scholarly journals Cybersecurity, Data Privacy and Blockchain: A Review

2022 ◽  
Vol 3 (2) ◽  
Author(s):  
Vinden Wylde ◽  
Nisha Rawindaran ◽  
John Lawrence ◽  
Rushil Balasubramanian ◽  
Edmond Prakash ◽  
...  

AbstractIn this paper, we identify and review key challenges to bridge the knowledge-gap between SME’s, companies, organisations, businesses, government institutions and the general public in adopting, promoting and utilising Blockchain technology. The challenges indicated are Cybersecurity and Data privacy in this instance. Additional challenges are set out supported by literature, in researching data security management systems and legal frameworks to ascertaining the types and varieties of valid encryption, data acquisition, policy and outcomes under ISO 27001 and the General Data Protection Regulations. Blockchain, a revolutionary method of storage and immutability, provides a robust storage strategy, and when coupled with a Smart Contract, gives users the ability to form partnerships, share information and consent via a legally-based system of carrying out business transactions in a secure digital domain. Globally, ethical and legal challenges significantly differ; consent and trust in the public and private sectors in deploying such defensive data management strategies, is directly related to the accountability and transparency systems in place to deliver certainty and justice. Therefore, investment and research in these areas is crucial to establishing a dialogue between nations to include health, finance and market strategies that should encompass all levels of society. A framework is proposed with elements to include Big Data, Machine Learning and Visualisation methods and techniques. Through the literature we identify a system necessary in carrying out experiments to detect, capture, process and store data. This includes isolating packet data to inform levels of Cybersecurity and privacy-related activities, and ensuring transparency demonstrated in a secure, smart and effective manner.

Author(s):  
Yunus Topsakal

The public and private sectors will undergo a significant transformation with the use of blockchain technology, and this potential of blockchain technology will be influential in all areas of life. In addition, blockchain technology can help ease the integration of the Internet of Things, augmented reality, and artificial intelligence applications. The question of how such a technology that is in the process of development will be applied in areas such as taxation, notary operations, and banking, arises simultaneously. Studies related to blockchain technology have mainly been carried out in the fields of finance, logistics, banking, and education. However, there is a paucity of studies on blockchain technology in the tourism industry which has an important role in the global economy. Therefore, the potential of using blockchain technology in the tourism industry is evaluated in this chapter. For this purpose, the features, advantages, and disadvantages of blockchain technology are explained. The potential uses of blockchain technology in the tourism industry are then discussed.


2019 ◽  
Vol 11 (11) ◽  
pp. 3062 ◽  
Author(s):  
Calidon Costa Conceição ◽  
Francisco Antonio Dos Anjos ◽  
Sara Joana Gadotti dos Anjos

Objective: The development of tourism is one the main objectives of managers seeking a greater competitive advantage for destinations. To achieve this objective, the political-institutional structure related to public and private organizations involved in the Brazilian scenario of tourism activities deliberately operate in the format of Regional Tourism Organizations—RTOs, which started in 2004. In this context, the aim of this study arose, which is to analyze the power relations of Regional Tourism Organizations of tourist regions. Design/Methodology: This research adopted a qualitative and quantitative approach, with data collection through documents, laws, reports and information about the RTOs and questionnaires in forms applied to 27 representatives of the public sector, 14 representatives of private sector and six representatives of the third sector, from a total population of 89 active members of the Regional Tourism Organizations: Costa Verde e Mar (state of Santa Catarina), Hortênsias (state of Rio Grande do Sul), and Costa das Dunas (state of Rio Grande do Norte). During the application of the forms, interviews were carried out, totaling 47 interviews with members of the RTOs. Quantitative analyses were generated by mean, mode, absolute and relative frequencies, multiple responses and dispersion graph, with the use of descriptive analyses. The qualitative analyses involving documents were descriptive, and those involving oral information were carried out using analysis of content of Bardin (1977). The different methods that were used in an interrelated manner and helped in the analysis of the data coming from the application of forms (quantitative), official documents (laws/decrees, regulations and statutes), and interviews with actors of the regional tourism organizations (qualitative), enabled the measurement of the effectiveness of the process of management of RTOs in relation to the dimension Power Relationship and the variables analyzed Representativeness, Harmony, Trust and Decision-Making Power. Results: As a result, it was seen that the regional tourism organizations of the tourist regions operate in an effective manner in the public or private sectors and that they involve the management of shared practices by the regional tourism organizations in the destinations studied in terms of representativeness, harmony, trust and decision-making power. Novelty/Value: This research theoretically deepened for the academy the theme of regional governance and power relationship between public and private actors in tourism who are important for the competitive performance of a tourist destination. It also analyzes how the management and governance of regional tourism organizations behaves in terms of power relationships.


2018 ◽  
Vol 5 (1) ◽  
pp. 204-207
Author(s):  
D A Pechegin

«Current legislation of the Russian Federation establishes a variety of currency restrictions, which are a set of rules established by the state, designed to protect the national currency to affect the behavior of participants in foreign exchange transactions by imposing prohibitions or additional encumbrances on certain foreign exchange transactions». One of the such rules is the provision of art. 27 Federal Law No. 86-FZ of 10.07.2002 «On the Central Bank of the Russian Federation (the Bank of Russia)», according to which the introduction in the territory of the Russian Federation of other monetary units and the issuance of monetary surrogates are prohibited. Meanwhile, the current legislation does not establish any liability for the issuance of cash surrogates. Moreover, new technologies are increasingly being introduced into our lives and are constantly inf luencing the legal environment in which we are currently surrounded. Much attention today is focused on the topic of cryptocurrency and the use of blockchain technology in the public and private sectors. Currently, both professional and non- professional participants are increasingly discussing various aspects of the use of cryptocurrencies in a particular state. The article analyzes urgent issues of the circulation of money substitutes, identifies the prospects of establishing criminal responsibility for the issue and circulation of money substitutes, etc.


2019 ◽  
Vol 46 (2_suppl) ◽  
pp. 124S-128S ◽  
Author(s):  
Robert S. Gold ◽  
M. Elaine Auld ◽  
Lorien C. Abroms ◽  
Joseph Smyser ◽  
Elad Yom-Tov ◽  
...  

Despite widespread use of the Internet and social media platforms by the public, there has been little organized exchange of information among the academic, government, and technology sectors about how digital communication technologies can be maximized to improve public health. The second Digital Health Promotion Executive Leadership Summit convened some of the world’s leading thinkers from across these sectors to revisit how communication technology and the evolving social media platforms can be utilized to improve both individual and population health. The Summit focused on digital intelligence, the spread of misinformation, online patient communities, censorship in social media, and emerging global legal frameworks. In addition, Summit participants had an opportunity to review the original “Common Agenda” that emerged and was published after the inaugural Summit and recommend updates regarding the uses of digital technology for advancing the goals of public health. This article reports the outcomes of the Summit discussions and presents the updates that were recommended by Summit participants as the Digital Health Communication Common Agenda 2.0. Several of the assertions underlying the original Common Agenda have been modified, and several new assertions have been added to reflect the recommendations. In addition, a corresponding set of principles and related actions—including a recommendation that an interagency panel of the U.S. Department of Health and Human Services be established to focus on digital health communication, with particular attention to social media—have been modified or supplemented.


2019 ◽  
Vol 6 (1) ◽  
pp. 205395171984878
Author(s):  
Luke Munn ◽  
Tsvetelina Hristova ◽  
Liam Magee

Personal data is highly vulnerable to security exploits, spurring moves to lock it down through encryption, to cryptographically ‘cloud’ it. But personal data is also highly valuable to corporations and states, triggering moves to unlock its insights by relocating it in the cloud. We characterise this twinned condition as ‘clouded data’. Clouded data constructs a political and technological notion of privacy that operates through the intersection of corporate power, computational resources and the ability to obfuscate, gain insights from and valorise a dependency between public and private. First, we survey prominent clouded data approaches (blockchain, multiparty computation, differential privacy, and homomorphic encryption), suggesting their particular affordances produce distinctive versions of privacy. Next, we perform two notional code-based experiments using synthetic datasets. In the field of health, we submit a patient’s blood pressure to a notional cloud-based diagnostics service; in education, we construct a student survey that enables aggregate reporting without individual identification. We argue that these technical affordances legitimate new political claims to capture and commodify personal data. The final section broadens the discussion to consider the political force of clouded data and its reconstitution of traditional notions such as the public and the private.


2021 ◽  
Vol 8 (6) ◽  
pp. 531-540
Author(s):  
Lydia Natalia ◽  
Nanny Dewi Tanzil ◽  
Prima Yusi Sari

Public-Private Partnership (PPP) is one of the schemes that have inspired many countries in infrastructure development. One of the most discussed PPP topics by researchers is the concept of Critical Success Factors (CSF). Therefore, this study examines CSF publications for PPP projects from selected journal sites from 2000-2019. The results showed that research on CSF in PPP began to increase in 2012. The most identified CSFs were appropriate risk allocation and sharing, competitive and transparent procurement processes, favorable and efficient legal frameworks, commitment and responsibility of the public and private sectors, and a robust and reliable private consortium. Furthermore, it was also found that most countries that were the objects of research on PPP CSF were China, followed by Hong Kong and Australia. The results also show that the dominant research focuses on multi-sector types of infrastructure where CSF can be applied to all infrastructure sectors. The findings obtained in this study can provide an overview of CSFs for projects with PPP schemes in the future. Besides, the identified CSFs can be applied to any PPP infrastructure sector. They can assist stakeholders in increasing the likelihood of PPP project success and can be adopted for further research


Author(s):  
Hugo Lopes ◽  
Valderi R. Q. Leithardt ◽  
Ivan Miguel Pires ◽  
Raúl García-Ovejero ◽  
María Navarro-Cáceres

The mobile devices caused a constant struggle for the pursuit of data privacy. Nowadays, it appears that the number of mobile devices in the world is increasing. With this increase and technological evolution, thousands of data associated with everyone are generated and stored remotely. Thus, the topic of data privacy is highlighted in several areas. There is a need for control and management of data in circulation inherent to this theme. This article presents an approach of the interaction between the individual and the public environment, where this interaction will determine the access to information. This analysis was based on a data privacy management model in public environments created after reading and analyzing the current technologies. A mobile application based on location via Global Positioning System (GPS) was created to substantiate this model, which it considers the General Data Protection Regulation (GDPR) to control and manage access to the data of each individual.


Author(s):  
Simone Casiraghi ◽  
Alessandra Calvi

Biometrics technologies have been spreading cross-sector in the public and private domains. Their potential intrusiveness, in particular regarding privacy and data protection, has called the European legislators, in the recent EU data protection reform, to introduce a definition of “biometric data,” and to grant biometric data specific protection, as a “special category of data.” Despite the reformed framework, in the field of border management, the use of biometric data is expected to increase steadily because it is seen as a more efficient and reliable solution. This chapter will look into the reformed data protection and border management legal frameworks to highlight discrepancies between the two, and ultimately assess to what extent the new data protection reformed regime for biometric data is satisfactory.


2020 ◽  
Vol 11 (4) ◽  
pp. 52-62
Author(s):  
Yousef Alabbasi

Blockchain (BC) provides an encrypted echo system to the users where they can securely mark their transactional entries in a distributed ledger. The ledger comprises of distributed and shared network of nodes that validate the authenticity of each transaction and keeps its authentic record for perusal. Keeping view of the enormous potential of this technology, numerous public and private entities are embarking the bandwagon of blockchain and integrating this technology for ensuring a transitioning in their digital finance operations. Apart from the financial realm, healthcare, agriculture, and education sectors are also benefiting from the security and reliability of BC. Incorporation of BC in the public sector at increased scale requires a review of existing governance and legislative structures and a recalibration of regulatory regimes. This paper presents a literature review on blockchain technology, its current usage trends, and its governance.


1995 ◽  
Vol 20 (1) ◽  
Author(s):  
Wolfgang Kleinwachter

Abstract: Broadcasting legislation in Eastern and Central Europe after 1989, in the transition period from a totalitarian into a democratic society, falls into four different stages. The first stage was characterized by an enthusiastic awakening to the new media freedoms. The second stage was dominated by a disillusionment. The third stage was overshadowed by a growing power struggle among different political groups to get control over broadcasting, and, in particular, over national television. And, depending upon the level of democracy reached in these countries, a fourth stage may see the building of new public and private radio and television institutions, based on democratic constitutions and media laws, serving the public independent from governmental control, competing in a free broadcasting market for high viewing rates, and integrating, step by step, into transnational European broadcasting frameworks and structures. The speed of transition is varying and will continue to vary from country to country. Résumé: En ce qui regarda la radiodiffusion en Europe centrale et orientale après 1989, dans une période de transition entre société totalitaire et société démocratique, la législation suivit quatre étapes consécutives. Un éveil enthousiaste aux nouvelles libertés dans les médias caractérisa la première étape. La désillusion domina la deuxième. La troisième étape fut marquée par une lutte de pouvoir croissante entre des groupes politiques différents pour contrôler la radiodiffusion, particulièrement la télévision nationale. Et, dépendant du niveau de démocratie atteint dans ces pays, une quatrième étape put mener à de nouvelles institutions de radio et de télévision, soit publiques, soit privées, adoptant des principes et des lois démocratiques, servant le public indépendamment de contrôles gouvernementaux, se faisant concurrence pour atteindre de vastes auditoires dans des marchés libres, et s'intégrant peu à peu aux systèmes de radiodiffusion transnationaux en Europe. La vitesse de transition a jusqu'ici été variable, et continuera à l'être de pays en pays.


Sign in / Sign up

Export Citation Format

Share Document