Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleNovember 2024
Anti-third-party Infringement Based on the Perspective of Data Resource Holding Rights
AbstractWith the rapid development of Internet economy, data has become the fifth production factor after land, capital, labor and technology. While digital economy has become a new growth point of China’s economy, it has also caused a series of data ...
- ArticleOctober 2024
Legal Overview of Latest Developments in the Energy Sector Regarding Data Protection and Cybersecurity
AbstractThis paper seeks to obtain a better understanding of the latest developments and purposes of the EU regulation related to data in the energy sector. It shows that EU cybersecurity measures has increased, giving a broader and stronger coverage ...
- research-articleDecember 2024
Privacy and data protection regulations for AI using publicly available data: Clearview AI case
ICEGOV '24: Proceedings of the 17th International Conference on Theory and Practice of Electronic GovernancePages 48–55https://doi.org/10.1145/3680127.3680200Data are pivotal resources in artificial intelligence (AI) research and development. Acquiring enormous quantities of high-quality data is essential for improving AI performance. However, obtaining such data poses significant challenges, including high ...
- research-articleOctober 2024
GDPR compliance via software evolution: Weaving security controls in software design
Journal of Systems and Software (JSSO), Volume 216, Issue Chttps://doi.org/10.1016/j.jss.2024.112144AbstractSoftware should comply with international privacy laws, like the General Data Protection Regulation (GDPR). However, implementing appropriate technical controls is often an error-prone and time-consuming process. This is partly due to the limited ...
Highlights
- An approach to support software compliance with the GDPR data protection principles.
- A technique to identify data processing activities in software applications.
- A catalog of privacy and security controls to fix non-compliant ...
- ArticleSeptember 2024
Implications of Age Assurance on Privacy and Data Protection: A Systematic Threat Model: Research Paper
AbstractIn today’s digital world, children are encouraged to develop a significant part of their daily lives by online means. Age assurance solutions have become essential tools to ensure the protection of their fundamental rights. This is reflected in ...
-
- research-articleAugust 2024
Large language models: a new approach for privacy policy analysis at scale
AbstractThe number and dynamic nature of web sites and mobile applications present regulators and app store operators with significant challenges when it comes to enforcing compliance with applicable privacy and data protection laws. Over the past several ...
- ArticleAugust 2024
Zunna: The Browser Extension for Protecting Personal Data
Knowledge Science, Engineering and ManagementPages 203–213https://doi.org/10.1007/978-981-97-5489-2_18AbstractThe connectivity of devices has increased over the last few decades, and millions of connected devices have enabled people to connect easily to the internet. Internet browsers come bundled in many devices ready for use. While these browsers ...
- research-articleJuly 2024
Understanding the GDPR from a requirements engineering perspective—a systematic mapping study on regulatory data protection requirements
Requirements Engineering (REQE), Volume 29, Issue 4Pages 523–549https://doi.org/10.1007/s00766-024-00423-4AbstractData protection compliance is critical from a requirements engineering (RE) perspective, both from a software development lifecycle (SDLC) perspective and regulatory compliance. Not including these requirements from the early phases of the SDLC ...
- research-articleJuly 2024
Hunter: Tracing anycast communications to uncover cross-border personal data transfers
AbstractCross-border personal data transfers are heavily regulated worldwide, with data protection authorities imposing huge fines on organizations that fail to meet their strict compliance requirements. However, network-level optimizations such as ...
- review-articleFebruary 2024
A systematic analysis of failures in protecting personal health data: A scoping review
International Journal of Information Management: The Journal for Information Professionals (IJIM), Volume 74, Issue Chttps://doi.org/10.1016/j.ijinfomgt.2023.102719AbstractPersonal health data breaches pose significant challenges to healthcare providers and clients. This study systematically analyzes 5470 records and reviews 120 articles on this theoretically and practically important topic. It summarizes the ...
Highlights- Personal health data breaches pose risks, harm individuals, and attract hackers.
- Healthcare organizations face vulnerability from multiple actors and inadequate IT security.
- Global focus on data privacy is driven by new regulations ...
- research-articleNovember 2023
Preservation of Sensitive Data Using Multi-Level Blockchain-based Secured Framework for Edge Network Devices
- Charu Awasthi,
- Prashant Kumar Mishra,
- Pawan Kumar Pal,
- Surbhi Bhatia Khan,
- Ambuj Kumar Agarwal,
- Thippa Reddy Gadekallu,
- Areej A. Malibari
AbstractThe proliferation of IoT devices has influenced end users in several aspects. Yottabytes (YB) of information are being produced in the IoT environs because of the ever-increasing utilization capacity of the Internet. Since sensitive information, ...
- ArticleAugust 2024
Assessing and Promoting Data Fragility in Schools: Open Questionnaires for Auto-evaluation in Educational Roles
- Daniel Amo-Filva,
- David Fonseca Escudero,
- Mónica V. Sanchez-Sepulveda,
- Henry Hasti,
- Alicia García-Holgado,
- Lucía García-Holgado,
- Sonia Verdugo-Castro,
- Francisco José García-Peñalvo,
- Tihomir Orehovački,
- Marjan Krašna,
- Igor Pesek,
- Emanuela Marchetti,
- Andrea Valente,
- Claus Witfelt,
- Ivana Ružić,
- Karim Elia Fraoua,
- Fernando Moreira,
- Carla Santos Pereira,
- Cristina Paes,
- Petar Nikolic
AbstractSPADATAS is an Erasmus + that aims to raise awareness on data fragility and enhance data protection of students in academic data management. One of the objectives of the project is to develop tools or instruments for auto-assessment of data ...
- research-articleSeptember 2023
Patient’s data privacy and security in mHealth applications: a Charles proxy-based recommendation
- Ahmed Raza Rajput,
- Isma Masood,
- Almas Tabassam,
- Muhammad Shamrooz Aslam,
- Zhang ShaoYu,
- Mehreen Aslam Rajput
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 27, Issue 23Pages 18165–18180https://doi.org/10.1007/s00500-023-09265-8AbstractMobile Health (mHealth) applications play an essential role in healthcare. The usage of mHealth apps is rapidly increasing, and it provides services, such as vitals, medication, and appointments, to patients and physicians. These apps ...
- ArticleJanuary 2024
Enforcing the GDPR
AbstractViolations of data protection laws such as the General Data Protection Regulation (GDPR) are ubiquitous. Currently, building IT support to implement such laws is difficult and the alternatives such as manual controls augmented by auditing are ...
- research-articleSeptember 2023
Segmentation embedding method with modified interpolation for increasing the capacity of adaptable and reversible audio data hiding
Journal of King Saud University - Computer and Information Sciences (JKSUCIS), Volume 35, Issue 8https://doi.org/10.1016/j.jksuci.2023.101636AbstractThe development of digital technology brings many advantages to human life. However, it also comes with the risk of making data protection required. This protection can come in many forms, one of which is the data hiding method, often called ...
- ArticleJuly 2024
Enhancing Citizen Participation Through Data Subject Right Delegation
AbstractData subject rights (DSRs) such as the right of access and the right to data portability can provide citizens with information about how their data are used in society. Researchers in academia and civil society alike have used such rights to ...
- research-articleJuly 2023
Attribute disclosure risk for k-anonymity: the case of numerical data
International Journal of Information Security (IJOIS), Volume 22, Issue 6Pages 2015–2024https://doi.org/10.1007/s10207-023-00730-xAbstractk-Anonymity is one of the most well-known privacy models. Internal and external attacks were discussed for this privacy model, both focusing on categorical data. These attacks can be seen as attribute disclosure for a particular attribute. Then, p-...
- research-articleJuly 2023
A continuum of context in informational privacy transmissions: insights from people with disabilities in Vietnam
Universal Access in the Information Society (UAIS), Volume 23, Issue 4Pages 1897–1908https://doi.org/10.1007/s10209-023-01021-xAbstractThe transmission of informational privacy has become a fertile ground for debate among competing actors affected by the proliferation of information communication technologies. Contexts are among the factors that shape the flow of informational ...
- ArticleJuly 2023
Supporting Small and Medium-Sized Enterprises in Using Privacy Enhancing Technologies
AbstractSmall and Medium-sized Enterprises (SMEs) are a critical element of the economy in many countries, as well as being embedded within key supply chains alongside larger organisations. Typical SMEs are data- and technology-dependent, but many are ...
- ArticleJuly 2023
Privacy and Ethical Considerations of Smart Environments: A Philosophical Approach on Smart Meters
Computational Science and Its Applications – ICCSA 2023 WorkshopsPages 303–313https://doi.org/10.1007/978-3-031-37129-5_25AbstractThis paper delves into the privacy and ethical concerns related to smart devices in IoT, particularly smart meters. It explores the regulatory framework governing data protection through the lens of GDPR. Our analysis identifies relevant GDPR ...