You are here: Resources > FIDIS Deliverables > Privacy and legal-social content > D14.2: Study on Privacy in Business Processes by Identity Management > 
Case-Study: Privacy Threats of Intelligent Software Agents  Title:
CONCLUSION
 Privacy-aware Business Process Design and Identity Management

 

Conclusion

Business processes are becoming increasingly oriented to the interests of a customer. In addition to the collection of personal data, its delegation and usage by service providers in place of the customer as far as further service providers are concerned is necessary. The use of personal data leads, however, to privacy problems that are considered to be an important acceptance factor. Privacy is violated when a customer’s data is collected, processed, stored or delegated without his consent. Service providers desire an accountability of their customers though so that transactions can be related to them and they can be identified in the case of fraud. In the following chapter, process models for introducing privacy in business processes are introduced and the suitability of identity management as a security mechanism for private data in single-stage and multi-stage business processes is investigated. 

 

Case-Study: Privacy Threats of Intelligent Software Agents  fidis_wp14_d14.2-study_on_privacy_in_business_processes_by_identity_management-v09_02.sxw  Privacy-aware Business Process Design and Identity Management
20 / 38