Browsing by Author "Kosa, Tracy Ann"
Now showing 1 - 2 of 2
- Results Per Page
- Sort Options
Item Privacy Implications of GSM Network Services(2013-07-15) Kosa, Tracy Ann; el-Khatib, Khalil; Marsh, SteveCurrent research on GSM does not deal with privacy requirements, or confuses privacy (legislated) with security (standards based). This paper seeks to examine how the applicable privacy legislation in Canada (PIPEDA) would apply to GSM services. Part I provides an overview of the evolution of network communications and how privacy legislation applies, ending with a discussion of GSM functionality and players. An description of the kind of personal information in GSM service delivery is presented in Part 2, while the privacy analysis is conducted in Part 3. Part 4 is a brief inter-disciplinary literature review demonstrating how GSM research is focused respectively on public policy and functionality, while security work focuses on authentication techniques. Various approaches to privacy are described in Part 5, and a short conclusion of the implications is presented in Part 6.Item Towards measuring privacy(2015-04-01) Kosa, Tracy Ann; El-Khatib, KhalilThe acceptable threshold for privacy is an individual choice, informed by culture, tradition and experience. That it is important, conversely, is self-evident. We use it to moderate personal information disclosure, how we choose to act and dress every day. However, the debate about privacy has struggled because of an incomplete scholarship that often halts with the question ‘what is privacy?’ Similarly, the affirmative statement ‘privacy is dead’ is often made without further explanation of what we have lost. This thesis provides a clarification of privacy by presenting a formal model and tool for precise discussion. It can be implemented, for example, in a mobile application or embedded on a website. The utility of the formal model is supported by survey research of professionals in the field and those with no particular related work experience. The formal model has given us several insights to how privacy behaves enabling progress towards an interdisciplinary understanding of terminology. In particular, it demonstrates and solves for the problem of transitivity in privacy because it can follow each personal information disclosure as it travels beyond the data subject through a network of people, processes and technologies. In addition to the formal model and observations about the behaviour of privacy, a contribution of this thesis is its review of computer science literature specifically for contributions to privacy research, an assessment of current privacy practitioner methods, a study of privacy impact assessment practices at Ontario hospitals, and a detailed exploration of the possibilities of future work.