Print Email Facebook Twitter Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM Title Designing a privacy aware infrastructure for an Inclusive Enterprise at IBM Author Steenstra, C.T. Contributor Bozzon, A. (mentor) Sips, R. (mentor) Faculty Electrical Engineering, Mathematics and Computer Science Department Web Information Systems Programme Computer Science Date 2016-04-28 Abstract The widespread adoption of computer technologies fundamentally re-shaped the way companies operate. A deluge of systems and applications now support the daily activities of employees and managers alike, thus increasing the amount, value, and sensibleness of available data. This abundance of data provides new opportunities for applications development, where more and more data is shared and reused to enable new functionalities, to unlock novel insights about the enterprise or its personnel, or to improve on aspects such as employee engagement, productivity or sociability. At the same time, data sharing poses new challenges. Data is often used for purposes that are different from the original design, and there is a pervasive need to ensure compliance with the relevant laws and third party policies. What is more, employees might find the increased use of personal data undesirable, and therefore demand proper transparency and control over their personal data. This works tackles the technical challenges that come with the sharing and usage of personal data by enterprise-class applications, and provides a framework for privacy aware data sharing. In a literature survey we investigate several disciplines related to privacy, access control management, and provenance in computer systems, to determine the current state of the art and practice. The study provides the conceptual underpinning for a novel data model that facilitates a privacy aware way for applications to share data while still providing transparency, simplicity and control to users. The model is then implemented in a new enterprise-class platform, a multi-tenant Software-as-a-Service (SaaS) provider that centralises privacy and consent management related functionalities. The model and framework are then validated through interviews with IBM employees having different roles within the organisation. The quality of the resulting implementation is validated by means of a set of scalability tests, with the goal of demonstrating the actual suitability of the proposed solution in a realistic enterprise context. Subject privacyaccess controlauthorizationinfrastructure To reference this document use: http://resolver.tudelft.nl/uuid:e0704a99-6b12-4fc0-8310-c7cbabfe5a8d Part of collection Student theses Document type master thesis Rights (c) 2016 Steenstra, C.T. Files PDF csteenstra-report.pdf 1.75 MB Close viewer /islandora/object/uuid:e0704a99-6b12-4fc0-8310-c7cbabfe5a8d/datastream/OBJ/view