Catálogo de publicaciones - libros
Título de Acceso Abierto
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Computer science
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No requiere | 2014 | Directory of Open access Books | ||
No requiere | 2014 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-1-4302-6355-5
ISBN electrónico
978-1-4302-6356-2
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2014
Cobertura temática
Tabla de contenidos
Technology Evolution, People, and Privacy
Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran
It isn’t all over; everything has not been invented; the human adventure is just beginning.
Part 1 - Getting Your Head Around Privacy | Pp. 3-24
Foundational Concepts and Frameworks
Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran
From within the secret court of men’s hearts, Tom was a dead man the minute Mayella Ewell opened her mouth and screamed.
Part 1 - Getting Your Head Around Privacy | Pp. 25-50
Data and Privacy Governance Concepts
Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran
Computers are magnificent tools for the realization of our dreams, but no machine can replace the human spark of spirit, compassion, love, and understanding.
Part 1 - Getting Your Head Around Privacy | Pp. 51-72
Developing Privacy Policies
Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran
If at first the idea is not absurd then there is no hope for it.
Part 2 - The Privacy Engineering Process | Pp. 75-92
Developing Privacy Engineering Requirements
Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran
The expectations of life depend upon diligence; the mechanic that would perfect his work must first sharpen his tools.
Part 2 - The Privacy Engineering Process | Pp. 93-120
A Privacy Engineering Lifecycle Methodology
Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran
This chapter discusses a systems engineering methodology that can be adapted to privacy engineering. The methodology presented should be followed throughout development of a project for a privacy solution. It involves interactive models that provide pictorial documentation as well as business language use cases that together present requirements, analysis, design, and test cases in a readable form. The models work together to provide an understandable information and application architecture that satisfies business requirements, including, of course, privacy and security.
Part 2 - The Privacy Engineering Process | Pp. 121-160
The Privacy Component App
Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran
This chapter describes a primary tool in the privacy engineer’s toolkit, the privacy component, originally introduced in Chapter 5. The privacy component is a self-contained, reusable software building block module developed to satisfy the privacy requirements derived from the use case discussed below. It is recommended that this component be developed as a module that can be used standalone or plugged into another enterprise program or mobile app, as will be discussed later in this book.
Part 2 - The Privacy Engineering Process | Pp. 161-178
A Runner’s Mobile App
Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran
“I’m an instant star. Just add water.” – David Bowie
Part 2 - The Privacy Engineering Process | Pp. 179-188
Vacation Planner Application
Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran
“The patterns are simple, but followed together, they make for a whole that is wiser than the sum of its parts. - ,
Part 2 - The Privacy Engineering Process | Pp. 189-202
Privacy Engineering and Quality Assurance
Michelle Finneran Dennedy; Jonathan Fox; Thomas R. Finneran
If you don’t have time to do it right, you must have time to do it over.
Part 2 - The Privacy Engineering Process | Pp. 203-226