skip to main content
10.1145/1244002.1244046acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

How sensitive is your personal information?

Published: 11 March 2007 Publication History

Abstract

The sensitivity of personal information is one of the most important factors in determining the individual's perception of privacy. A "gradation" of sensitivity of personal information can be used in many applications, such as deciding the security level that controls access to data and developing a measure of trust when self-disclosing personal information. This paper introduces a theoretical analysis of personal information sensitivity and defines its scope and puts forward possible methods of gradation. A methodology is proposed that can be used for developing a classification scheme of personal information.

References

[1]
Al-Fedaghi, S. (2005). How to calculate the information privacy, Proceedings of the Third Annual Conference on Privacy, Security and Trust. October, 12--14, St. Andrews, New Brunswick, Canada. http://www.lib.unb.ca/Texts/PST/2005/pdf/fedaghi.pdf
[2]
Al-Fedaghi, S. Crossing Privacy, Information, and Ethics, 17th International Conference Information Resources Management Association (IRMA 2006), Washington, DC, USA, May 21--24, 2006.
[3]
Bing, J. (1972). Classification of personal information, with respect to the sensitivity aspect, Proceedings of the First International Oslo Symposium on Data Banks and Societies. Oslo: Scandinavian Univ. Books.
[4]
Bygrave, L. (2002). Data protection law, Kluwer, 68.
[5]
Floridi, di L. (1998). Information ethics: On the philosophical foundation of computer ethics, ETHICOMP98 Fourth International Conference on Ethical Issues of Information Technology. http://www.wolfson.ox.ac.uk/~floridi/ie.htm.
[6]
Fule, P. and Roddick, J. (2004). Detecting privacy and ethical sensitivity in data mining results, Twenty-Seventh Australasian Computer Science Conference (ACSC2004). Dunedin, New Zealand. http://crpit.com/confpapers/CRPITV26Fule.pdf
[7]
Itai D. (2004, Jan. 14). HARASSED, LEGAL ACTION. The Independent. http://www.cpj.org/cases04/africa_cases04/zim.html
[8]
Kang, J. (1998). Information Privacy In Cyberspace Transactions, 50 Stanford Law Review 1193, 1212--20.
[9]
Lederer, S., Beckmann, C., Dey, A. and Mankoff, J. (2003, June). Managing personal information disclosure in ubiquitous computing environments. IRB-TR-03-015. http://www.intel-research.net/Publications/Berkeley/070920030922_139.pdf
[10]
Lee, R. (2002). Personal data protection in the semantic web (ME Thesis, MIT, 2002). http://www.w3.org/2002/01/pedal/thesis.html
[11]
Voorhees, M. (1993). Information law alert - A voorhees report. http://www.eff.org/legal/cases/?f=meeks_case.inf

Cited By

View all
  • (2024)Kamu Belgelerinin Hassasiyet Değerlendirmesi: Kuram, Süreç ve ZorluklarHazine-i Evrak Arşiv ve Tarih Araştırmaları Dergisi10.59054/hed.1497456Online publication date: 11-Jul-2024
  • (2022)How to Understand Data Sensitivity? A Systematic Review by Comparing Four DomainsProceedings of the 4th International Conference on Big Data Engineering10.1145/3538950.3538953(13-20)Online publication date: 26-May-2022
  • (2022)A Safe Approach to Sensitive Dropout Data Collection Systems by Utilizing Homomorphic Encryption2022 International Symposium on Information Technology and Digital Innovation (ISITDI)10.1109/ISITDI55734.2022.9944464(168-171)Online publication date: 27-Jul-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '07: Proceedings of the 2007 ACM symposium on Applied computing
March 2007
1688 pages
ISBN:1595934804
DOI:10.1145/1244002
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 March 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. personal information
  2. privacy
  3. sensitivity

Qualifiers

  • Article

Conference

SAC07
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Kamu Belgelerinin Hassasiyet Değerlendirmesi: Kuram, Süreç ve ZorluklarHazine-i Evrak Arşiv ve Tarih Araştırmaları Dergisi10.59054/hed.1497456Online publication date: 11-Jul-2024
  • (2022)How to Understand Data Sensitivity? A Systematic Review by Comparing Four DomainsProceedings of the 4th International Conference on Big Data Engineering10.1145/3538950.3538953(13-20)Online publication date: 26-May-2022
  • (2022)A Safe Approach to Sensitive Dropout Data Collection Systems by Utilizing Homomorphic Encryption2022 International Symposium on Information Technology and Digital Innovation (ISITDI)10.1109/ISITDI55734.2022.9944464(168-171)Online publication date: 27-Jul-2022
  • (2020)“Naturaleza intrínseca”, “contexto” o “finalidad” en la determinación del carácter sensible de los datos personalesEstudios en Derecho a la Información10.22201/iij.25940082e.2020.10.146581:10(1)Online publication date: 11-May-2020
  • (2019)Jurisdictional [Comparative] DifferencesData Protection Law10.1007/978-981-13-8110-2_11(265-290)Online publication date: 5-Sep-2019
  • (2018)Modeling of an enterprise and information systemProceedings of the International Conference on Geoinformatics and Data Analysis10.1145/3220228.3220246(142-150)Online publication date: 20-Apr-2018
  • (2018)Integrated Modeling Methodologies and LanguagesProceedings of the 12th International Conference on Ubiquitous Information Management and Communication10.1145/3164541.3164605(1-8)Online publication date: 5-Jan-2018
  • (2018)The practical politics of sharing personal dataPersonal and Ubiquitous Computing10.1007/s00779-017-1071-822:2(293-315)Online publication date: 1-Apr-2018
  • (2017)A Framework for Unpublishing DecisionsDigital Journalism10.1080/21670811.2017.13017796:3(389-405)Online publication date: 24-Mar-2017
  • (2016)Knowledge representation in education: Diagramming Carroll's syllogisms2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)10.1109/ICKEA.2016.7803009(150-154)Online publication date: Sep-2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media