Blockchain technology and privacy regulation: Reviewing frictions and synthesizing opportunities

O Akanfe, D Lawong, HR Rao - International Journal of Information …, 2024 - Elsevier
As the application of Blockchain Technology (BCT) grows across several industries, its
inherent decentralized and immutable nature raises some conflicting issues concerning …

[HTML][HTML] A systematic analysis of failures in protecting personal health data: a scoping review

J Pool, S Akhlaghpour, F Fatehi… - International Journal of …, 2024 - Elsevier
Personal health data breaches pose significant challenges to healthcare providers and
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …

An exploratory mixed-methods study on general data protection regulation (gdpr) compliance in open-source software

L Franke, H Liang, S Farzanehpour, A Brantly… - Proceedings of the 18th …, 2024 - dl.acm.org
Background: Governments worldwide are considering data privacy regulations. These laws,
such as the European Union's General Data Protection Regulation (GDPR), require software …

Data privacy concerns and use of telehealth in the aged care context: an integrative review and research agenda

J Pool, S Akhlaghpour, F Fatehi, LC Gray - International Journal of Medical …, 2022 - Elsevier
Objective Effective use of telehealth offers substantial benefits to older persons and aged
care providers. However, data privacy concerns challenge the effective use of telehealth and …

[HTML][HTML] Data-driven business and data privacy: Challenges and measures for product-based companies

F Schäfer, H Gebauer, C Gröger, O Gassmann… - Business Horizons, 2023 - Elsevier
To leverage the opportunities provided by the Internet of Things (IoT), product-based
companies are exploring new data-driven business opportunities. They may miss these …

Information security failures identified and measured–ISO/IEC 27001: 2013 controls ranked based on GDPR penalty case analysis

M Suorsa, P Helo - Information Security Journal: A Global …, 2024 - Taylor & Francis
This paper identifies the failures and impacts of information security, as well as the most
effective controls to mitigate information security risks in organizations. Root cause analysis …

SoK: The Gap Between Data Rights Ideals and Reality

Y Kwon, E Corren, GM Garrido, C Hoofnagle… - arXiv preprint arXiv …, 2023 - arxiv.org
As information economies burgeon, they unlock innovation and economic wealth while
posing novel threats to civil liberties and altering power dynamics between individuals …

Information Security Failures Measured and ISO/IEC 27001: 2022 Controls Ranked by General Data Protection Regulation Penalty Analysis

M Suorsa, P Helo - … 11th International Conference on Cyber and …, 2023 - ieeexplore.ieee.org
Selecting the most important information security controls is a critical and difficult process.
Therefore, the decision-making on how to manage risks and threats has to be supported …

Policy and Infrastructure for Data Privacy and Data Protection in South Indian States: Issues and Prospects

IS Sodhi, M Kaur, J Kaur - Indian Journal of Public …, 2024 - journals.sagepub.com
In the 21st century, data privacy, data protection and cybersecurity have become
challenging issues with increasing cases of data breaches and data disasters. Data privacy …

A Privacy Impact Assessment Method for Organizations Implementing IoT for Occupational Health and Safety

S Stepanovic, D Naous, T Mettler - 2023 - aisel.aisnet.org
Abstract Internet of Things (IoT) technologies are increasingly being integrated into
occupational health and safety (OHS) practices; however, their adoption raises significant …