Читать книгу Privacy Risk Analysis - Sourya Joyee De - Страница 7
ОглавлениеContents
3.2 Illustration: the BEMS System
4.2 Identifiability and Anonymization
4.3 Categories of Data
4.4 Personal Data Attributes
4.4.1 Attributes Related to the Nature of the Data
4.4.2 Attributes Related to the Format of the Data
4.4.3 Attributes Related to the Context
4.4.4 Attributes Related to Control
4.5 Illustration: the BEMS System
5.1 The Nature of the Stakeholders
5.2 Stakeholder Categories
5.3 Stakeholder Attributes
5.4 Illustration: the BEMS System
6.1 Risk Source Attributes
6.1.1 Nature of the Risk Sources
6.1.2 Motivation
6.1.3 Resources
6.2 Illustration: the BEMS System
7.1 Variations in Terminology
7.2 Feared Event Categories
7.3 Feared Event Attributes
7.4 Illustration: the BEMS System
8.1 The Nature of Privacy Harms
8.1.1 Variations on Privacy Harms
8.1.2 Recognition of Privacy Harms by Law
8.2 Categories of Privacy Harms
8.3 Attributes of Privacy Harms
8.3.1 Victims
8.3.2 Extent
8.3.3 Severity
8.4 Illustration: the BEMS System
9.1 Scope and Objectives of a PIA
9.2 DPIA Template for Smart Grid and Smart Metering
9.3 Privacy Risk Analysis in Existing Frameworks
9.4 Key Steps of a Privacy Risk Analysis
9.5 Illustration: Evaluation of the Risks for the BEMS System
A Summary of Categories and Attributes of the Components of a Privacy Risk Analysis
B Definitions of Personal Data Across Regulations and Standards
C Definitions of Stakeholders Across Regulations and Standards