Personal Data Security and Supervision in the Age of Large Data

Author(s):  
Zhen-Yuan Du
2021 ◽  
Author(s):  
Shatadru Shikta ◽  
Somania Nur Mahal ◽  
Kazi Bushra Al Jannat ◽  
MAHADY HASAN ◽  
M. ROKONUZZAMAN

2020 ◽  
Vol 11 (2) ◽  
pp. 161-170
Author(s):  
Rochman Hadi Mustofa

AbstractBig Data has become a significant concern of the world, along with the era of digital transformation. However, there are still many young people, especially in developing countries, who are not yet aware of the security of their big data, especially personal data. Misuse of information from big data often results in violations of privacy, security, and cybercrime. This study aims to determine how aware of the younger generation of security and privacy of their big data. Data were collected qualitatively by interviews and focus group discussions (FGD) from. Respondents were undergraduate students who used social media and financial technology applications such as online shopping, digital payments, digital wallet and hotel/transportation booking applications. The results showed that students were not aware enough and understood the security or privacy of their digital data, and some respondents even gave personal data to potentially scam sites. Most students are not careful in providing big data information because they are not aware of the risks behind it, socialization is needed in the future as a step to prevent potential data theft.


2017 ◽  
Vol 17 (1) ◽  
pp. 45
Author(s):  
Endre Győző Szabó ◽  
Balázs Révész

A magánélet és a biztonság népszerű ellentétpárként tűnhet fel az adatvédelmi gondolkodásban. Leegyszerűsítve olvashatjuk sokszor, hogy ha bizonyos feltételek hiányoznak, aránytalanul nagy áldozatot hozhatunk a személyes magánszféra, a privacy oldalán a biztonság érdekében, és magánszféránk túlzott feláldozása a biztonság oltárán visszafordíthatatlan folyamathoz és orwelli világhoz vezet. Más, a biztonság szempontjait mindenek felettinek hirdető érvelésben viszont a személyes adatok védelmére való hivatkozást alkotmányjogi bűvészkedésnek csúfolják és igyekeznek kisebbíteni a magánszféra-védelem egyébként méltányolandó értékeit. A magánélet és a személyes adatok védelmének pedig nagy a tétje, az adatok illetéktelenek részére való kiszolgáltatása, rosszhiszemű felhasználása egzisztenciákat, családokat tehet tönkre, boldogulási lehetőségeket hiúsíthat meg, ha a védelem alacsony szintre süllyed. Másrészről pedig az információszerzés, illetve előzetes adatgyűjtés a különböző bűnelkövetések, terrorcselekmények előkészületi cselekményei is egyben. Azzal, ha a személyes adataink, magánszféránk védelmében ésszerű lépéseket teszünk, élünk a jog és a technológia adta védelmi lehetőségekkel, adatainkat nemcsak az államtól és a piaci szereplőktől, de a bűnözőktől is elzárjuk, és ezzel mindannyiunk biztonságát szolgáljuk. Egy terület tehát biztosan létezik, ahol a biztonság és magánszféra mezsgyéje összeér: az adatbiztonságé és ezzel összefüggésben a tudatos, felelős felhasználói attitűdé, aminek azonban sokszor az emberi tényező a gátja. Jelen tanulmányban a magánszféra és biztonság kérdéskörének komplexitásáról szólunk, és közös nevezőt keresünk az adatkezelések nézőpontjából, kitérve az új adatvédelmi rendelet (GDPR) magánszféránkat és biztonságunkat egyaránt szolgáló leendő jogintézményeinek bemutatására is. --- Data in security – security in our data? Privacy and security may be deemed as a popular dichotomy. It is often argued that even if security is vital, we might sacrifice too much of our privacy in return. This may be irreversible when it comes to the intrusiveness of surveillance. On the other hand, it is also sometimes argued that the importance of personal data protection deserves less attention than security. There is much at stake when it comes to privacy and the protection of personal data. Misuse of personal information may damage families’ lives and ruin people’s livelihoods, thus this may all have significant repercussions for society as a whole – this is the price to be paid if protection is at a low level. Using sophisticated measures that technology and legal regulations can provide, privacy can be protected. Data security is a common field for the protection of privacy and security – crucial for both endeavours to make people’s lives better. This essay describes the complexity of issues related to privacy and security, while also taking new legislation of the European Union into account.


Sensors ◽  
2020 ◽  
Vol 20 (10) ◽  
pp. 2920 ◽  
Author(s):  
Alex Barros ◽  
Paulo Resque ◽  
João Almeida ◽  
Renato Mota ◽  
Helder Oliveira ◽  
...  

The rapid spread of wearable technologies has motivated the collection of a variety of signals, such as pulse rate, electrocardiogram (ECG), electroencephalogram (EEG), and others. As those devices are used to do so many tasks and store a significant amount of personal data, the concern of how our data can be exposed starts to gain attention as the wearable devices can become an attack vector or a security breach. In this context, biometric also has expanded its use to meet new security requirements of authentication demanded by online applications, and it has been used in identification systems by a large number of people. Existing works on ECG for user authentication do not consider a population size close to a real application. Finding real data that has a big number of people ECG’s data is a challenge. This work investigates a set of steps that can improve the results when working with a higher number of target classes in a biometric identification scenario. These steps, such as increasing the number of examples, removing outliers, and including a few additional features, are proven to increase the performance in a large data set. We propose a data improvement model for ECG biometric identification (user identification based on electrocardiogram—DETECT), which improves the performance of the biometric system considering a greater number of subjects, which is closer to a security system in the real world. The DETECT model increases precision from 78% to 92% within 1500 subjects, and from 90% to 95% within 100 subjects. Moreover, good False Rejection Rate (i.e., 0.064003) and False Acceptance Rate (i.e., 0.000033) were demonstrated. We designed our proposed method over PhysioNet Computing in Cardiology 2018 database.


2016 ◽  
Vol 9 (2) ◽  
pp. 45-59
Author(s):  
Claudia Bobâlcă ◽  
Oana Ţugulea

AbstractThe purpose of the research is to identify the factors affecting online satisfaction. As a research method, we applied a quantitative survey based on a questionnaire. The sample consists of 532, students at Faculty of Economics and Business Administration, aged between 19-26 years, who buy online various products from the Internet. In order to identify the dimensions of online satisfaction, we used exploratory factor analysis with SPSS 17.0, with Principal Components as extraction type and Varimax as rotation method. Nine dimensions of online satisfaction were identified, namely: products corresponding to the online description, good price, comfort, easily accessible information, personal data security, good design, support, personalization, and website awareness.


Sensors ◽  
2020 ◽  
Vol 20 (20) ◽  
pp. 5761 ◽  
Author(s):  
Roman Holzer ◽  
Wilhelm Bloch ◽  
Christian Brinkmann

Background: Wearable electrochemical sensors that detect human biomarkers allow a comprehensive analysis of a person’s health condition. The “electronic smart patch system for wireless monitoring of molecular biomarkers for health care and well-being” (ELSAH) project aims to develop a minimally invasive sensor system that is capable of continuously monitoring glucose and lactate in the dermal interstitial fluid in real time. It is the objective of the present study to compare the intended ELSAH-patch specifications with the expectations and requirements of potential end-users at an early stage during the development phase. Methods: A questionnaire addressing different aspects of the ELSAH-patch was filled out by 383 respondents. Results: The participants stated a high general demand for such a system, and they would use the ELSAH-patch in different health care and physical fitness applications. The preferred terminal device for communication with the sensor would be the smartphone. An operating time of 24 hours would be sufficient for 55.8% of the users (95%-CI: 50.3–61.3%), while 43.5% of them (95%-CI: 38.0–48.9%) would prefer a lifetime of several days or more. The software should have a warning function, especially for critical health conditions. Since the measured personal data would be highly sensitive, the participants called for high standards for data security and privacy. Conclusion: In general, the participants’ responses on their expectations and requirements were well in line with the intended specifications of the ELSAH-patch system. However, certain technical aspects such as the lifetime, data security and accuracy require special attention during its development.


2015 ◽  
Vol 14 (10) ◽  
pp. 6184-6189
Author(s):  
Himanshu Gupta ◽  
Kapil Chauhan

In today's society, data security is the big problem for every business organization or an individual. Most found threat is theft of personal data and information. With time digital data become more prevalent, personnel try to secure their information by using highly encrypted passwords and authentication identities, but, the misuse and theft of these security measures are rising in lot of theft cases Taking advantage of security flaws in authentication identities ends up in cards being duplicated or counterfeited and hence misused. This increasing fight with cyber security has been the sole reason of  making  biometric security systems, the  important area of concern is that how do  one can implement the biometric security for increasing of data security.  First unique feature which is found different in every human is Fingerprints; Humans have used fingerprints for personal identification. Presently, most of the organisation use  fingerprint recognition for authentication process  it is one of the oldest and most commonly used biometrics, with high accuracy & generally easy and efficient and fast.  In this paper we propose the idea to use fingerprint recognition along with the user authentication password or to access the data or information. Since the only person who can access information is the person linked to it, no thief can gain access. It also makes your data, very hard for cyber criminals to hack into.


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Data security is a way to ensure that stored data is safe from corruption and that access to it is accordingly controlled. Data security helps to ensure privacy. It also helps protect personal data from theft. Data theft is one that often occurs on global computer networks. It includes criminal acts in the internet world. Chronology of theft is that an intruder enters a system and retrieves essential information without the owner's knowledge. Intruders use data that has been taken for various crimes. Various ways that intruders take to retrieve the data. This action is proven by the amount of internet traffic that is looking for a gap to infiltrate a system. Cryptography is needed to protect essential data. One of the classic algorithms used is Gronsfeld Cipher. This algorithm works by exchanging characters in messages using substitution tables. The key used is a number that determines the shift of plaintext and key. The resulting ciphertext is the result of plaintext substitution with the key table. This algorithm is constructive for users to secure their essential information when it will be sent through a global network.


Sign in / Sign up

Export Citation Format

Share Document