2018
DOI: 10.1007/s11227-018-2371-0
|View full text |Cite
|
Sign up to set email alerts
|

pISRA: privacy considered information security risk assessment model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
25
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(26 citation statements)
references
References 13 publications
0
25
0
Order By: Relevance
“…Privacy data protection standards (e.g., BS 10012:2017 [ 35 ], ISO/IEC 29151:2017 [ 36 ] and ISO/IEC 27018:2014 [ 37 ]), can be found in the literature focusing on PIA as a requirement in the execution of cybersecurity risk assessments. PIA and cybersecurity risk assessments are, however, treated as two different and uncorrelated processes [ 32 , 38 ], with a clear gap on automated tools, methods and models that implement PIA [ 33 ]. Even though standards (e.g., ISO/IEC 29134:2017 [ 39 ]) provide details and guidance to conduct privacy impact assessments, they are very generic, and provide high-level information that in some cases is insufficient to perform an appropriate privacy risk assessment [ 38 ].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Privacy data protection standards (e.g., BS 10012:2017 [ 35 ], ISO/IEC 29151:2017 [ 36 ] and ISO/IEC 27018:2014 [ 37 ]), can be found in the literature focusing on PIA as a requirement in the execution of cybersecurity risk assessments. PIA and cybersecurity risk assessments are, however, treated as two different and uncorrelated processes [ 32 , 38 ], with a clear gap on automated tools, methods and models that implement PIA [ 33 ]. Even though standards (e.g., ISO/IEC 29134:2017 [ 39 ]) provide details and guidance to conduct privacy impact assessments, they are very generic, and provide high-level information that in some cases is insufficient to perform an appropriate privacy risk assessment [ 38 ].…”
Section: Related Workmentioning
confidence: 99%
“…PIA and cybersecurity risk assessments are, however, treated as two different and uncorrelated processes [ 32 , 38 ], with a clear gap on automated tools, methods and models that implement PIA [ 33 ]. Even though standards (e.g., ISO/IEC 29134:2017 [ 39 ]) provide details and guidance to conduct privacy impact assessments, they are very generic, and provide high-level information that in some cases is insufficient to perform an appropriate privacy risk assessment [ 38 ]. Although the literature provides a wide variety of privacy metrics, they mainly consider properties of privacy-enhancing technologies such as the amount of sensitive information leaked or the number of indistinguishable users, instead of the privacy impact [ 40 ].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The paper [8] then looks at the privacy and security part under the theme of Internet of Things. Authors propose a privacy considered information security risk assessment model that can take both privacy impact analysis and risk assessment into consideration.…”
mentioning
confidence: 99%