For the more academically inclined on this list. You might be interested in this PhD thesis.
Abstract:
The thesis considers a systematic approach to design and develop techniques for preventing personal data exposure in next generation information management systems with the aim of ensuring accountability of data controllers (entities that process personal
data).
With a rapid growth in the communication technologies, heterogenous computing environments that offer cost-effective data processing alternatives are emerging. Thus, the information-flow of personal data spans beyond the information processing practices
of data controllers thereby involving other parties that process personal data. Moreover, in order to enable interoperability, data in such environments is given well-defined structure and meaning by means of graph-based data models. Graphs, inherently emphasize
connections between things, and when graphs are used to model personal data records, the connections and the network structure may reveal intimate details about our inter-connected society.
The GDPR stipulates specific consequences for non-compliance to the data protection principles, in the view of ensuring accountability of data controllers in their personal data processing practices. Widely recognized approaches to implement the Privacy
by Design (PbD) principle in the software application development process, are broader in scope. Hence, processes to implement privacy techniques for specific systems are not the central aspect of the aforementioned approaches.
In order to influence the implementation of techniques for preventing personal data misuse associated with sharing of data represented as graphs, a conceptual mechanism for building privacy techniques is developed. The conceptual mechanism consists of three
elements, namely, a risk analysis for Semantic Web information management systems using Privacy Impact Assessment (PIA) approach, two privacy protection techniques for graphs enriched with semantics and a model to approach evaluation of adherence to the goals
resulted from the risk analysis.
https://www.diva-portal.org/smash/record.jsf?pid=diva2%3A1471254&dswid=5504
John Wunderlich, BA, MBA
Privacy Tools:
Kantara Initiative: Consent Receipt Specification
JLINC Labs: Data Provenance Solutions
Encrypted email:
PrivacyCDN@protonmail.com