Catálogo de publicaciones - libros

Compartir en
redes sociales


Título de Acceso Abierto

The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Computer science

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere 2014 Directory of Open access Books acceso abierto
No requiere 2014 SpringerLink acceso abierto

Información

Tipo de recurso:

libros

ISBN impreso

978-1-4302-6355-5

ISBN electrónico

978-1-4302-6356-2

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Tabla de contenidos

Technology Evolution, People, and Privacy

Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran

It isn’t all over; everything has not been invented; the human adventure is just beginning.

Part 1 - Getting Your Head Around Privacy | Pp. 3-24

Foundational Concepts and Frameworks

Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran

From within the secret court of men’s hearts, Tom was a dead man the minute Mayella Ewell opened her mouth and screamed.

Part 1 - Getting Your Head Around Privacy | Pp. 25-50

Data and Privacy Governance Concepts

Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran

Computers are magnificent tools for the realization of our dreams, but no machine can replace the human spark of spirit, compassion, love, and understanding.

Part 1 - Getting Your Head Around Privacy | Pp. 51-72

Developing Privacy Policies

Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran

If at first the idea is not absurd then there is no hope for it.

Part 2 - The Privacy Engineering Process | Pp. 75-92

Developing Privacy Engineering Requirements

Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran

The expectations of life depend upon diligence; the mechanic that would perfect his work must first sharpen his tools.

Part 2 - The Privacy Engineering Process | Pp. 93-120

A Privacy Engineering Lifecycle Methodology

Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran

This chapter discusses a systems engineering methodology that can be adapted to privacy engineering. The methodology presented should be followed throughout development of a project for a privacy solution. It involves interactive models that provide pictorial documentation as well as business language use cases that together present requirements, analysis, design, and test cases in a readable form. The models work together to provide an understandable information and application architecture that satisfies business requirements, including, of course, privacy and security.

Part 2 - The Privacy Engineering Process | Pp. 121-160

The Privacy Component App

Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran

This chapter describes a primary tool in the privacy engineer’s toolkit, the privacy component, originally introduced in Chapter 5. The privacy component is a self-contained, reusable software building block module developed to satisfy the privacy requirements derived from the use case discussed below. It is recommended that this component be developed as a module that can be used standalone or plugged into another enterprise program or mobile app, as will be discussed later in this book.

Part 2 - The Privacy Engineering Process | Pp. 161-178

A Runner’s Mobile App

Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran

“I’m an instant star. Just add water.” – David Bowie

Part 2 - The Privacy Engineering Process | Pp. 179-188

Vacation Planner Application

Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran

“The patterns are simple, but followed together, they make for a whole that is wiser than the sum of its parts. - ,

Part 2 - The Privacy Engineering Process | Pp. 189-202

Privacy Engineering and Quality Assurance

Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran

If you don’t have time to do it right, you must have time to do it over.

Part 2 - The Privacy Engineering Process | Pp. 203-226