Blockchain and the GDPR: New Challenges for Privacy and Security

2020 ◽  
pp. 275-286
Author(s):  
Marco Tullio Giordano
2021 ◽  
pp. 327-347
Author(s):  
Fred Cate ◽  
Rachel Dockery

This chapter discusses cybersecurity laws. Many measures employed to enhance cybersecurity pose a risk to privacy. In addition, data protection laws focus only on personally identifiable information, while cybersecurity is also concerned with securing economic data such as trade secrets and company databases, government information, and the systems that transmit and process information. As a practical matter, despite the prominence of security obligations in data protection legislation, these were often downplayed or ignored entirely until recent years. Only as cybersecurity threats became more pressing did regulators begin actively enforcing the security obligations found in most data protection laws. More recently, legislative bodies and regulators have begun adopting cybersecurity-specific obligations. However, even these have often mirrored or been combined with privacy protections, sometimes to the detriment of effective cybersecurity. The chapter describes major categories of cybersecurity law, including unfair or deceptive practices legislation, breach notification laws, and data destruction laws. It also considers the new focus on critical infrastructure and information sharing, the China Cybersecurity Law, and the new challenges to data privacy and security law.


Electronics ◽  
2021 ◽  
Vol 10 (23) ◽  
pp. 2926
Author(s):  
Rizwan Majeed ◽  
Nurul Azma Abdullah ◽  
Muhammad Faheem Mushtaq ◽  
Muhammad Umer ◽  
Michele Nappi

Developments in drones have opened new trends and opportunities in different fields, particularly in small drones. Drones provide interlocation services for navigation, and this interlink is provided by the Internet of Things (IoT). However, architectural issues make drone networks vulnerable to privacy and security threats. It is critical to provide a safe and secure network to acquire desired performance. Small drones are finding new paths for progress in the civil and defense industries, but also posing new challenges for security and privacy as well. The basic design of the small drone requires a modification in its data transformation and data privacy mechanisms, and it is not yet fulfilling domain requirements. This paper aims to investigate recent privacy and security trends that are affecting the Internet of Drones (IoD). This study also highlights the need for a safe and secure drone network that is free from interceptions and intrusions. The proposed framework mitigates the cyber security threats by employing intelligent machine learning models in the design of IoT-aided drones by making them secure and adaptable. Finally, the proposed model is evaluated on a benchmark dataset and shows robust results.


Author(s):  
Prashant Srivastava ◽  
Niraj Kumar Tiwari ◽  
Ali Abbas

Organizations now have knowledge of big data significance, but new challenges stand up with new inventions. These challenges are not only limited to the three Vs of big data, but also to privacy and security. Attacks on big data system ranges from DDoS to information theft, ransomware to end user level security. So implementing security to big data system is a multiple phase-based ongoing process in which security is imposed from perimeter level to distributed file system security, cloud security to data security, storage to data mining security, and so on. In this chapter, the authors have identified some key vulnerable point related to big data and also proposed a security model.


Author(s):  
Joachim Frank

Compared with images of negatively stained single particle specimens, those obtained by cryo-electron microscopy have the following new features: (a) higher “signal” variability due to a higher variability of particle orientation; (b) reduced signal/noise ratio (S/N); (c) virtual absence of low-spatial-frequency information related to elastic scattering, due to the properties of the phase contrast transfer function (PCTF); and (d) reduced resolution due to the efforts of the microscopist to boost the PCTF at low spatial frequencies, in his attempt to obtain recognizable particle images.


2002 ◽  
Vol 38 (11) ◽  
pp. S127-S128
Author(s):  
M Marty

2005 ◽  
Vol 38 (17) ◽  
pp. 80
Author(s):  
NELLIE BRISTOL

2012 ◽  
Author(s):  
Maggie Campbell ◽  
Katherine Lacasse ◽  
Lucas Mazur ◽  
Rashmi Nair

Sign in / Sign up

Export Citation Format

Share Document