[go: up one dir, main page]

Hakkala et al., 2022 - Google Patents

Personal data protection in the age of mass surveillance

Hakkala et al., 2022

View PDF
Document ID
14905553540076878746
Author
Hakkala A
Koskinen J
Publication year
Publication venue
Journal of Computer Security

External Links

Snippet

We present a solution to data ownership in the surveillance age in the form of an ethically sustainable framework for managing personal and person-derived data. This framework is based on the concept of Datenherrschaft–mastery over data that all natural persons should …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Similar Documents

Publication Publication Date Title
Jin Artificial intelligence and consumer privacy
Michael et al. Privacy, data rights and cybersecurity: Technology for good in the achievement of sustainable development goals
Pelteret et al. A review of information privacy and its importance to consumers and organizations
Rafiq et al. Privacy prevention of big data applications: A systematic literature review
Davies Shining a light on policing of the dark web: an analysis of UK investigatory powers
Harkin et al. The commodification of mobile phone surveillance: An analysis of the consumer spyware industry
Aburrous et al. Experimental case studies for investigating e-banking phishing techniques and attack strategies
Jiang Cybersecurity policies in China
Grabosky Organised crime and the internet: Implications for national security
Knight et al. Identity crisis: Global challenges of identity protection in a networked world
Hakkala et al. Personal data protection in the age of mass surveillance
Davidoff Data breaches: crisis and opportunity
Becerril Cybersecurity and e-commerce in free trade agreements
Biedron Cybercrime in the digital age
Qian Redefining international law paradigms: Charting cybersecurity, trade, and investment trajectories within global legal boundaries
Jonas et al. Friction, snake oil, and weird countries: Cybersecurity systems could deepen global inequality through regional blocking
Shukla et al. Data privacy
Kline Security Theater: And Database-Driven Information Markets: A Case for an Omnibus US Data Privacy Statute
Sturc et al. Developing a system of indicators for clustering financial cybercrime
Nwankwo Analysis of impact of industry 4.0 on Africa, Eastern Europe and US: a case study of Cyber-Security and sociopolitical dynamics of Nigeria, Russia and USA
Gonzalez III et al. Cybersecurity: Current writings on threats and protection
Jerman-Blažič et al. Towards the development of a research agenda for cybercrime and cyberterrorism–identifying the technical challenges and missing solutions
Hazel Privacy Self-Help
Aserkar et al. Impact of personal data protection (PDP) regulations on operations workflow
Matwyshyn Harboring data: Information security, law, and the corporation