Research article

Challenges of the digital age for privacy and personal data protection

  • Received: 06 May 2020 Accepted: 22 July 2020 Published: 12 August 2020
  • Digital age can be described as a collection of different technological solutions as virtual environments, digital services, intelligent applications, machine learning, knowledge-based systems, etc., determining the specific characteristics of contemporary world globalization, e-communications, information sharing, virtualization, etc. However, there is an opportunity the technologies of the digital age to violate some basic principles of the information security and privacy by unregulated access to information and personal data, stored in different nodes of the global network. The goal of the article is to determine some special features of information and personal data protection and to summarise the main challenges of the digital age for the user's security and privacy. A brief presentation of the fundamental legislation in the fields of privacy and personal data protection is made in the introduction, followed by a review of related work on the topic. Components of information security for counteracting threats and attacks and basic principles in the organization of personal data protection are discussed. A summary of the basic challenges of the digital age is made by systematizing the negatives for user's privacy of the contemporary technologies as social computing, cloud services, Internet of Things, Big Data and Big Data Analytics and separate requirements to secure privacy of the participants based on General Data Protection Regulation principles are formulated.

    Citation: Radi P. Romansky, Irina S. Noninska. Challenges of the digital age for privacy and personal data protection[J]. Mathematical Biosciences and Engineering, 2020, 17(5): 5288-5303. doi: 10.3934/mbe.2020286

    Related Papers:

  • Digital age can be described as a collection of different technological solutions as virtual environments, digital services, intelligent applications, machine learning, knowledge-based systems, etc., determining the specific characteristics of contemporary world globalization, e-communications, information sharing, virtualization, etc. However, there is an opportunity the technologies of the digital age to violate some basic principles of the information security and privacy by unregulated access to information and personal data, stored in different nodes of the global network. The goal of the article is to determine some special features of information and personal data protection and to summarise the main challenges of the digital age for the user's security and privacy. A brief presentation of the fundamental legislation in the fields of privacy and personal data protection is made in the introduction, followed by a review of related work on the topic. Components of information security for counteracting threats and attacks and basic principles in the organization of personal data protection are discussed. A summary of the basic challenges of the digital age is made by systematizing the negatives for user's privacy of the contemporary technologies as social computing, cloud services, Internet of Things, Big Data and Big Data Analytics and separate requirements to secure privacy of the participants based on General Data Protection Regulation principles are formulated.


    加载中


    [1] E. J. Bloustein, N. J. Pallone, Individual and Group Privacy, Routledge, New York, 2017.
    [2] M. Oostveen, U. Irion, The golden age of personal data: How to regulate an enabling fundamental right?, in Personal Data in Competition, Consumer Protection and Intellectual Property Law (eds. M. Bakhoum, B. Conde Gallego, M. O. Mackenrodt, G. Surblytė-Namavičienė), Springer, (2018), 7-26. Available from: https://link.springer.com/chapter/10.1007/978-3-662-57646-5_2.
    [3] R. Romansky, A survey of digital world opportunities and challenges for user's privacy, Int. J. Inform. Technol. Secur., 9 (2017), 97-112.
    [4] Regulation (EU) 2916/679 of the European Parliament and the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protect Regulation), European Commission, 2016. Available from: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32016R0679.
    [5] J. J. Hanus, H. G. Relyea, A policy assessment of the privacy act of 1974, Am. Univ. Law Rev., 25 (1976), 555.
    [6] M. Shabani, P. Borry, Rules for processing genetic data for research purposes in view of the new EU general data protection regulation, Eur. J. Human Genet., 26 (2018), 149-156.
    [7] A. V. Tsaregorodtsev, O. Ja. Kravets, O. N. Choporov, A. N. Zelenina, Information security risk estimation for cloud infrastructure, Int. J. Inform. Technol. Secur., 10 (2018), 67-76.
    [8] O. Yu. Zaslavskaya, l. A. Zaslavskiy, V. E. Bolnokin, O. Ja. Kravets, Features of ensuring information security when using cloud technologies in educational institutions, Int. J. Inform. Technol. Secur., 10 (2018), 93-102.
    [9] P. Wandra, H. Jie, DeepProfile: Finding fake profile in online social network using dynamic CNN, J. Inform. Secur. Appl., 52 (2020), article 102465. Available from: https://www.sciencedirect.com/science/article/abs/pii/S2214212619303801.
    [10] V. Kharchenko, Big Data and Internet of Things for safety critical applications: Challenges, methodology and industry cases, Int. J. Inform. Technol. Secur., 10 (2018), 3-16.
    [11] I. Alsmadi, R. Burdwell, A. Aleroud, A. Wahbeh, M. Al-Qudah, A. Al-Omari, Introduction to information security, in Practical Information Security (eds. I. Alsmadi, R. Burdwell, A. Aleroud, A. Wahbeh, M. Al-Qudah, A. Al-Omari), Springer, (2018), 1-16. Available from: https://www.springer.com/gp/book/9783319721187.
    [12] H. Paanen, M. Lapke, M. Siponen, State of the art in information security policy development. Comp. Secur., 88 (2020), article 101608. Available from: https://www.sciencedirect.com/science/article/pii/S0167404818313002.
    [13] M. A. Ferrag, H. Janicke, Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study, J. Inform. Secur. Appl., 50 (2020), article 102418. Available from: https://www.sciencedirect.com/science/article/pii/S2214212619305046.
    [14] A. R. Mahlous, SSR: A framework for a secure software reuse, Int. J. Inform. Technol. Secur., 10 (2018), 87-98.
    [15] Y. A. Ivanova, Assessment of the probability of cyberattacks on Transport Management Systems, Int. J. Inform. Technol. Secur., 10 (2018), 99-106.
    [16] M. A. P. Chamikara, P. Bertok, D. Liu, S. Camtepe, I. Khalil, An efficient and scalable privacy preserving algorithm for big data and data streams. Comp. & Security, Special issue "Security and Privacy in Smart Cyber-physical Systems" (2019), article 101570. Available from: https://www.sciencedirect.com/journal/computers-and-security/special-issue/109XHWZ5JSX.
    [17] Tz. Tzolov, Data model in the context of the general data protection regulation, Int. J. Inform. Technol. Secur., 9 (2017), 113-122.
    [18] R. Romansky, I. Noninska, Principles of secure access and privacy in combined e-learnng environment: Architecture, formalization and modelling, in Multidisciplinary Perspectives on Human Capital and Information Technology Professionals (eds. V. Ahuja, S. Rathore), IGI Global Publ., USA (2018), 152-178.
    [19] M. Aminzade, Confidentiality, integrity and availability—finding a balanced IT framework, Netw. Secur., 50 (2018), 9-11. Available from: https://www.sciencedirect.com/science/article/pii/S1353485818300436.
    [20] Thales, 2020 Data Threat Report - Global Edition. Survey and Analysis from IDC, 2020. Available from: https://cpl.thalesgroup.com/data-threat-report.
    [21] Guidelines on the Use of Cloud Computing Services by the European Institutions and Bodies, European Data Protection Supervisor, 2018. Available from: https://edps.europa.eu/data-protection/our-ork/publications/guidelines/guidelines-use-cloud-computing-services-european_en.
    [22] Maximizing the value of your data privacy investments - data privacy benchmark study, CISCO Cybersecurity Series, 2019. Available from: https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/dpbs-2019.pdf.
    [23] Casey Crane, 20 surprising IoT statistics you don't already know, Security Boulevard, 5 Sep 2019. Available from: https://securityboulevard.com/2019/09/20-surprising-iot-statistics-you-dont-already-know/.
    [24] A. Azmoodeh, A. Dehghantanha. Big data and privacy: Challenges and opportunities, in Handbook of Big Data Privacy (ed. K-K. R. Choo, A. Dehghantanha), Springer-Cham, Switzerland, (2020), 1-6.
  • Reader Comments
  • © 2020 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(21814) PDF downloads(2250) Cited by(10)

Article outline

Figures and Tables

Figures(2)  /  Tables(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog