8
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

An XML-Based Intelligent Agent Protocol Design Framework for Individualized Privacy Postures within Trusted Network Environments

&
Pages 16-28 | Published online: 10 Sep 2014
 

Abstract

Future inter-networking environments will involve extensive interaction between multiple servers, users and their agents. Currently, numerous forms of trusted network environments facilitate the use of agents. Corporate intranets, secure extranets, B2B partnerships, and collaborative e-marketplaces are just a few examples. Although these environments presume trust, they still provide considerable risk to privacy and liability exposure to all parties involved. Therefore, it will be imperative that intelligent agents act according to the desired intentions of the agents’ owners who develop and introduce them. The XML-based protocol presented in this paper provides a practical approach to the provision of such compliance. Agents, if embedded with these protocols, will demonstrate behavior consistent with the desired privacy posture of the owner along several key continua, while still maintaining an autonomous nature.

Additional information

Notes on contributors

Merrill Warkentin

Merrill Warkentin is Professor of MIS at Mississippi State University. He has published over 125 research manuscripts, primarily in computer security management, eCommerce, and virtual collaborative teams, which have appeared in books, Proceedings, and journals such as MIS Quarterly, Decision Sciences, Decision Support Systems, Communications of the ACM; Communications of the AIS, Information Systems Journal, Journal of End User Computing, Journal of Global Information Management, and others. Professor Warkentin is the co-author or editor of four books, and is currently an Associate Editor of Information Resources Management Journal and Journal of Information Systems Security. Dr. Warkentin has served as a consultant to numerous organizations and has served as National Distinguished Lecturer for the Association for Computing Machinery (ACW. Previously, Dr. Warkentin held the Reisman Research Professorship at Northeastern University in Boston, where he was also the Director of MIS and E-Commerce programs. Professor Warkentin holds BA, M, and Ph. D. degrees fiom the University of Nebraska-Lincoln. He can be reached at [email protected] and www.MISProfecsos.com.

Allen C. Johnston

Allen C. Johnston is an Assistant Professor and the Entergy Endowed Professor of CIS at the University of Louisiana-Monroe. A doctoral candidate in Business Information Systems at Mississippi State University, he holds a BS fiom Louisiana State University in Electrical Engineering as well as an MSIS from Mississippi State University. He has works published in the Proceedings of the National Decision Sciences Institute, Proceedings of the Americas Conference on Information Systems, Proceedings of the Information Resources Management Association, Proceedings of the Security Conference, and in the Proceedings of the ISOne World International Conference. His current research interests include risk analysis and behavioral aspects of computer security management.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.