A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments
Abstract
:1. Introduction
2. Privacy Policies and Preferences in e-Government Environments
3. Privacy Policies Multitier Approach
3.1. Hierarching Privacy Policies
3.2. Privacy Policies Formation
3.3. Approach Evaluation
4. Case Study
4.1. Annual Vehicle Tax Electronic Service
4.2. Privacy Policies
Line | Privacy Policy Content |
---|---|
A.1 | <Privacy_Policy> |
A.2 | <Policy_ID="001"> |
A.3 | <Description> Hellenic Government Privacy Policy </Description> |
A.4 | </Policy_ID> |
A.5 | <Data> |
A.6 | <Personal_Identifiers> |
A.7 | <Identifier_ID="26"> National Taxation Identifier (AFM) |
A.8 | <Processed="Confidential"> </Processed> |
A.9 | <Storage="Yes"> </Storage> |
A.10 | <Transmitted="Yes" </Transmitted> |
A.11 | </Identifier_ID> |
A.12 | </Personal_Identifiers> |
A.13 | <Personal_Data> |
A.14 | <Data_ID="873"> License Plate |
A.15 | <Processed="Confidential"> </Processed> |
A.16 | <Storage="Yes"> </Storage> |
A.17 | <Transmitted="Yes" </Transmitted> |
A.18 | </Data_ID> |
A.19 | <Data_ID="32"> First and Last Name |
A.20 | <Processed="Confidential"> </Processed> |
A.21 | <Storage="Yes"> </Storage> |
A.22 | <Transmitted="Yes" </Transmitted> |
A.23 | </Data_ID> |
A.24 | </Personal_Data> |
A.25 | </Data> |
A.26 | </Privacy_Policy> |
Line | Privacy Policy Content |
---|---|
B.1 | <Privacy_Policy> |
B.2 | <Policy_ID="024"> |
B.3 | <Description> Ministry of Finance Privacy Policy </Description> |
B.4 | </Policy_ID> |
B.5 | <Data> |
B.6 | <Personal_Identifiers> |
B.7 | <Identifier_ID="26" P_Ref_ID="001"> National Taxation Identifier (AFM) |
B.8 | <Processed="Confidential"> Identification </Processed> |
B.9 | <Storage="Yes" Retention="365"> </Storage> |
B.10 | </Identifier_ID> |
B.11 | </Personal_Identifiers> |
B.12 | <Personal_Data> |
B.13 | <Data_ID="873" P_Ref_ID ="001"> License Plate |
B.14 | <Processed="Confidential"> </Processed> |
B.15 | <Storage="Yes" Retention ="365"> </Storage> |
B.16 | </Data_ID> |
B.17 | <Data_ID="32" p_Ref_ID="001"> First and Last Name |
B.18 | <Processed="Confidential"> </Processed> |
B.19 | <Storage="Yes" Retention="90"> </Storage> |
B.20 | </Data_ID> |
B.21 | </Personal_Data> |
B.22 | </Data> |
B.23 | </Privacy_Policy> |
Line | Privacy Policy Content |
---|---|
C.1 | <Privacy_Policy> |
C.2 | <Policy_ID="587"> |
C.3 | <Description> GSIS Privacy Policy </Description> |
C.4 | </Policy_ID> |
C.5 | <Data> |
C.6 | <Personal_Identifiers> |
C.7 | <Identifier_ID="26" P_Ref_ID="024"> National Taxation Identifier (AFM) |
C.8 | <Storage="Yes" Retention="180"></Storage> |
C.9 | </Identifier_ID> |
C.10 | </Personal_Identifiers> |
C.11 | <Personal_Data> |
C.12 | <Data_ID="873" P_Ref_ID ="024"> License Plate </Data_ID> |
C.13 | <Data_ID="32" p_Ref_ID="024"> First and Last Name </Data_ID> |
C.14 | </Personal_Data> |
C.15 | </Data> |
C.16 | </Privacy_Policy> |
Line | Privacy Policy Content |
---|---|
D.1 | <Privacy_Policy> |
D.2 | <Policy_ID="1038"> |
D.3 | <Service_Provider> General Secretary of Information Systems (GSIS) |
D.4 | </Service_Provider> |
D.5 | <Electronic_Service> Annual Vehicle Tax </Electronic_Service> |
D.6 | <Description> Privacy Policy for Annual Vehicle Tax Electronic Service |
D.7 | </Description> |
D.8 | </Policy_ID> |
D.9 | <Data> |
D.10 | <Personal_Identifiers> |
D.11 | <Identifier_ID="26" P_Ref_ID="587"> National Taxation Identifier (AFM) |
D.12 | <Transmitted="No" </Transmitted> |
D.13 | </Identifier_ID> |
D.14 | </Personal_Identifiers> |
D.15 | <Personal_Data> |
D.16 | <Data_ID="873" P_Ref_ID ="587"> License Plate |
D.17 | <Processed="Confidential"> Identification </Processed> |
D.18 | <Storage="Yes" Retention="90"> </Storage> |
D.19 | </Data_ID> |
D.20 | <Transmitted="Yes" </Transmitted> |
D.21 | <Data_ID="32" p_Ref_ID="587"> First and Last Name |
D.22 | <Processed="Confidential"> Identification </Processed> |
D.23 | <Storage="No" Retention="0"> </Storage> |
D.24 | </Data_ID> |
D.25 | </Personal_Data> |
D.26 | </Data> |
D.27 | </Privacy_Policy> |
Identifier | AVT | GSIS | Ministry of Finance | Central Government | ||||||||||||||||
Storage | Process | Purpose | Retention | Transmit | Storage | Process | Purpose | Retention | Transmit | Storage | Process | Purpose | Retention | Transmit | Storage | Process | Purpose | Retention | Transmit | |
AFM | ► | ► | ► | ► | No | ► | ► | ► | 180 | ► | ► | ► | I | 365 | ► | Yes | C | ◄ | ◄ | Yes |
License Plate | ► | ► | I | 90 | ► | ► | ► | ◄ | ► | ► | ► | ► | ◄ | 365 | ► | Yes | C | ◄ | ◄ | Yes |
Name | No | ► | I | ► | ► | ► | ► | ◄ | ► | ► | ► | ► | ◄ | 90 | ► | Yes | C | ◄ | ◄ | Yes |
4.3. Non-Hierarchical Privacy Policies
Line | Privacy Policy Content |
---|---|
D.1 | <Privacy_Policy> |
D.2 | <Policy_ID="1038"> |
D.3 | <Service_Provider> General Secretary of Information Systems (GSIS) |
D.4 | </Service_Provider> |
D.5 | <Electronic_Service> Annual Vehicle Tax </Electronic_Service> |
D.6 | <Description> Privacy Policy for Annual Vehicle Tax Electronic |
D.7 | Service </Description> |
D.8 | </Policy_ID> |
D.9 | <Data> |
D.10 | <Personal_Identifiers> |
D.11 | <Identifier_ID="26"> National Taxation Identifier (AFM) |
D.12 | <Processed="Confidential"> Identification </Processed> |
D.13 | <Storage="Yes" Retention="90"> </Storage> |
D.14 | <Transmitted="Yes" </Transmitted> |
D.15 | </Identifier_ID> |
D.16 | </Personal_Identifiers> |
D.17 | <Personal_Data> |
D.18 | <Data_ID="873"> License Plate |
D.19 | <Processed="Confidential"> Identification </Processed> |
D.20 | <Storage="Yes" Retention="90"> </Storage> |
D.21 | <Transmitted="Yes" </Transmitted> |
D.22 | </Data_ID> |
D.23 | <Transmitted="Yes" </Transmitted> |
D.24 | <Data_ID="32"> First and Last Name |
D.25 | <Processed="Confidential"> Identification </Processed> |
D.26 | <Storage="No" Retention="0"> </Storage> |
D.27 | </Data_ID> |
D.28 | </Personal_Data> |
D.29 | </Data> |
D.30 | </Privacy_Policy> |
5. Related Works
6. Conclusions
Author Contributions
Conflicts of Interest
References
- Belanger, F.; Hiller, J. A Framework for e-Government: Privacy Implications. Bus. Process Manag. J. 2006, 12, 48–60. [Google Scholar]
- McRobb, S.; Stahl, B. Privacy as a shared feature of the e-phenomenon: A comparison of privacy policies in e-government, e-commerce and e-teaching. Int. J. Inf. Technol. Manag. 2007, 6, 232–249. [Google Scholar] [CrossRef]
- Carter, L.; McBride, A. Information Privacy Concerns and e-Government: A Research Agenda. Transform. Gov. People Process Policy 2010, 4, 10–13. [Google Scholar]
- Vrakas, N.; Kalloniations, C.; Tsohou, A.; Lambrinoudakis, C. Privacy Requirements Engineering for Trustworthy e-Government Services. In Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, Berlin, Germany, 21–23 June 2010; Springer Verlang: Berlin, Germany, 2010; pp. 298–307. [Google Scholar]
- Bussard, L.; Pinsdorf, U. Abstract Privacy Policy Framework: Addressing Privacy Problems in SOA. In Proceeingds of the IFIP WG 11.4 International Workshop, iNetSec, Lucerne, Switzerland, 9 June 2011; Springer LNCS: Berlin, Germany, 2012; pp. 104–118. [Google Scholar]
- Oyomno, W.; Jäppinen, P.; Kerttula, E. Privacy Policy Enforcement for Ambient Ubiquitous Services. In Proceedings of the First International Joint Conference on Ambient Intelligence (AML 2010), Malaga, Spain, 10–12 November 2010; Springer LNCS: Berlin, Germany, 2010; pp. 265–269. [Google Scholar]
- Lee, K.; Lee, J.; Chun, M. Incorporating Privacy Policy into an Anonymity-Based Privacy-Preserving ID-Based Service Platform. In Proceedings of the 9th International Conference in Knowledge-Based Intelligent Information and Engineering Systems (KES 2005), Melbourne, Australia, 14–16 September 2005; Springer LNCS: Berlin, Germany, 2005; pp. 1028–1035. [Google Scholar]
- Drogkaris, P.; Gritzalis, S.; Lambrinoudakis, C. Employing Privacy Policies and Preferences in Modern e-Government Environments. Int. J. Electron. Gov. 2013, 6, 101–116. [Google Scholar] [CrossRef]
- Drogkaris, P.; Gritzalis, A.; Lambrinoudakis, C. Empowering Users to Specify and Manage their Privacy Preferences in e-Government Environment. In Proceedings of the 3rd International Conference on Electronic Government and the Information Systems Perspective (EGOVIS 2014), Munich, Germany, 1–3 September 2014; Springer LNCS: Cham, Switzerland, 2014; pp. 237–245. [Google Scholar]
- Hong, Y.; Lu, S.; Liu, Q.; Wang, L.; Dssouli, R. A hierarchical approach to the specification of privacy preferences. In Proceedings of the 4th International Conference on Innovations in Information Technology (IIT’07), Dubai, United Arab Emirates, 18–20 November 2007.
- Nurseitov, N.; Paulson, M.; Reynolds, R.; XIzurieta, C. Comparison of JSON and XML Data Interchange Formats: A Case Study. In Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, San Francisco, CA, UFA, 4–6 November 2009.
- Zhiwei, G.; Yingxin, H.; Kai, L. CPTIAS: A new fast PKI authentication scheme based on certificate path trust index. J. Ambient Intell. Humaniz. Comput. 2015, 6, 1–11. [Google Scholar] [CrossRef]
- Zhao, S.; Aggarwal, A.; Kent, R. PKI-Based Authentication Mechanisms in Grid Systems. In Proceedings of the International Conference on Networking, Architecture, and Storage (NAS 2007), Guilin, China, 29–31 July 2007; pp. 83–90.
- Satizábal, C.; Forné, J.; Hernández-Serrano, J.; Pegueroles, J. Building Hierarchical Public Key Infrastructures in Mobile Ad-Hoc Networks. In Proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2006), Hong Kong, China, 13–15 December 2006; Springer LNCS: Berlin, Germany, 2006; pp. 485–496. [Google Scholar]
- Zhao, M.; Smith, S. Modeling and Evaluation of Certification Path Discovery in the Emerging Global PKI. In Proceedings of the Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, 19–20 June 2006; Springer LNCS: Berlin, Germany, 2006; pp. 16–30. [Google Scholar]
- Lambrinoudakis, C.; Gritzalis, S.; Dridi, F.; Pernul, G. Security requirements for e-government services: A methodological approach for developing a common PKI-based security policy. Comput. Commun. 2003, 26, 1873–1883. [Google Scholar] [CrossRef]
- Charalabidis, Y.; Lampathaki, F.; Sarantis, D.; Mouzakitis, S.; Gionis, G.; Koussouris, S.; Ntanos, C.; Tsiakaliaris, C.; Tountopoulos, V.; Askounis, D.; et al. The Greek electronic government interoperability framework: Standards and infrastructures for one stop service provision. In Proceedings of the Panhellenic Conference on Informatics (PCI’08), Samos, Greece, 28–30 August 2008; pp. 66–70.
- Drogkaris, P.; Geneiatakis, D.; Gritzalis, S.; Lambrinoudakis, C.; Mitrou, L. Towards an Enhanced Authentication Framework for eGovernment Services: The Greek Case. In Proceedings of the 7th International Conference on Electronic Government (EGOV’08), Torino, Italy, 1–5 September 2008; Trauner Verlag: Linz, Austria, 2008; pp. 189–196. [Google Scholar]
- Janssen, M.; Charalabibis, Y.; Kuk, G.; Cresswell, T. E-government Interoperability, Infrastructure and Architecture: State-of-the-art and Challenges. J. Theor. Appl. Electron. Commer. Res. 2001, 6, 1–8. [Google Scholar]
- Irwin, K.; Yu, T. Determining user privacy preferences by asking the right questions: An automated approach. In Proceedings of the ACM Workshop on Privacy in the Electronic Society, Alexandria, USA, 7–10 November 2005; pp. 47–50.
- Apostolou, D.; Stojanovic, L.; Lobo, T.; Miró, J.; Papadakis, A. Configuring e-government service using ontologies. In Proceedings of the 5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E’2005), Poznan, Poland, 28–30 October 2005; pp. 141–155.
- Magoutas, B.; Halaris, C.; Mentzas, G. An ontology for the multi-perspective evaluation of quality in e-government services. In Proceedings of the 6th International Conference on e-Government, EGOV 2007, Regensburg, Germany, 3–7 September 2007; pp. 318–329.
© 2015 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Drogkaris, P.; Gritzalis, S.; Kalloniatis, C.; Lambrinoudakis, C. A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments. Future Internet 2015, 7, 500-515. https://doi.org/10.3390/fi7040500
Drogkaris P, Gritzalis S, Kalloniatis C, Lambrinoudakis C. A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments. Future Internet. 2015; 7(4):500-515. https://doi.org/10.3390/fi7040500
Chicago/Turabian StyleDrogkaris, Prokopios, Stefanos Gritzalis, Christos Kalloniatis, and Costas Lambrinoudakis. 2015. "A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments" Future Internet 7, no. 4: 500-515. https://doi.org/10.3390/fi7040500
APA StyleDrogkaris, P., Gritzalis, S., Kalloniatis, C., & Lambrinoudakis, C. (2015). A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments. Future Internet, 7(4), 500-515. https://doi.org/10.3390/fi7040500