To see the other types of publications on this topic, follow the link: SPECIAL DATA PROTECTION.

Journal articles on the topic 'SPECIAL DATA PROTECTION'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'SPECIAL DATA PROTECTION.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Anjawai, Namrysilia Buti, F. Yudhi Priyo Amboro, and Rufinus Hotmaulana Hutauruk. "Perbandingan Perlindungan Hukum Terkait Data Pribadi di Indonesia dan Jerman." AL-MANHAJ: Jurnal Hukum dan Pranata Sosial Islam 4, no. 2 (2022): 207–18. http://dx.doi.org/10.37680/almanhaj.v4i2.1791.

Full text
Abstract:
Protection of personal data is a human right that must be given legal protection. However, Indonesia does not yet have special rules governing the protection of personal data and the Personal Data Protection Supervisory Agency. As for when compared to Germany, which has special rules regarding the protection of personal data in full to the Institution that oversees the implementation of the rules for protecting Personal Data. The research method used by the author is a legal comparison method with the type of research being normative research. The author uses secondary data to analyze the resu
APA, Harvard, Vancouver, ISO, and other styles
2

Rahmah, Siti, Darmiwati, and Fitri Wahyuni. "Perlindungan Hukum Terhadap Data Pribadi di Era Big Data." Jurnal Indragiri Penelitian Multidisiplin 4, no. 3 (2024): 43–50. https://doi.org/10.58707/jipm.v4i3.1043.

Full text
Abstract:
The increasingly massive use of information and communication technology has raised concerns about protecting personal data in the era of big data which can harm individuals. Big Data as a form of technological development has not been balanced with developments in legal regulations, so there is no harmony between the use of Big Data and legal regulations related to the protection of personal data. Regulations related to the protection of personal data that already exist in Indonesia cannot guarantee and protect confidentiality and overcome the problem of protecting citizens' personal data. Th
APA, Harvard, Vancouver, ISO, and other styles
3

Lestari, Yuliannova, and M. Misbahul Mujib. "Optimizing Personal Data Protection Legal Framework in Indonesia (a Comparative Law Study)." Supremasi Hukum: Jurnal Kajian Ilmu Hukum 11, no. 2 (2022): 203. http://dx.doi.org/10.14421/sh.v11i2.2729.

Full text
Abstract:
This study explores the protection of personal data-appealing discourse these days. Globally, 132 countries already have special arrangements to protect personal data. The Bill on the Protection of Personal Data in Indonesia is already in the National Legislation Program. Indonesia does not yet have special regulations regarding protecting personal data. Furthermore, it also discussed personal data protection regulations in several countries, both Europe and Asia. This study uses a comparative study that compares personal data protection among countries for further studies on what matters shou
APA, Harvard, Vancouver, ISO, and other styles
4

Pusztahelyi, Réka, and Ibolya Stefán. "Household Social Robots − Special Issues Relating to Data Protection." Acta Universitatis Sapientiae, Legal Studies 11, no. 1 (2022): 95–118. http://dx.doi.org/10.47745/ausleg.2022.11.1.06.

Full text
Abstract:
Household social robots may have massive effects on our everyday lives and raise several concerns on data protection and privacy. The main characteristic of these devices is their capability of building close connections, even emotional bonds between humans and robots. The socially interactive robots exhibit human social characteristics, e.g. express and/or perceive emotions, communicate with high-level dialogue, etc. Affective computing permits development of AI systems that are capable of imitating human traits (emotions, speech, body language). The goal is to gain the trust of humans, to im
APA, Harvard, Vancouver, ISO, and other styles
5

Novikov, Petr Aleksandrovich. "Improving the mechanism of protection of a special category of personal data." Право и политика, no. 2 (February 2025): 65–77. https://doi.org/10.7256/2454-0706.2025.2.73265.

Full text
Abstract:
With the constant growth of digitalization and the use of various electronic platforms, any data leaves behind traces of information that relate to both publicly available and special categories of data. The article discusses the problems of protecting special categories of personal data in the context of digitalization and growing threats to information security. The regulatory framework of the Russian Federation, as well as international standards such as the General Data Protection Regulation, are analyzed in order to identify deficiencies in the protection of highly sensitive data, includi
APA, Harvard, Vancouver, ISO, and other styles
6

Hidayah, Ardhiana, and Marsitiningsih Marsitiningsih. "Aspek Hukum Perlindungan Data Konsumen E-Commerce." Kosmik Hukum 20, no. 1 (2020): 56. http://dx.doi.org/10.30595/kosmikhukum.v20i1.8251.

Full text
Abstract:
Consumer data protection is part of the consumer protection aspect of online transactions or e-commerce activities. This research is a normative legal research based on library research. This study aims to know and understand that personal data is part of the constitutional rights of citizens, so that the state is obliged to protect dignity, respect and integrity of consumers as human beings. The use of any information through electronic media that involves a person's personal data must be done with the consent of the person concerned. The misuse of consumer data is a major problem in legal pr
APA, Harvard, Vancouver, ISO, and other styles
7

Smyr, Daria, and Ekaterina Ulianova. "Legal Issues of Children’s Personal Data Protection." Open Journal for Legal Studies 5, no. 1 (2022): 1–10. http://dx.doi.org/10.32591/coas.ojls.0501.01001s.

Full text
Abstract:
The article deals with the problems of protecting the information privacy of minors in the online gaming sector. The authors analyze core approaches and methods of collection and processing of minors’ personal data, special regulation of data processing of children’s audience in light of some private company’s experience, current liability practices, and also offers a set of legislative measures to improve the effectiveness of children’s data protection both at the international and national level, measures for implementation of data subject rights.
APA, Harvard, Vancouver, ISO, and other styles
8

Bissaliyev, Marlen Sakenovich, and Karimzhan Nurumovich Shakirov. "SONAL DATA OF LEGAL ENTITIES AS A POTENTIAL SPECIAL OBJECT OF LEGAL PROTECTION IN CYBERSPACE." Bulletin of the Institute of Legislation and Legal Information of the Republic of Kazakhstan 2, no. 73 (2023): 42–52. http://dx.doi.org/10.52026/2788-5291_2023_73_2_42.

Full text
Abstract:
The article examines the main approaches to the personal data of legal entities as a potential special object of legal protection in cyberspace. The arguments for and against providing legal protection to legal entities' data of this type are presented. The article proposes its arguments for the impossibility of protecting the personal information of legal entities through the existing system of legal norms regulating the protection of personal data of citizens, based on the recognized theory of the essence of a legal entity, the goals of its identification, and taking into account the ultimat
APA, Harvard, Vancouver, ISO, and other styles
9

Bogosavljević, Mirjana. "Protection of Personal Data in Documents: Application of the Law on Personal Data Protection in Serbia and Abroad." Moderna arhivistika 2, no. 1 (2019): 106–15. http://dx.doi.org/10.54356/ma/2019/ghkv7413.

Full text
Abstract:
The rapid and continuous development of information technologies that encompasses almost all spheres of social life, imposes the key issue of protecting the privacy personal data, the issue of their availability, the way of their storage, processing, transmission and use. The contemporary concept of privacy puts emphasis on information control, security and data protection in computer information systems. Protection of privacy primarily concerns the issue of protection against abuse, fraud, embezzlement and deliberate or accidental damage. This paper covers several key issues: what are the mec
APA, Harvard, Vancouver, ISO, and other styles
10

Harahap, Muhammad Anwar Natama, and Harisman Harisman. "UNESCO'S ROLE REGARDING THE PROTECTION OF CULTURAL OBJECTS RECEIVING SPECIAL PROTECTION." Legal Standing : Jurnal Ilmu Hukum 8, no. 2 (2024): 431–43. http://dx.doi.org/10.24269/ls.v8i2.9490.

Full text
Abstract:
The purpose of this writing is to determine UNESCO's role in protecting cultural objects that receive special protection by formulating a problem, namely: what is UNESCO's role in protecting cultural objects that receive special protection? The type of research used in this research is normative juridical. The data source used in this research uses secondary data. Qualitative analysis was carried out with an empirical starting point. The results of this research show that there are still limitations in safeguarding and regulating cultural heritage. Cultural heritage preservation is very import
APA, Harvard, Vancouver, ISO, and other styles
11

Fang, Ze Nan, Jian Ming Zhou, and Jing Song Zhang. "A Practical Data Security Protection Technology." Advanced Materials Research 846-847 (November 2013): 1620–23. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1620.

Full text
Abstract:
While the flash becomes main data storage medium, user authentication is normally used as the most important method to safeguard the securities of the data. But ii could do nothing to prevent illegal copies of legitimate users and illegal hard copies. This paper introduces a new type of data security protection technology. A method of generating special character code was first proposed. The code is regarded as the flash identity. The authentication of that identity can be applied to effectively recognize the illegal data copies and protect the data security.
APA, Harvard, Vancouver, ISO, and other styles
12

Shaoxue, Jia. "The Administrative Law Protection of Personal Data in China: Issues and Solutions." Administrative law and procedure 12 (December 10, 2020): 64–68. http://dx.doi.org/10.18572/2071-1166-2020-12-64-68.

Full text
Abstract:
Personal data has become an important type of information for Chinese society. The risks and problems of protecting personal data have increased due to the rapid build-up of information. The protection of personal data is not only a sphere of private law, but also part of administrative law in cases where administrative authorities collect, process and use personal data. Administrative legislation is developing rapidly. However, the administrative and legal protection of personal data has even some legal basis, but still faces many difficulties in its implementation. In this regard, it is nece
APA, Harvard, Vancouver, ISO, and other styles
13

Lynskey, Orla. "Grappling with “Data Power”: Normative Nudges from Data Protection and Privacy." Theoretical Inquiries in Law 20, no. 1 (2019): 189–220. http://dx.doi.org/10.1515/til-2019-0007.

Full text
Abstract:
Abstract The power exercised by technology companies is attracting the attention of policymakers, regulatory bodies and the general public. This power can be categorized in several ways, ranging from the “soft power” of technology companies to influence public policy agendas to the “market power” they may wield to exclude equally efficient competitors from the marketplace. This Article is concerned with the “data power” exercised by technology companies occupying strategic positions in the digital ecosystem. This data power is a multifaceted power that may overlap with economic (market) power
APA, Harvard, Vancouver, ISO, and other styles
14

YEMELIANENKO, Karim, and Oleksandr BRYHINETS. "Legal regulation of protection personal data in a special period." Economics. Finances. Law 6/2024, no. - (2024): 72–74. http://dx.doi.org/10.37634/efp.2024.6.15.

Full text
Abstract:
The paper reveals the role and problems of determining the peculiarities of solving the problems of legal regulation of personal data protection in a special period as one of the conditions for the development of a modern democratic society. A detailed study of this issue was conducted, aspects of the regulatory environment and levels of personal data protection in such complex conditions were considered. Acceleration of the scale and intensity of collection and use of personal data by state bodies and economic entities to achieve the goals of their activities, as well as the expansion of oppo
APA, Harvard, Vancouver, ISO, and other styles
15

Sonia Nath. "Cross-Border Data Transfer Under Indian Data Protection Regimes With Special Reference To The Digital Personal Data Protection Act, 2023." Journal of Information Systems Engineering and Management 10, no. 3 (2025): 601–20. https://doi.org/10.52783/jisem.v10i3.5949.

Full text
Abstract:
In an increasingly interconnected world, the seamless flow of cross-border data transfer has become integral to global business operations. It has raised significant legal and regulatory challenges in safeguarding individual privacy and data security. The paper delves into the evolving landscape of cross-border data transfer within the context of India’s data protection regimes, with a special focus on the Digital Personal Data Protection Act 2023 (hereinafter referred to as DPDPA). The Act represents a significant legislative step towards enhancing the protection of personal data in cross-bor
APA, Harvard, Vancouver, ISO, and other styles
16

Dresch, Rafael de Freitas Valle, and José Luiz de Moura Faleiros Júnior. "Special strict civil liability in Brazil's General Data Protection Law." Brazilian Journal of Law, Technology and Innovation 2, no. 2 (2025): 98–128. https://doi.org/10.59224/bjlti.v2i2.98-128.

Full text
Abstract:
This research is focused on the interaction between data protection regulation and civil liability in Brazil, focusing on the General Data Protection Law (LGPD). As technology evolves rapidly, the LGPD addresses new risks and vulnerabilities tied to personal data processing. Drawing on the European GDPR and the Brazilian Consumer Protection Code, we argue that the LGPD introduces a special strict civil liability regime for data controllers and operators. Although some scholars argue for a fault-based approach, our hypothesis contends that the Act’s strict liability standard, grounded in the de
APA, Harvard, Vancouver, ISO, and other styles
17

Ogiela, Lidia, Marek R. Ogiela, and Hoon Ko. "Intelligent Data Management and Security in Cloud Computing." Sensors 20, no. 12 (2020): 3458. http://dx.doi.org/10.3390/s20123458.

Full text
Abstract:
This paper will present the authors’ own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated to the tasks of secret (confidential) data sharing. Such solutions will be presented in an algorithmic form, aimed at solving the tasks of protecting and securing data against unauthorized acquisition. Data-sharing protocols will execute the tasks of securing a special type of information, i.e., data services. The area of data protection will be defi
APA, Harvard, Vancouver, ISO, and other styles
18

Ni, Pin. "Research on Legal Protection of Minors' Data in Digital Age." International Journal of Education and Humanities 8, no. 3 (2023): 53–56. http://dx.doi.org/10.54097/ijeh.v8i3.8319.

Full text
Abstract:
Minors are a special group with immature heart and in the growing stage, whose rights and interests are more vulnerable to the infringement of the Internet information world. For minors, it is necessary to take special consideration and design in the protection rules of the law. Different types of personal information will be distinguished, combined with the specific application situation, to further distinguish the age of consent matters, to maximize the balance between the relatively independent personality of minors and the protection of personal information conflict. The protection of mino
APA, Harvard, Vancouver, ISO, and other styles
19

Delacroix, D., J. P. Guerre, P. Leblanc, and C. Hickman. "Radionuclide and Radiation Protection Data Handbook (2002) (2nd Edition, 2002): Special Issue: Radiation Protection Dosimetry." International Journal of Radioactive Materials Transport 14, no. 1 (2003): 77. http://dx.doi.org/10.1179/rmt.2003.14.1.77.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Comandè, Giovanni, and Giulia Schneider. "Regulatory Challenges of Data Mining Practices: The Case of the Never-ending Lifecycles of ‘Health Data’." European Journal of Health Law 25, no. 3 (2018): 284–307. http://dx.doi.org/10.1163/15718093-12520368.

Full text
Abstract:
Abstract Health data are the most special of the ‘special categories’ of data under Art. 9 of the General Data Protection Regulation (GDPR). The same Art. 9 GDPR prohibits, with broad exceptions, the processing of ‘data concerning health’. Our thesis is that, through data mining technologies, health data have progressively undergone a process of distancing from the healthcare sphere as far as the generation, the processing and the uses are concerned. The case study aims thus to test the endurance of the ‘special category’ of health data in the face of data mining technologies and the never-end
APA, Harvard, Vancouver, ISO, and other styles
21

Pakpahan, Elvira Fitriyani, Lionel Ricky Chandra, and Ananta Aria Dewa. "PERLINDUNGAN HUKUM TERHADAP DATA PRIBADI DALAM INDUSTRI FINANCIAL TECHNOLOGY." Veritas et Justitia 6, no. 2 (2020): 298–323. http://dx.doi.org/10.25123/vej.3778.

Full text
Abstract:
It came to the author’s attention that personal data collected or appropriated in the course of FinTech industry especially those that related to FinTech Peer to Peer Lending services are prone to misuse. The author, after perusing the prevailing laws regarding FinTech industry, concludes that a well-functioning system of rules has been put in place to regulate this industry. However, what is lacking is sufficient guarantee or protection of consumer’s personal data. Available is the option to use a weak (administrative, civil or penal) sanction against alleged misuse or misappropriation of per
APA, Harvard, Vancouver, ISO, and other styles
22

Dir, I. Yu. "Special institutions of the European Union." Analytical and Comparative Jurisprudence, no. 3 (July 22, 2024): 584–88. http://dx.doi.org/10.24144/2788-6018.2024.03.99.

Full text
Abstract:
The article summarizes the activities of specialized institutions of the European Union. It was found that according to the founding treaties of the EU, there are seven main institutions: the European Parliament, the European Council, the Council of the European Union, the European Commission, the Court of Justice of the European Union, the European Central Bank and the European Court of Auditors, which have both executive and legislative powers. However, in addition to the main institutions, a number of auxiliary institutions operate on the territory of the European Union, among which the Eur
APA, Harvard, Vancouver, ISO, and other styles
23

Kovačević, Zoran, and Aida Šeta Čavčić. "PROTECTION AND TRANSFER OF SECRET DATA IN BOSNIA AND HERZEGOVINA WITH A FOCUS ON INTERNATIONAL OPERATIONAL POLICE COOPERATION." Zaštita i sigurnost 1, no. 7 (2024): 1–28. http://dx.doi.org/10.70329/2744-2403.2024.1.7.1.

Full text
Abstract:
In this paper, the basic terms related to the protection and transfer of secret data will be clarified and defined through an overview of the Law on Protection of Secret Data of Bosnia and Herzegovina, with special reference to international operational police cooperation. Considering that secret data differ from other data in that they have special significance for a certain country, are obtained by special methods, and are commonly used by leading political structures in making political decisions, etc., there is a need to address this topic. The paper will use the descriptive method of key
APA, Harvard, Vancouver, ISO, and other styles
24

Kuźnicka-Błaszkowska, Dominika. "Protecting Children’s Personal Data under General Data Protection Regulation and California Consumer Privacy Act in Relation to Information Society Services – European Perspective." Przegląd Prawa Konstytucyjnego 70, no. 6 (2022): 487–98. http://dx.doi.org/10.15804/ppk.2022.06.36.

Full text
Abstract:
The protection of children’s personal data as part of their right to privacy and information autonomy is extremely important. Year in, year out, the number of children using the Internet and services increases. This means that there need to be special tools and techniques established to protect children’s right to privacy. It is particularly important when children use services provided by companies after other, than local, jurisdiction. As they may not fully understand risk associated with exposing themselves in the Intranet, this is crucial for governmental authorities to ensure that childre
APA, Harvard, Vancouver, ISO, and other styles
25

Ayu Silvi, Ferina Widyawati, and Anom Wahyu Asmorojati. "The urgency of establishing a special agency of personal data protection and supervision to ensure the Indonesian citizens’ privacy rights." Borobudur Law Review 4, no. 2 (2022): 110–22. http://dx.doi.org/10.31603/burrev.7184.

Full text
Abstract:
Personal Data Protection is the right of humans, constitutionally the state’s obligation to respect, fulfill, and protect as mandates in Article 28 C paragraph (1) of the 1945 Constitution. However, due to the massive data leaks prove that the rights have not been protected. The research is aimed to know the legal protection for the Indonesian citizens’ personal data by establishing a special agency and intended to find the ideal format of the special agency for personal data protection and supervision to be implemented in Indonesia. The research methods used is the juridical normative through
APA, Harvard, Vancouver, ISO, and other styles
26

Ngompat, Yohanes Leonardus, and Mary Grace Megumi Maran. "LEGAL DEVELOPMENT AND URGENCY OF PERSONAL DATA PROTECTION IN INDONESIA." JILPR Journal Indonesia Law and Policy Review 5, no. 3 (2024): 627–35. http://dx.doi.org/10.56371/jirpl.v5i3.284.

Full text
Abstract:
This research aims to know and analyze the development of personal data protection law and to know and analyze the urgency of personal data protection in Indonesia. This research is normative juridical research using secondary data. The approaches used are legislative and historical approaches. The data collected is then analyzed qualitatively. Based on the results of the research, it is known that the laws and regulations on personal data protection continue to develop from time to time. The regulation begins with the inclusion of Article 28 G Paragraph (1) in the 1945 Constitution which beco
APA, Harvard, Vancouver, ISO, and other styles
27

Sasea, Enny Martha, and Alice Ance Bonggoibo. "Social Justice and Human Rights: Legal Protection of Indigenous Papuan Labour in The Framework of Papua's Special Autonomy." International Journal of Religion 5, no. 11 (2024): 5604–13. http://dx.doi.org/10.61707/t5rcg793.

Full text
Abstract:
This article assesses the effectiveness of labor regulations in protecting the rights of indigenous workers in Indonesia and identifies barriers to their implementation. The study uses a qualitative approach with literature and policy analysis, as well as secondary data from official documents and government reports. The results show that although Indonesia's labor regulations theoretically offer good protection, their implementation faces challenges such as lack of access to information, weak law enforcement, discrimination, and limited infrastructure. To improve legal protections, coordinati
APA, Harvard, Vancouver, ISO, and other styles
28

Spitsyna, Hanna, Anton Polianskyi, and Yuliia Khlystun. "Regarding the Issue of Personal data Protection of Employees in Conditions of Digital Transformation." Archives of Criminology and Forensic Sciences 6, no. 2 (2021): 45–52. http://dx.doi.org/10.32353/acfs.6.2022.02.

Full text
Abstract:
the specified article examines personal data, their list and history of occurrence, practice of application, their extension to labor relations, and guarantees of protection of personal data of the employee. It is noted that the personal data of an employee is a narrower concept than personal data and in connection with the lack of legal regulation of the protection of personal data of employees during their processing, urgent issues arise that require legal regulation by special legal norms, taking into account the practice of the EcHR and European experience. In addition, in the case of exer
APA, Harvard, Vancouver, ISO, and other styles
29

Rapajić, Milan, and Dejan Logarušić. "Special ombudsmen with reference to the position of the Commissioner for Information of Public Importance and Protection of Personal Data." Pravo - teorija i praksa 41, no. 4 (2024): 82–101. https://doi.org/10.5937/ptp2404082r.

Full text
Abstract:
In addition to the expansion of general-type ombudsmen, it has been recognized that, for the protection of citizens' rights, it is necessary to have the so-called specialized ombudsmen, who focus their activities on administrative oversight and the protection of citizens' rights in specific areas of social life. Thus, there are public law ombudsmen of an external type, internal ombudsmen, and private law ombudsmen. This paper pays particular attention to the position of the Commissioner for Information of Public Importance and Protection of Personal Data in the Republic of Serbia, who is, in f
APA, Harvard, Vancouver, ISO, and other styles
30

Hajnal, Zsolt, and Fanni Tóth. "Protection of Children’s Personal Data and Risks Posed by Smart Toys." Acta Universitatis Sapientiae, Legal Studies 12, no. 1 (2023): 43–59. https://doi.org/10.47745/ausleg.2023.12.1.04.

Full text
Abstract:
Data protection and consumer protection organizations have identified a number of data protection risks in connection with smart children’s toys that use online services. This study presents the EU legislation that serves to protect the personal data of children using smart toys, with particular regard to the special provisions for children, and it also points out the extent to which these laws oblige the relevant economic actors to establish adequate protection. Examining all of this shows that the current legal framework is only able to manage the risks to a limited extent.
APA, Harvard, Vancouver, ISO, and other styles
31

Ciosek, Ireneusz, Zbigniew Kuźniar, and Magdalena Kempa. "Psychological Methods of Eliciting Statements. Personal Security Versus Data Objectivity." Security Dimensions 26, no. 26 (2018): 116–29. http://dx.doi.org/10.5604/01.3001.0012.7244.

Full text
Abstract:
The article describes the way of conducting the perfect interrogation, with particular protection of suspect’s psychological comfort and protecting him from stress, in order to get the truth instead of the false confession of guilt. The elements influencing the professional and objective conduct of interrogations were presented, with special consideration given to flexibility of approaching a suspect and handling the given case. The paper also discusses forbidden interrogation techniques and describes the nine steps of an effective interrogation of F.E. Inbau, J.E. Reid and J.P. Buckley.
APA, Harvard, Vancouver, ISO, and other styles
32

Holubnycha, S. "Excursion service nature protection." Visnyk of the Lviv University. Series Geography 2, no. 43 (2013): 20–25. http://dx.doi.org/10.30970/vgg.2013.43.1660.

Full text
Abstract:
Environmental aspects of the organization of excursions have been considered. The data on the benefits of choosing tours of natural areas in the Donetsk region have been given. Key words: excursion, excursions, natural areas of special protection, the Nature Reserve Fund
APA, Harvard, Vancouver, ISO, and other styles
33

Skrop, Adrienn. "DATALEAK: Data Leakage Detection System." MACRo 2015 1, no. 1 (2015): 113–24. http://dx.doi.org/10.1515/macro-2015-0011.

Full text
Abstract:
AbstractData leakage is an uncontrolled or unauthorized transmission of classified information to the outside. It poses a serious problem to companies as the cost of incidents continues to increase. Many software solutions were developed to provide data protection. However, data leakage detection systems cannot provide absolute protection. Thus, it is essential to discover data leakage as soon as possible. The purpose of this research is to design and implement a data leakage detection system based on special information retrieval models and methods. In this paper a semantic informationretriev
APA, Harvard, Vancouver, ISO, and other styles
34

Pestana, Helena, Catarina Domingues Domingues David, and Mónica Alexandra Miranda Pereira. "Data Security and Protection in Nursing." Pensar Enfermagem - Revista Científica | Journal of Nursing 28, no. 1 (2024): 82–88. http://dx.doi.org/10.56732/pensarenf.v28i1.322.

Full text
Abstract:
Introduction New technologies supported by digital solutions have been developed in both public and private health systems. In healthcare, these technologies enable surveillance, screening, prevention, treatment, and rehabilitation, among other activities. Given the importance and value of health data, we questioned the validity of collecting personal data (its amount and type), its processing, sharing, and subsequent use for purposes other than those for which it was initially collected. These concerns raise ethical-legal issues and the need to understand the complexity of data security and p
APA, Harvard, Vancouver, ISO, and other styles
35

Nešić, Ana. "Data protection about children on the Internet." Savremene studije bezbednosti, no. 1 (2023): 29–48. http://dx.doi.org/10.5937/ssb202301029n.

Full text
Abstract:
Digitization of data has facilitated everyday communication and data exchange, accelerated business, but has also enabled different forms of data abuse in cyberspace. Malicious subjects can easily, by using new technologies, come into possession of various data about Internet users. The data they mainly access is usually collected without the knowledge of the users. Perpertrators often use insufficient information of the users about potential dangers on the Internet. Children spend a large part of their time on the Internet, but they usually are not aware of dangers they can come across while
APA, Harvard, Vancouver, ISO, and other styles
36

Shen, Jian, Jun Shen, Chin-Feng Lai, Qi Liu, and Tianqi Zhou. "Cloud Based Data Protection in Anonymously Controlled SDN." Security and Communication Networks 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/9845426.

Full text
Abstract:
Nowadays, Software Defined Network (SDN) develops rapidly for its novel structure which separates the control plane and the data plane of network devices. Many researchers devoted themselves to the study of such a special network. However, some limitations restrict the development of SDN. On the one hand, the single controller in the conventional model bears all threats, and the corruption of it will result in network paralysis. On the other hand, the data will be increasing more in SDN switches in the data plane, while the storage space of these switches is limited. In order to solve the ment
APA, Harvard, Vancouver, ISO, and other styles
37

Setiawati, Diana, Tyas Permata Dewi, and Zulfiana Ayu Astutik. "Personal Data Protection Vulnerabilities In Cybercrime Sniffing Bank Account Break-Ins." Yurispruden: Jurnal Fakultas Hukum Universitas Islam Malang 7, no. 2 (2024): 184–99. http://dx.doi.org/10.33474/yur.v7i2.21184.

Full text
Abstract:
Cybercrime, particularly Sniffing, poses a hazard in the digital age since attackers illegally breach customers' data, resulting in losses and widespread concern. This study aimed to clarify the legal protections available to victims of sniffing cybercrimes and the banks' obligations to their clientele. This study includes primary, secondary, and tertiary legal materials with a normative legal approach. The analytical method produced information through descriptive analysis using qualitative methodologies. The research findings demonstrated that, despite the lack of a required special institut
APA, Harvard, Vancouver, ISO, and other styles
38

O. E., Rubtsov, Norkina A. N., and Chicherov K.A. "Information Protection Tools for Android-based Mobile Devices." KnE Social Sciences 3, no. 2 (2018): 235. http://dx.doi.org/10.18502/kss.v3i2.1548.

Full text
Abstract:
Presently, the issue of protecting information and personal data contained in mobile devices is of vital importance. The use of cutting-edge powerful smartphones presented by manufacturers as a substitute for personal computers, laptops and tablets, stresses the need for utilizing both built-in free information protection features and special antivirus software manufactured by recognized global developers. The article reveals the effectiveness of using built-in information protection tools for Android-based mobile devices and presents a comparative characteristic of similar tools applied with
APA, Harvard, Vancouver, ISO, and other styles
39

Samahalska, Y. "Personal data protection in the Internet." Uzhhorod National University Herald. Series: Law 2, no. 82 (2024): 259–63. http://dx.doi.org/10.24144/2307-3322.2024.82.2.41.

Full text
Abstract:
A personal daily communication is connected with giving and receiving a large amount of information. A common visit to a website can provide its owner with information about its users (cookies). A registration will provide the owner with a confidential information. In this view, it became necessary to protect a person and to regulate a separate subtype of such information called “personal data”. The concept of “personal data” is not new for Ukraine. The Law “On Protection of Personal Data” was adopted in 2010, however, the practice of its realization shows that the subjects of relations relate
APA, Harvard, Vancouver, ISO, and other styles
40

Hasnati, Hasnati, and Puti Mayang Seruni. "Consumer’s Personal Data Protection in the Digital Era." Jurnal Ius Constituendum 9, no. 1 (2024): 20–35. https://doi.org/10.26623/jic.v9i1.8061.

Full text
Abstract:
This research aimed to analyze the legislative arrangements related to the protection of personal data, especially for consumers. This research is important because it discusses the potential misuse of personal data belonging to consumers. The research was conducted normatively and analyzed qualitatively, and the results of this research on personal data protection in Indonesia are described descriptively. This research has resulted in new findings in the form of protection in the latest regulation and also challenges to enforce the regulation. So that these findings can be used as material fo
APA, Harvard, Vancouver, ISO, and other styles
41

Por, Lip Yee, Jing Yang, Chin Soon Ku, and Abdullah Ayub Khan. "Special Issue on Cryptography and Information Security." Applied Sciences 13, no. 10 (2023): 6042. http://dx.doi.org/10.3390/app13106042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Saraswati, Rika, Petrus Soerjowinoto, and Emanuel Boputra. "PERLINDUNGAN HUKUM KHUSUS BAGI ANAK DALAM MASA PANDEMI COVID-19 OLEH DP3A KOTA SEMARANG." Jurnal Jendela Hukum 10, no. 1 (2023): 1–22. http://dx.doi.org/10.24929/jjh.v10i1.2433.

Full text
Abstract:
Many Indonesian children lost their parents who died because of Covid-19. These children need special protection and have rights that must be fulfilled by governments (either central or local). The aims of this study are to: 1) find out the role of the Semarang City Women's Empowerment and Child Protection Service (DP3A) in carrying out special protection for children whose parents died due to the COVID-19 pandemic and 2) find out the obstacles that are faced by DP3A in implementing this special protection. This research is a non-doctrinal (empirical) legal research and the data used are prima
APA, Harvard, Vancouver, ISO, and other styles
43

Klyukina, Dina V., and Fedor K. Romanov. "Blockchain technology as a means of protecting personal data." Vestnik BIST (Bashkir Institute of Social Technologies), no. 1(62) (March 29, 2024): 11–16. http://dx.doi.org/10.47598/2078-9025-2024-1-62-11-16.

Full text
Abstract:
In the modern world, each of us is inseparable from his personal data, which is essentially a reflection of a person in information processes. Obtaining government, medical or banking services, online shopping and much more is impossible to imagine without the use of personal data. Given this, the issue of protecting such data is extremely acute. The purpose of scientific article is to describe blockchain technology and consider the prospects of its application for the protection of personal data. Special attention is paid to the consequences of personal data breach. In addition, the article d
APA, Harvard, Vancouver, ISO, and other styles
44

Nurhasanah, Nurhasanah, and Indra Rahmatullah. "Financial Technology and the Legal Protection of Personal Data: The Case of Malaysia and Indonesia." Al-Risalah: Forum Kajian Hukum dan Sosial Kemasyarakatan 20, no. 2 (2020): 197–214. http://dx.doi.org/10.30631/alrisalah.v20i2.602.

Full text
Abstract:
The presence of digital technology brings significant changes in many aspects of human life, including the economy and financial services. The rapid development of financial technology (fintech) is being responded quickly by many countries including Indonesia and Malaysia. Not only conventional fintech, but Sharia fintech is also developing significantly in both countries. This phenomenon is caused by the efficiency and ease of fintech. However, fintech in Indonesia is not followed by a comprehensive protection of personal data. The absence of special regulation on the protection of personal d
APA, Harvard, Vancouver, ISO, and other styles
45

Nurhasanah, Nurhasanah, and Indra Rahmatullah. "Financial Technology and the Legal Protection of Personal Data: The Case of Malaysia and Indonesia." Al-Risalah 20, no. 2 (2020): 197–214. http://dx.doi.org/10.30631/al-risalah.v20i2.602.

Full text
Abstract:
The presence of digital technology brings significant changes in many aspects of human life, including the economy and financial services. The rapid development of financial technology (fintech) is being responded quickly by many countries including Indonesia and Malaysia. Not only conventional fintech, but Sharia fintech is also developing significantly in both countries. This phenomenon is caused by the efficiency and ease of fintech. However, fintech in Indonesia is not followed by a comprehensive protection of personal data. The absence of special regulation on the protection of personal d
APA, Harvard, Vancouver, ISO, and other styles
46

Flint, Jason. "Do Social Media Platforms Always Use Personal Data Lawfully?" Global Privacy Law Review 2, Issue 3 (2021): 212–18. http://dx.doi.org/10.54648/gplr2021026.

Full text
Abstract:
The article considers the principal concerns posed by the increasing influence of social media and analyses the potential and actual legal bases relied upon by selected platforms for the processing of personal data. Special reference is made to the EU General Data Protection Regulation (Regulation (EU) 2016/679). The article concludes that the application of those legal bases may be questionable in certain situations and that platforms may struggle to achieve the transparency and proportionality required by applicable rules. Social Media, Data Protection, Legal Basis, GDPR
APA, Harvard, Vancouver, ISO, and other styles
47

Friedewald, M., and S. Gutwirth. "Introduction to special section: Governing privacy and data protection issues of emerging technologies." Science and Public Policy 40, no. 6 (2013): 705–7. http://dx.doi.org/10.1093/scipol/sct094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Eliantonio, Mariolina. "International Personal Data Transfers and Effective Redress: Concluding Remarks." Review of European Administrative Law 16, no. 1 (2023): 103–8. http://dx.doi.org/10.7590/187479823x16800083010301.

Full text
Abstract:
This concluding piece aims to bring together the various reflections contained in the special issue focused on the right to an effective remedy with specific reference to data protection legislation and international personal data transfers. The piece shows how the contributions to the special issue have unveiled an important function of Article 47, that of 'value exporter' of the EU. However, they have also highlighted the conceptual and definitional challenges and persisting uncertainties surrounding the use of Article 47 with respect to international data transfers.
APA, Harvard, Vancouver, ISO, and other styles
49

Mohiqi, Mohammad Mustafa. "Personal Data Protection in the Iranian Legal System." Journal of Politics and Law 16, no. 3 (2023): 10. http://dx.doi.org/10.5539/jpl.v16n3p10.

Full text
Abstract:
Currently, legislators are paying special attention to the personal data of individuals since these data can be processed, transferred quickly and are available in cyberspace. The purpose of this article is to describe the process by which Iran's legal system protects personal information and privacy. There is no specific law in Iran regarding the protection of personal data, and therefore this data should be protected in accordance with other laws. While there is no specific legal sanction in the Iranian legal system for the violation of data privacy, it is not without legal consequen
APA, Harvard, Vancouver, ISO, and other styles
50

Chudzikiewicz, Jan, and Janusz Furtak. "Cryptographic Protection of Removable Media with a USB Interface for Secure Workstation for Special Applications." Journal of Telecommunications and Information Technology, no. 3 (September 30, 2012): 22–31. http://dx.doi.org/10.26636/jtit.2012.3.1275.

Full text
Abstract:
This paper describes one of the essential elements of Secure Workstation for Special Applications (SWSA) to cryptographic protection of removable storage devices with USB interface. SWSA is a system designed to process data classified to different security domains in which the multilevel security is used. The described method for protecting data on removable Flash RAM protects data against unauthorized access in systems processing the data, belonging to different security domains (with different classification levels) in which channel the flow of data must be strictly controlled. Only user aut
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!