Data Protection Laws Trends: Practice and Debate

1
Hedaia-T-Allah Nabil Abd Al Ghaffar
Hedaia-T-Allah Nabil Abd Al Ghaffar

Send Message

To: Author

GJHSS Volume 21 Issue H9

Article Fingerprint

ReserarchID

4ALR4

Data Protection Laws Trends: Practice and Debate Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Technological advancement changed the way everything is being done, providing extraordinary benefits and low costs. People and governments are increasingly adopting new technologies to achieve better performance and financial savings. However, those benefits do not come at no cost; technological advancements (such as Cloud Computing, Artificial Intelligence, Robotics, Internet of Things,..etc) involve several security challenges that may expose countries’ national securities. The touchstone in this is data. Data has always been central to national security throughout different historical periods. Intelligence agencies’ core of work has always been data; however, the mechanisms of getting and securing data evolved throughout history. Nowadays, the applications of different technologies generate enormous amounts of data that are stored in data centers located in different countries. Data could be traveling across countries and between data centers in a routine process so as to balance loads between data centers of the company. This process contains several security risks because countries lose control and sovereignty over the data generated or collected inside their territories, which exposes the core of nation’s sovereignty and national security.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Hedaia-T-Allah Nabil Abd Al Ghaffar. 2021. \u201cData Protection Laws Trends: Practice and Debate\u201d. Global Journal of Human-Social Science - H: Interdisciplinary GJHSS-H Volume 21 (GJHSS Volume 21 Issue H9): .

Download Citation

Protecting Personal Data in Social Science Research.
Journal Specifications

Crossref Journal DOI 10.17406/GJHSS

Print ISSN 0975-587X

e-ISSN 2249-460X

Keywords
Classification
GJHSS-H Classification: FOR Code: 270707
Version of record

v1.2

Issue date

December 18, 2021

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 1756
Total Downloads: 857
2026 Trends
Research Identity (RIN)
Related Research

Published Article

Technological advancement changed the way everything is being done, providing extraordinary benefits and low costs. People and governments are increasingly adopting new technologies to achieve better performance and financial savings. However, those benefits do not come at no cost; technological advancements (such as Cloud Computing, Artificial Intelligence, Robotics, Internet of Things,..etc) involve several security challenges that may expose countries’ national securities. The touchstone in this is data. Data has always been central to national security throughout different historical periods. Intelligence agencies’ core of work has always been data; however, the mechanisms of getting and securing data evolved throughout history. Nowadays, the applications of different technologies generate enormous amounts of data that are stored in data centers located in different countries. Data could be traveling across countries and between data centers in a routine process so as to balance loads between data centers of the company. This process contains several security risks because countries lose control and sovereignty over the data generated or collected inside their territories, which exposes the core of nation’s sovereignty and national security.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Data Protection Laws Trends: Practice and Debate

Hedaia-T-Allah Nabil Abd Al Ghaffar
Hedaia-T-Allah Nabil Abd Al Ghaffar

Research Journals