Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
A Privacy by Design Methodology Application in Telecom Domain
Author(s):
1. Siham Arfaoui: National Institute of Posts and Telecommunications,,Morocco
2. Abdelhamid BelmekkI: National Institute of Posts and Telecommunications,,Morocco
3. Abdellatif Mezrioui: National Institute of Posts and Telecommunications,,Morocco
Abstract:
Telecommunication has been considerably developed over the last decades, notably through optical fiber submarine cables and wireless connections offering voice and data wide range services. Telecommunication infrastructures are the necessary backbone that make possible any voice and data exchange. Unfortunately, these infrastructures are still suffering from various vulnerabilities and continue to be target of specific cyber-attacks. Some of these attacks could lead to service deniability, integrity and privacy loss. Against this fact, it's also established that telecom service providers, as the owner of this infrastructure, can have access to huge data, even personal data related to customer and to their employees. Basically, this personal data is related directly to the customer's and employee's identity, geolocation, interest areas and contact circle, etc., when it comes to the use of this personal data, the privacy concerns become a big challenge for telecom service providers due to heavy impact that can induce. Given the personal data protection criticality in telecom domain, privacy by design PbD should be incorporate. Then, this article aims to apply in telecom service providers ISPM methodology "Information System Privacy Methodology" which focuses on PbD implementation in enterprises architecture, specifically in information systems taking into account all technical and organizational aspects.
Page(s): 184-198
DOI: DOI not available
Published: Journal: International Journal of Communication Networks and Information Security, Volume: 13, Issue: 2, Year: 2021
Keywords:
Information Systems , Personal Data , Information System Privacy Methodology ISPM , Privacy by Design PbD , Togaf , Threat Modeling , Charging data Records CDR , Telecommunication Domain
References:
References are not available for this document.
Citations
Citations are not available for this document.
0

Citations

0

Downloads

4

Views