Hakkala et al., 2022 - Google Patents
Personal data protection in the age of mass surveillanceHakkala et al., 2022
View PDF- Document ID
- 14905553540076878746
- Author
- Hakkala A
- Koskinen J
- Publication year
- Publication venue
- Journal of Computer Security
External Links
Snippet
We present a solution to data ownership in the surveillance age in the form of an ethically sustainable framework for managing personal and person-derived data. This framework is based on the concept of Datenherrschaft–mastery over data that all natural persons should …
- 230000004224 protection 0 title description 33
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jin | Artificial intelligence and consumer privacy | |
Michael et al. | Privacy, data rights and cybersecurity: Technology for good in the achievement of sustainable development goals | |
Pelteret et al. | A review of information privacy and its importance to consumers and organizations | |
Rafiq et al. | Privacy prevention of big data applications: A systematic literature review | |
Davies | Shining a light on policing of the dark web: an analysis of UK investigatory powers | |
Harkin et al. | The commodification of mobile phone surveillance: An analysis of the consumer spyware industry | |
Aburrous et al. | Experimental case studies for investigating e-banking phishing techniques and attack strategies | |
Jiang | Cybersecurity policies in China | |
Grabosky | Organised crime and the internet: Implications for national security | |
Knight et al. | Identity crisis: Global challenges of identity protection in a networked world | |
Hakkala et al. | Personal data protection in the age of mass surveillance | |
Davidoff | Data breaches: crisis and opportunity | |
Becerril | Cybersecurity and e-commerce in free trade agreements | |
Biedron | Cybercrime in the digital age | |
Qian | Redefining international law paradigms: Charting cybersecurity, trade, and investment trajectories within global legal boundaries | |
Jonas et al. | Friction, snake oil, and weird countries: Cybersecurity systems could deepen global inequality through regional blocking | |
Shukla et al. | Data privacy | |
Kline | Security Theater: And Database-Driven Information Markets: A Case for an Omnibus US Data Privacy Statute | |
Sturc et al. | Developing a system of indicators for clustering financial cybercrime | |
Nwankwo | Analysis of impact of industry 4.0 on Africa, Eastern Europe and US: a case study of Cyber-Security and sociopolitical dynamics of Nigeria, Russia and USA | |
Gonzalez III et al. | Cybersecurity: Current writings on threats and protection | |
Jerman-Blažič et al. | Towards the development of a research agenda for cybercrime and cyberterrorism–identifying the technical challenges and missing solutions | |
Hazel | Privacy Self-Help | |
Aserkar et al. | Impact of personal data protection (PDP) regulations on operations workflow | |
Matwyshyn | Harboring data: Information security, law, and the corporation |