements of information systems are adequately protected from a privacy perspective.
AbstractList When considering information security and privacy issues most of the attention has previously focused on data protection and the privacy of personally identifiable information (PII). What is often overlooked is consideration for the operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of computing environments has not been factored in to most methods. Metadata, or data about data, can contain many personal details about an entity. It is subject to the same risks and malicious actions personal data is exposed to. This paper presents a new perspective for information security and privacy. It is termed Meta Privacy and is concerned with the protection and privacy of information system metadata and metastructure details. We first present a formal definition for Meta Privacy, and then analyze the factors that encompass and influence Meta Privacy. In addition, we recommend some techniques for the protection of Meta Privacy within the information systems. Further, the paper highlights the importance of ensuring all informational elements of information systems are adequately protected from a privacy perspective.
Author Skinner, G.
Chang, E.
Song Han
Author_xml – sequence: 1
  givenname: G.
  surname: Skinner
  fullname: Skinner, G.
  organization: Curtin University of Technology, Australia
– sequence: 2
  surname: Song Han
  fullname: Song Han
– sequence: 3
  givenname: E.
  surname: Chang
  fullname: Chang, E.
BookMark eNo1jMtOwkAUQCdRExW7dOVmfgC882zHHSmgTfCxIGHhgty2tzoKU9KOEP5ejLo6OYtzLtlpaAMxdi1gJAS42yKfTJcjCWBH2p6wxKUZpNYZaVJhz1nS9x8AIJzNjBMX7HVCjQ8-vHEMNX_p2khV_NFHinh0v8PqcMfH_In2PG9DRdv4hWs-63BD-7b75Esf333gRWjaboPRt-E_u2JnDa57Sv44YIvZdJE_DOfP90U-ng-9gzg0mBplTVpaI7XWoKQhrepSZa6istGlq1EbY7WBTNWoKnQSUMsyBdFkWaUG7OZ364lote38BrvDSlh5PFj1DUg6Uds
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICDEW.2006.46
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EndPage 101
ExternalDocumentID 1623896
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AARBI
AAWTH
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
OCL
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i90t-5a753657b6524440325e43db389cebf4b9da455645083da3ca920a42b701f88c3
IEDL.DBID RIE
ISBN 9780769525716
0769525717
IngestDate Wed Aug 27 02:31:19 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-5a753657b6524440325e43db389cebf4b9da455645083da3ca920a42b701f88c3
PageCount 1
ParticipantIDs ieee_primary_1623896
PublicationCentury 2000
PublicationDate 20060000
PublicationDateYYYYMMDD 2006-01-01
PublicationDate_xml – year: 2006
  text: 20060000
PublicationDecade 2000
PublicationTitle ICDEW '06 : 22nd International Conference on Data Engineering Workshops : 3-7 April 2006
PublicationTitleAbbrev ICDEW
PublicationYear 2006
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001968591
Score 1.3877178
Snippet When considering information security and privacy issues most of the attention has previously focused on data protection and the privacy of personally...
SourceID ieee
SourceType Publisher
StartPage 101
SubjectTerms Australia
Costs
Data privacy
Data security
Filling
Information security
Information systems
Internet
Positron emission tomography
Protection
Title Defining and Protecting Meta Privacy: A New Conceptual Framework Within Information Privacy
URI https://ieeexplore.ieee.org/document/1623896
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1JSwMxFA61J09VW3EnB49OO0uSmXiTLlSh4qHSgoeS5QWLMhWZEfTXm8zSEfHgbd5A4JFJ5q3f9xC6hICZhGnruYnQBiiBibxE-NqjYKTRQJUKHN55ds-mj-RuSZctdLXFwgBA0XwGffdY1PL1RuUuVTYIrK1OONtBO_aYlVitJp_CmaNiKyNz7jg-g7gi2Kll1nBsDm6Ho_GirEU43_fHZJXCsEw6aFarVPaTvPTzTPbV1y-2xv_qvId6DYQPP2yN0z5qQXqAOvUMB1xd6S56GoEpZkRgkWq3whUVnDiDTFh5_SHU5zW-wfZviIclxjEXr3hSN3XhxTp7Xqe4wjW571wv66H5ZDwfTr1q4IK35n7mUWFjF0Zjyag1-sSPQgok0tLqr0AaIrkWhDr6Geu3aREpwUNfkFDGfmCSREWHqJ1uUjhCGELuW0eCxEwFBKxB5KEwVMY2IHbjjeUx6rqtWr2VlBqrapdO_n59inabzMcZamfvOZxbXyCTF8Uh-AbtHK_m
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3JTsMwELVKOcCpQIvY8YEjabPYTswNdVELTcWhqJU4VLZjiwiUIpQgwddjZ2kQ4sAtE8nSyFnezHjeGwCupENUQCIduTFXJyiO8qyA2ZGFpeIqklgIx_CdwxkZP6K7JV42wPWGCyOlzJvPZNdc5mf50VpkplTWczRWB5RsgW2N-wgXbK26okKJEWMrcnNqVD4dv5TYqWxSq2z2Jv3BcFGcRpjo98dslRxaRi0QVk4VHSUv3SzlXfH1S6_xv17vgU5N4oMPG3jaBw2ZHIBWNcUBlh91GzwNpMqnRECWRGaFOVYwZihTpu34g4nPG3gL9f8Q9guWY8Ze4ahq64KLOH2OE1gym8yTrpZ1wHw0nPfHVjlywYqpnVqY6eyFYJ8TrGEf2Z6LJfIirv0XkivEacQQNgI0OnKLmCcYdW2GXO7bjgoC4R2CZrJO5BGA0qW2DiWQT4SDpIZE6jKFua9TYjPgmB-Dttmq1VshqrEqd-nk79uXYGc8D6er6WR2fwp26zrIGWim75k815FByi_yF-IbV7yzMw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=ICDEW+%2706+%3A+22nd+International+Conference+on+Data+Engineering+Workshops+%3A+3-7+April+2006&rft.atitle=Defining+and+Protecting+Meta+Privacy%3A+A+New+Conceptual+Framework+Within+Information+Privacy&rft.au=Skinner%2C+G.&rft.au=Song+Han&rft.au=Chang%2C+E.&rft.date=2006-01-01&rft.pub=IEEE&rft.isbn=9780769525716&rft.spage=101&rft.epage=101&rft_id=info:doi/10.1109%2FICDEW.2006.46&rft.externalDocID=1623896
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769525716/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769525716/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780769525716/sc.gif&client=summon&freeimage=true