IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Privacy Compliance Requirements in Workflow Environments

Privacy Compliance Requirements in Workflow Environments
View Sample PDF
Author(s): Maria N. Koukovini (National Technical University of Athens, Greece), Eugenia I. Papagiannakopoulou (National Technical University of Athens, Greece), Georgios V. Lioudakis (National Technical University of Athens, Greece), Nikolaos L. Dellas (SingularLogic S.A., Greece), Dimitra I. Kaklamani (National Technical University of Athens, Greece)and Iakovos S. Venieris (National Technical University of Athens, Greece)
Copyright: 2019
Pages: 22
Source title: Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-7113-1.ch092

Purchase

View Privacy Compliance Requirements in Workflow Environments on the publisher's website for pricing and purchasing information.

Abstract

Workflow management systems are used to run day-to-day applications in numerous domains, often including exchange and processing of sensitive data. Their native “leakage-proneness,” being the consequence of their distributed and collaborative nature, calls for sophisticated mechanisms able to guarantee proper enforcement of the necessary privacy protection measures. Motivated by the principles of Privacy by Design and its potential for workflow environments, this chapter investigates the associated issues, challenges, and requirements. With the legal and regulatory provisions regarding privacy in information systems as a baseline, the chapter elaborates on the challenges and derived requirements in the context of workflow environments, taking into account the particular needs and implications of the latter. Further, it highlights important aspects that need to be considered regarding, on the one hand, the incorporation of privacy-enhancing features in the workflow models themselves and, on the other, the evaluation of the latter against privacy provisions.

Related Content

Guru Prasad M. S., Praveen Gujjar, H. N. Naveen Kumar, M. Anand Kumar, S. Chandrappa. © 2023. 14 pages.
Bhawnesh Kumar, Ashwani Kumar, Harendra Singh Negi, Javed Alam. © 2023. 15 pages.
Abhishek Kumar, Karan Singh. © 2023. 21 pages.
Anuj Singh, Somjit Mandal, Kamlesh Chandra Purohit. © 2023. 21 pages.
Muthumanikandan Vanamoorthy. © 2023. 13 pages.
Janmejay Pant, Rakesh Kumar Sharma, Himanshu Pant, Devendra Singh, Durgesh Pant. © 2023. 11 pages.
Siddhardha Kollabathini. © 2023. 9 pages.
Body Bottom