Assessment methods. Various initiatives emerges to
extend the use of risk assessment to the privacy
domain. E.g., the Commission nationale de
l'informatique et des libertés (CNIL - In English:
National Commission on Informatics and Liberty)
proposes a privacy risks assessment method, which
can be integrated in a privacy impact assessment
(Netha, 2016). The National Institute of Standards
and Technology (NIST) is also developing a specific
privacy risk management model and framework and
attempting to integrate it with its security risk
management framework. These initiatives can be
seen as an extension to the Australian National
eHealth Security and Access Framework approach
(Netha, 2016), as they do not only address the CIA
triad, but additional objectives associated with
privacy. As the privacy objectives of the individuals
are translated into objectives of the organization, they
however remain focalized on fully assessing the risks
(the combination of both threat and impact) on the
organization. The PMM, as an extension of the SST,
is an artefact that could sustain the PIA management.
Therefore, the preliminary work related to the
mapping between the risk and the BSE could serve as
a good basis considering that risk of enterprise
privacy breach is a function of the tuple privacy
threat, privacy impact, privacy vulnerability. Based
on the integration of BSE - PMM, and given the
alignment between the risk concepts and the BSE, it
is possible to extrapolate the enterprise PIA to the
sectorial level as well.
REFERENCES
Ajam, N., Cuppens-Boulahia, N., Cuppens, F., 2013.
Contextual privacy management in extended role based
access control model. DPM'13. Springer.
Alter, S., 2011. Metamodel for service design and service
innovation: Integrating service activities, service
systems, and value constellations.
Antón, A.I., Bertino, E., Li, N., Yu, T. 2007. A roadmap for
comprehensive online privacy policy management.
Commun. ACM 50(7), pp. 109-116.
Ardagna, C. A., Cremonini, M., De Capitani di Vimercati,
S., Samarati, P. 2008. A privacy-aware access control
system. Journal of Computer Security, 16(4), 369-397.
Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunte, M.
2003. Enterprise privacy authorization language, 1.2.
Bettini, C., Wang, X. S., Jajodia, S. 2005. Protecting
privacy against location-based personal identification.
SDM 2005. p. 185-199.
Cholez, H., Feltus, C., 2014. Towards an innovative
systemic approach of risk management. In 7
th
ACM SIN
conference.
CNIL, http://www.cnil.fr/fileadmin/documents/ en/ CNIL-
PIA-1-Methodol ogy.pdf.
Cranor L., 2002. Web privacy with P3P. O'Reilly Media.
CSSF, 2012. Circulaire CSSF 12/544, Optimisation of the
supervision exercised on the "support PFS" by a risk-
based approach.
De Capitani di Vimercati, S., Foresti, S., Livraga, G., et al.
2012. Data privacy: definitions and techniques.
IJUFKS, vol. 20, no 06, p. 793-817.
Domingo-Ferrer, J., 2007. A three-dimensional conceptual
framework for database privacy. 4th VLDB, SDM'07.
DP, 1995. data-protection/document/review2012/com_20
12_11_en.pdf.
Feltus, C., Nicolas, D., Poupart, C., 2014. Towards a HL7
based Metamodeling Integration Approach for
Embracing the Privacy of Healthcare Patient Records
Administration. 7
th
ACM SIN conference.
Feltus, F., Fontaine, F.-X., Grandry, E., 2015. Towards
Systemic Risk Management in the frame of Business
Service Ecosystem, ASDENCA 2015.
GDPR, Council of European Union. 269/2014. http://ec.eu
ropa.eu/justice/
Hevner, R., March, S. T., Park, J. 2004. Design science in
information systems research. MIS 28(1).
Ipswitch, 2015, http://www.ipswitch.com/blog/european-
teams-woefully-underprepared-gdpr/
Mahmoud, Y., Atluri, V., Adam, N. R., 2005. Preserving
mobile customer privacy: an access control system for
moving objects and customer profiles. Mobisys, ACM.
Martinez-Balleste, A.; Perez-Martinez, P.A.; Solanas, A.
2013. The pursuit of citizens' privacy: a privacy-aware
smart city is possible, IEEE, 51(6), pp.136-141.
Merriam, 2016. http://www.merriam-webster.com/ diction
ary/information.
Naudet, Y., Mayer, N., Feltus, C., 2016. Towards a
Systemic Approach for Information Security Risk
Management, ARES 2016. IEEE, Austria.
Nehta, https://www.nehta.gov.au/implementation-resource
s/ehealth-foundations/ national- ehealth- security -and-
acc ess-framework.
Ni, Q., Trombetta, A., Bertino, E., Lobo, J. 2007. Privacy-
aware role based access control. SACMAT '07, ACM.
NIST, http://csrc.nist.gov/publications/drafts/nistir-8062/
nistir_8062_dra ft.pdf.
Nuseibeh, B., 2010. Mobile privacy requirements on
demand. In PROFES 2010. Springer.
OPL, Online Privacy Law: European Union, http://www
.loc.gov/law/
Park, J., Sandhu, R. 2002. Towards usage control models:
beyond traditional access control. SACMAT '02. ACM.
Park, J., Sandhu, R. 2000. A position paper: a usage control
(UCON) model for social networks privacy.
Peffers, K., Tuunanen, T., Rothenberger, M. A., and
Chatterjee, S. 2008. A design science research
methodology for information systems research. JMIS
24(3):45-77.
Pérez-Martínez, P.A., Solanas, A. 2011. W3-privacy: the
three dimensions of user privacy in LBS, Int'l. Symp.
Rath, T.M.A., Colin, J.-N., 2012. Patient privacy
preservation: P-RBAC vs OrBAC in patient controlled
records type of centralized healthcare information