
NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | August 15, 2008 |
Latest Amendment Date: | July 21, 2011 |
Award Number: | 0831124 |
Award Instrument: | Continuing Grant |
Program Manager: |
Jeremy Epstein
CNS Division Of Computer and Network Systems CSE Directorate for Computer and Information Science and Engineering |
Start Date: | September 1, 2008 |
End Date: | February 28, 2014 (Estimated) |
Total Intended Award Amount: | $187,500.00 |
Total Awarded Amount to Date: | $250,000.00 |
Funds Obligated to Date: |
FY 2009 = $125,000.00 FY 2011 = $62,500.00 |
History of Investigator: |
|
Recipient Sponsored Research Office: |
70 WASHINGTON SQ S NEW YORK NY US 10012-1019 (212)998-2121 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
70 WASHINGTON SQ S NEW YORK NY US 10012-1019 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): |
CYBER TRUST, TRUSTWORTHY COMPUTING |
Primary Program Source: |
01000910DB NSF RESEARCH & RELATED ACTIVIT 01001112DB NSF RESEARCH & RELATED ACTIVIT |
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
Modern organizations, such as businesses, non-profits, government
agencies, and universities, collect and use personal information from
a range of sources, shared with specific expectations about how it
will be managed and used. Accordingly, they must find ways to comply
with expectations, which may be complex and varied, as well as with
relevant privacy laws and regulations, while they minimize
operational risk and carry out core functions of the organization
efficiently and effectively. Designing organizational processes to
manage personal information is one of the greatest challenges facing
organizations (see, e.g. a recent survey by Deloitte and the Ponemon
Institute [TI07]), with far-reaching implications for every
individual whose personal information is available to modern
organizations, i.e. all of us.
This project responds to these challenges by developing methods,
algorithms and prototype tools for integrating privacy, compliance,
and risk evaluation into complex organizational processes. It
explores, articulates and characterizes formally the scope and nature
of privacy-expectations of stakeholders as well as those of key
regulations, such as HIPAA, GLBA, COPPA, BASEL 2, and Sarbanes-Oxley
(SOX). It incorporates the diverse perspectives and areas of
expertise of its multidisciplinary research team, which includes
three computer scientists, one philosopher, and collaborating
researchers from IBM. This industry connection facilitates
interaction with product teams that have served complex organizations
concerned with business process integrity, information security,
privacy, and information risk management. The research builds on
"contextual integrity" (a philosophical account of privacy) as well
as language and risk-based methods for privacy policy specification
and enforcement. Extensive training and educational opportunities are
provided to undergraduate and graduate students and research results
integrated into courses at CMU, NYU, Stanford, and UPenn.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
PROJECT OUTCOMES REPORT
Disclaimer
This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.
The project addressed crucial privacy problems that emerge when institutions enrich existing practices with personal information. This often occurs when IT systems are introduced into an organization, allowing the augmentation of internal systems with information/data in digital formats and enabling new ways of accessing institutiona...
Please report errors in award information by writing to: awardsearch@nsf.gov.