Please use this identifier to cite or link to this item: http://studentrepo.iium.edu.my/handle/123456789/11500
Title: Data privacy and privacy engineering
Authors: Ahmad Izzuddin Zuhri Zaidin
Supervisor: Normaziah Abd Aziz, Ph,D
Subject: Data privacy
Computer security
Year: 2022
Publisher: Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2022
Abstract in English: Due to the Covid-19 Pandemic outbreaks, many organizations have transformed their business processes from conventional ways to digital platforms and approach for better and efficient communication and information systems. Subsequently, organizations that primarily use information systems when performing business processes will deal with numerous Personal Identifiable Information (PII) provided by clients. Moreover, today, most individuals use IT products and services in which their PII are being collected and further processed. Due to that, PII must always be protected to avoid privacy risks and abused. However, concerns on data privacy among public is still low due to lack of understanding and knowledge on data privacy implication to ones’ safety and security. Apart from that, software engineers or system owners faced several difficulties to determine the proper tools to be used in order to protect PII. This is related to the lack of awareness on Privacy Enhancing Technologies (PETs). This research attempts to close the gap of understanding on privacy data and introduce the discipline of Privacy Engineering. This research highlights relevant and important facts for public awareness and concern and provides a summary of PETs for software engineers and system owners. Method used to achieve the first objective is by conducting literature review to identify the relevant and reliable references about data privacy. Another method used is by studying and listing out available PETs’ tools and approaches to facilitate software engineers in determining proper PETs to be applied. Collections and categorizations of description and summary of a data privacy elements for public understanding is the result produced by the first method. The second method produced a compilation and summary of PETs’ available tools and techniques and an explanation on PETs adoption guide that can be applied by software engineers. This piece of research work may help public to understand on the importance of having a good protection of their PII and helps software engineers and system owners to be aware of proper tools to be used to enhance the protection of PII in their systems.
Call Number: t QA 76.9 A25 A2864D 2022
Kullliyah: Kulliyyah of Information and Communication Technology
Programme: Master of Protective Security Management
URI: http://studentrepo.iium.edu.my/handle/123456789/11500
Appears in Collections:KICT Thesis

Files in This Item:
File Description SizeFormat 
t11100383915AhmadIzzuddinZuhriBinZaidin_24.pdf24 pages file747.55 kBAdobe PDFView/Open
t11100383915AhmadIzzuddinZuhriBinZaidin_SEC.pdf
  Restricted Access
Full text secured file8.55 MBAdobe PDFView/Open    Request a copy
Show full item record

Google ScholarTM

Check


Items in this repository are protected by copyright, with all rights reserved, unless otherwise indicated. Please give due acknowledgement and credits to the original authors and IIUM where applicable. No items shall be used for commercialization purposes except with written consent from the author.