Towards development of a trust grid to balance between organization's interests and employee's privacy

To avoid financial and other losses that occur because of insider threat an agent based profiling model was developed. When profile of the trusted user becomes mature it is analyzed and verified against organization's policy. The users are marked as suspicious if their activities are against th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Ali, G., Shaikh, N.A., Shaikh, Z.A.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 6
container_issue
container_start_page 1
container_title
container_volume
creator Ali, G.
Shaikh, N.A.
Shaikh, Z.A.
description To avoid financial and other losses that occur because of insider threat an agent based profiling model was developed. When profile of the trusted user becomes mature it is analyzed and verified against organization's policy. The users are marked as suspicious if their activities are against the policies of the organizations. This paper discusses the privacy and ethical issues of the proposed model, ACENET, when it is deployed in the organization to monitor an employee's activities. The paper also addresses misconception regarding security and privacy. The conventions regarding privacy policy of some standard bodies have also been referred. The tentative issues and the conflict between employer and employee that rises because of their interests have also been addressed and solution in form of Trust - Grid has been proposed. Finally, it has been concluded that in the light of provided guidelines, policy-making is the foundation to resolve all kind of probable conflicts.
doi_str_mv 10.1109/ICITST.2009.5402637
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5402637</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5402637</ieee_id><sourcerecordid>5402637</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-fd9fd7f10a7d9326321871dd3dddc5f09140cd13fbc2bfa2acc4ddaaaa68383f3</originalsourceid><addsrcrecordid>eNo1UM1KAzEYjIig1j5BL7l5ak022c3mKMWfhYIH916y-b6UyDYpSWypT--CdS7DMDDDDCELzlacM_3Urbv-s19VjOlVLVnVCHVF5lq1XFZS1o1sq2ty_y-UviXznL8YY1w3qub6jrg-nkyCTAGPOMbDHkOh0VFDS_rOhe6SB1oiHcxogkU6YDkhBhrTzgT_Y4qP4TFTHwomzCVTE4Di_jDGM-JkHJI_Gnt-IDfOjBnnF56R_vWlX78vNx9v3fp5s_SalaUD7UA5zowCLaY1FW8VBxAAYGvHNJfMAhdusNXgTGWslQBmQtOKVjgxI4u_WI-I26l7b9J5e3lG_AIRhFrv</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Towards development of a trust grid to balance between organization's interests and employee's privacy</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Ali, G. ; Shaikh, N.A. ; Shaikh, Z.A.</creator><creatorcontrib>Ali, G. ; Shaikh, N.A. ; Shaikh, Z.A.</creatorcontrib><description>To avoid financial and other losses that occur because of insider threat an agent based profiling model was developed. When profile of the trusted user becomes mature it is analyzed and verified against organization's policy. The users are marked as suspicious if their activities are against the policies of the organizations. This paper discusses the privacy and ethical issues of the proposed model, ACENET, when it is deployed in the organization to monitor an employee's activities. The paper also addresses misconception regarding security and privacy. The conventions regarding privacy policy of some standard bodies have also been referred. The tentative issues and the conflict between employer and employee that rises because of their interests have also been addressed and solution in form of Trust - Grid has been proposed. Finally, it has been concluded that in the light of provided guidelines, policy-making is the foundation to resolve all kind of probable conflicts.</description><identifier>ISBN: 1424456479</identifier><identifier>ISBN: 9781424456475</identifier><identifier>EISBN: 9781424456482</identifier><identifier>EISBN: 0954662822</identifier><identifier>EISBN: 9780954662820</identifier><identifier>EISBN: 1424456487</identifier><identifier>DOI: 10.1109/ICITST.2009.5402637</identifier><language>eng</language><publisher>IEEE</publisher><subject>Communication system control ; Computer science ; Context ; Data privacy ; Data security ; Guidelines ; Information security ; Monitoring ; Multiagent systems ; Standards organizations</subject><ispartof>2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5402637$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,778,782,787,788,2054,27908,54903</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5402637$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ali, G.</creatorcontrib><creatorcontrib>Shaikh, N.A.</creatorcontrib><creatorcontrib>Shaikh, Z.A.</creatorcontrib><title>Towards development of a trust grid to balance between organization's interests and employee's privacy</title><title>2009 International Conference for Internet Technology and Secured Transactions, (ICITST)</title><addtitle>ICITST</addtitle><description>To avoid financial and other losses that occur because of insider threat an agent based profiling model was developed. When profile of the trusted user becomes mature it is analyzed and verified against organization's policy. The users are marked as suspicious if their activities are against the policies of the organizations. This paper discusses the privacy and ethical issues of the proposed model, ACENET, when it is deployed in the organization to monitor an employee's activities. The paper also addresses misconception regarding security and privacy. The conventions regarding privacy policy of some standard bodies have also been referred. The tentative issues and the conflict between employer and employee that rises because of their interests have also been addressed and solution in form of Trust - Grid has been proposed. Finally, it has been concluded that in the light of provided guidelines, policy-making is the foundation to resolve all kind of probable conflicts.</description><subject>Communication system control</subject><subject>Computer science</subject><subject>Context</subject><subject>Data privacy</subject><subject>Data security</subject><subject>Guidelines</subject><subject>Information security</subject><subject>Monitoring</subject><subject>Multiagent systems</subject><subject>Standards organizations</subject><isbn>1424456479</isbn><isbn>9781424456475</isbn><isbn>9781424456482</isbn><isbn>0954662822</isbn><isbn>9780954662820</isbn><isbn>1424456487</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1UM1KAzEYjIig1j5BL7l5ak022c3mKMWfhYIH916y-b6UyDYpSWypT--CdS7DMDDDDCELzlacM_3Urbv-s19VjOlVLVnVCHVF5lq1XFZS1o1sq2ty_y-UviXznL8YY1w3qub6jrg-nkyCTAGPOMbDHkOh0VFDS_rOhe6SB1oiHcxogkU6YDkhBhrTzgT_Y4qP4TFTHwomzCVTE4Di_jDGM-JkHJI_Gnt-IDfOjBnnF56R_vWlX78vNx9v3fp5s_SalaUD7UA5zowCLaY1FW8VBxAAYGvHNJfMAhdusNXgTGWslQBmQtOKVjgxI4u_WI-I26l7b9J5e3lG_AIRhFrv</recordid><startdate>200911</startdate><enddate>200911</enddate><creator>Ali, G.</creator><creator>Shaikh, N.A.</creator><creator>Shaikh, Z.A.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200911</creationdate><title>Towards development of a trust grid to balance between organization's interests and employee's privacy</title><author>Ali, G. ; Shaikh, N.A. ; Shaikh, Z.A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-fd9fd7f10a7d9326321871dd3dddc5f09140cd13fbc2bfa2acc4ddaaaa68383f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Communication system control</topic><topic>Computer science</topic><topic>Context</topic><topic>Data privacy</topic><topic>Data security</topic><topic>Guidelines</topic><topic>Information security</topic><topic>Monitoring</topic><topic>Multiagent systems</topic><topic>Standards organizations</topic><toplevel>online_resources</toplevel><creatorcontrib>Ali, G.</creatorcontrib><creatorcontrib>Shaikh, N.A.</creatorcontrib><creatorcontrib>Shaikh, Z.A.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ali, G.</au><au>Shaikh, N.A.</au><au>Shaikh, Z.A.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Towards development of a trust grid to balance between organization's interests and employee's privacy</atitle><btitle>2009 International Conference for Internet Technology and Secured Transactions, (ICITST)</btitle><stitle>ICITST</stitle><date>2009-11</date><risdate>2009</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><isbn>1424456479</isbn><isbn>9781424456475</isbn><eisbn>9781424456482</eisbn><eisbn>0954662822</eisbn><eisbn>9780954662820</eisbn><eisbn>1424456487</eisbn><abstract>To avoid financial and other losses that occur because of insider threat an agent based profiling model was developed. When profile of the trusted user becomes mature it is analyzed and verified against organization's policy. The users are marked as suspicious if their activities are against the policies of the organizations. This paper discusses the privacy and ethical issues of the proposed model, ACENET, when it is deployed in the organization to monitor an employee's activities. The paper also addresses misconception regarding security and privacy. The conventions regarding privacy policy of some standard bodies have also been referred. The tentative issues and the conflict between employer and employee that rises because of their interests have also been addressed and solution in form of Trust - Grid has been proposed. Finally, it has been concluded that in the light of provided guidelines, policy-making is the foundation to resolve all kind of probable conflicts.</abstract><pub>IEEE</pub><doi>10.1109/ICITST.2009.5402637</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1424456479
ispartof 2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009, p.1-6
issn
language eng
recordid cdi_ieee_primary_5402637
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Communication system control
Computer science
Context
Data privacy
Data security
Guidelines
Information security
Monitoring
Multiagent systems
Standards organizations
title Towards development of a trust grid to balance between organization's interests and employee's privacy
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T20%3A47%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Towards%20development%20of%20a%20trust%20grid%20to%20balance%20between%20organization's%20interests%20and%20employee's%20privacy&rft.btitle=2009%20International%20Conference%20for%20Internet%20Technology%20and%20Secured%20Transactions,%20(ICITST)&rft.au=Ali,%20G.&rft.date=2009-11&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.isbn=1424456479&rft.isbn_list=9781424456475&rft_id=info:doi/10.1109/ICITST.2009.5402637&rft_dat=%3Cieee_6IE%3E5402637%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424456482&rft.eisbn_list=0954662822&rft.eisbn_list=9780954662820&rft.eisbn_list=1424456487&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5402637&rfr_iscdi=true