The Compliance of Governance on Family Data Protection Regulation

Authors

  • Ni Komang Sutrisni Faculty of Law, Universitas Mahasaraswati Denpasar, Denpasar, Indonesia
  • Putu Angga Pratama Sukma Faculty of Law, Universitas Mahasaraswati Denpasar, Denpasar, Indonesia
  • Rahimah Embong Faculty of Islamic Contemporary Studies, Universiti Sultan Zainal Abidin, Gong Badak, Malaysia
  • Khanlar Haydarov Department of Public Administration, Baku Engineering University, Baku, Azerbaijan

DOI:

https://doi.org/10.53955/jhcls.v4i3.293

Keywords:

Data, Digital, Family, Protection, Regulation

Abstract

Digital transformation has changed the way family data is managed and stored. The vulnerability of family data has become a serious concern due to the increase in data breach incidents. This research aims to analyze public compliance with family data protection regulations and the ideality of government governance regulations regarding family data protection regulations. This research uses normative legal research methods to analyze the comparison of family data privacy protection regulations between Indonesia and England. This research examines various legal guidelines and policies by applying legislative techniques and a conceptual approach. The legal system theory is used as an analytical framework to evaluate the effectiveness of regulations, law enforcement, and legal culture's influence on public compliance. Data was collected through a literature review of primary and secondary sources, including documents, archives, books, and scientific research findings. The research results show First, that family data protection regulations in England are first more standardized with a higher level of public compliance than in Indonesia. Secondly, Indonesia still faces challenges such as the weak bargaining position of data subjects, the absence of clear guidelines for data controllers, and the need for an independent oversight authority. This research recommends regulatory improvements, the establishment of competent authorities, and enhanced public education to strengthen Indonesia's personal data protection system, particularly family data.

References

Abdillah, Abdillah, Ida Widianingsih, Rd Ahmad Buchari, and Heru Nurasa, ‘Big Data Security & Individual (Psychological) Resilience: A Review of Social Media Risks and Lessons Learned from Indonesia’, Array, 21 (2024), 100336 https://doi.org/https://doi.org/10.1016/j.array.2024.100336

Alhadidi, Ismaeel, Aman Nweiran, and Ghofran Hilal, ‘The Influence of Cybercrime and Legal Awareness on the Behavior of University of Jordan Students’, Heliyon, 10.12 (2024), e32371 https://doi.org/10.1016/j.heliyon.2024.e32371

Antonius, Andrean, Yuni Ginting, Clarissa Mulia, Sharron Syallomeita, Dennis Taweranusa, Gabriel Daffa, and others, ‘Sosialisasi Perbandingan Hukuman Tindak Pidana Pembukaan Rahasia Data Pribadi Negara Indonesia Dan Inggris’, Jurnal Pengabdian West Science, 3.04 (2024), 383–94 https://doi.org/10.58812/jpws.v3i04.1080

Aujla, Navneet, Helen Frost, Bruce Guthrie, Barbara Hanratty, Eileen Kaner, Amy O’Donnell, and others, ‘A Comparative Overview of Health and Social Care Policy for Older People in England and Scotland, United Kingdom (UK)’, Health Policy, 132.April (2023), 104814 https://doi.org/10.1016/j.healthpol.2023.104814

Ayu Palar, Miranda Risang, Laina Rafianti, and Helitha Novianty Muchtar, ‘Inclusive Rights to Protect Communal Intellectual Property: Indonesian Perspective on Its New Government Regulation’, Cogent Social Sciences, 9.2 (2023), 1–19 https://doi.org/10.1080/23311886.2023.2274431

Balboni, Paolo, and Kate Francis, ‘Chapter 55 - Personal Privacy Policies’, in Computer and Information Security Handbook (Fourth Edition), ed. by John R Vacca, Fourth Edition (Morgan Kaufmann, 2025), pp. 907–16 https://doi.org/https://doi.org/10.1016/B978-0-443-13223-0.00055-2

Balboni, Prof. Dr. Paolo, and Kate Elizabeth Francis, ‘Data Ethics and Digital Sustainability: Bridging Legal Data Protection Compliance and ESG for a Responsible Data-Driven Future’, Journal of Responsible Technology, 2024, 100099 https://doi.org/https://doi.org/10.1016/j.jrt.2024.100099

Boothby, Neil, and Lindsay Stark, ‘Data Surveillance in Child Protection Systems Development: An Indonesian Case Study’, Child Abuse and Neglect, 35.12 (2011), 993–1001 https://doi.org/10.1016/j.chiabu.2011.09.004

Boychuk, Vasiliy, Kirill Sukharev, Daniil Voloshin, and Vladislav Karbovskii, ‘An Exploratory Sentiment and Facial Expressions Analysis of Data from Photo-Sharing on Social Media: The Case of Football Violence’, Procedia Computer Science, 80 (2016), 398–406 https://doi.org/10.1016/j.procs.2016.05.340

Calvi, Alessandra, ‘Data Protection Impact Assessment under the EU General Data Protection Regulation: A Feminist Reflection’, Computer Law & Security Review, 53 (2024), 105950 https://doi.org/https://doi.org/10.1016/j.clsr.2024.105950

Chatsuwan, Panchapawn, Tanawat Phromma, Navaporn Surasvadi, and Suttipong Thajchayapong, ‘Personal Data Protection Compliance Assessment: A Privacy Policy Scoring Approach and Empirical Evidence from Thailand’s SMEs’, Heliyon, 9 (2023), 1–30 https://doi.org/https://doi.org/10.1016/j.heliyon.2023.e20648

Chelioudakis, Eleftherios, ‘Unpacking AI-Enabled Border Management Technologies in Greece: To What Extent Their Development and Deployment Are Transparent and Respect Data Protection Rules?’, Computer Law & Security Review, 53 (2024), 105967 https://doi.org/https://doi.org/10.1016/j.clsr.2024.105967

Chen, Meng, ‘Developing China’s Approaches to Regulate Cross-Border Data Transfer:Relaxation and Integration’, Computer Law & Security Review, 54 (2024), 105997 https://doi.org/https://doi.org/10.1016/j.clsr.2024.105997

Choi, Daeeun Daniel, and Paul Benjamin Lowry, ‘Balancing the Commitment to the Common Good and the Protection of Personal Privacy: Consumer Adoption of Sustainable, Smart Connected Cars’, Information & Management, 61.1 (2024), 103876 https://doi.org/https://doi.org/10.1016/j.im.2023.103876

Christensen, Tanja Kammersgaard, ‘Pre-Installed Cameras in Vehicles—New Technology from a Data Protection Law Perspective’, Computer Law & Security Review, 53 (2024), 105980 https://doi.org/https://doi.org/10.1016/j.clsr.2024.105980

Conca, Silvia De, ‘The Present Looks Nothing like the Jetsons: Deceptive Design in Virtual Assistants and the Protection of the Rights of Users’, Computer Law & Security Review, 51 (2023), 105866 https://doi.org/https://doi.org/10.1016/j.clsr.2023.105866

Costantini, Federico, and Giada Soncini, ‘Chapter 14 - Healthcare Data Governance in the EU: Main Challenges in Personal Data Protection’, in Endorobotics, ed. by Luigi Manfredi (Academic Press, 2022), pp. 319–36 https://doi.org/https://doi.org/10.1016/B978-0-12-821750-4.00014-1

Custers, Bart, ‘A Fair Trial in Complex Technology Cases: Why Courts and Judges Need a Basic Understanding of Complex Technologies’, Computer Law & Security Review, 52 (2024), 105935 https://doi.org/10.1016/j.clsr.2024.105935

Custers, Bart, and Gianclaudio Malgieri, ‘Priceless Data: Why the EU Fundamental Right to Data Protection Is at Odds with Trade in Personal Data’, Computer Law & Security Review, 45 (2022), 105683 https://doi.org/https://doi.org/10.1016/j.clsr.2022.105683

van Daalen, O.L., ‘The Right to Encryption: Privacy as Preventing Unlawful Access’, Computer Law & Security Review, 49 (2023), 105804 https://doi.org/10.1016/j.clsr.2023.105804

Daudén-Esmel, Cristòfol, Jordi Castellà-Roca, and Alexandre Viejo, ‘Blockchain-Based Access Control System for Efficient and GDPR-Compliant Personal Data Management’, Computer Communications, 214 (2024), 67–87 https://doi.org/https://doi.org/10.1016/j.comcom.2023.11.017

Demetzou, Katerina, Gabriela Zanfir-Fortuna, and Sebastião Barros Vale, ‘The Thin Red Line: Refocusing Data Protection Law on ADM, a Global Perspective with Lessons from Case-Law’, Computer Law & Security Review, 49 (2023), 105806 https://doi.org/https://doi.org/10.1016/j.clsr.2023.105806

Demir, Esra, ‘The Protection of Human Biodata: Is There Any Role for Data Ownership?’, Computer Law and Security Review, 51.August 2022 (2023), 105905 https://doi.org/10.1016/j.clsr.2023.105905

Dewitte, Pierre, ‘Better Alone than in Bad Company: Addressing the Risks of Companion Chatbots through Data Protection by Design’, Computer Law and Security Review, 54.July (2024), 106019 https://doi.org/10.1016/j.clsr.2024.106019

Dwivedi, Yogesh K., D. Laurie Hughes, Crispin Coombs, Ioanna Constantiou, Yanqing Duan, John S. Edwards, and others, ‘Impact of COVID-19 Pandemic on Information Management Research and Practice: Transforming Education, Work and Life’, International Journal of Information Management, 55.July (2020), 102211 https://doi.org/10.1016/j.ijinfomgt.2020.102211

Erdos, Dr David, ‘Identification in Personal Data: Authenticating the Meaning and Reach of Another Broad Concept in EU Data Protection Law’, Computer Law & Security Review, 46 (2022), 105721 https://doi.org/https://doi.org/10.1016/j.clsr.2022.105721

Fantonelli, Miliane dos Santos, Wagner Luiz Zanotto, Fabiana Magarrote Fernandes de Melo, Ianka Cristina Celuppi, Thaisa Cardoso Lacerda, Fernanda Maia de Oliveira, and others, ‘Organization and Management of Sensitive Personal Health Data in Electronic Systems in Countries with Implemented Data Protection Laws, Lessons to Brazil: A Brief Systematic Review’, Computer Law and Security Review, 51 (2023), 105872 https://doi.org/10.1016/j.clsr.2023.105872

Farhad, Mohsin Ali, ‘Consumer Data Protection Laws and Their Impact on Business Models in the Tech Industry’, Telecommunications Policy, 48.9 (2024), 102836 https://doi.org/https://doi.org/10.1016/j.telpol.2024.102836

Febbrajo, Alberto, Law, Legal Culture and Society, Law, Legal Culture and Society, 2018 https://doi.org/10.4324/9781351040341

Guamán, Danny S, David Rodriguez, Jose M del Alamo, and Jose Such, ‘Automated GDPR Compliance Assessment for Cross-Border Personal Data Transfers in Android Applications’, Computers & Security, 130 (2023), 103262 https://doi.org/https://doi.org/10.1016/j.cose.2023.103262

Guo, Shuai, and Xiang Li, ‘Cross-Border Data Flow in China: Shifting from Restriction to Relaxation?’, Computer Law & Security Review, 56 (2025), 106079 https://doi.org/https://doi.org/10.1016/j.clsr.2024.106079

Haarberg, Frøydis Lønborg, ‘What Do We Know about Children’s Representation in Child Protection Decisions? A Scoping Review’, Children and Youth Services Review, 160.March (2024) https://doi.org/10.1016/j.childyouth.2024.107588

Hu, Zhangxiang, ‘Layered Network Protocols for Secure Communications in the Internet of Things’, University of Oregon: Eugene, OR, USA, 2021

Hutomo, Priyo, and Markus Marselinus Soge, ‘Perspektif Teori Sistem Hukum Dalam Pembaharuan Pengaturan Sistem Pemasyarakatan Militer’, Legacy: Jurnal Hukum Dan Perundang-Undangan, 1.1 (2021), 46–68 https://doi.org/10.21274/legacy.2021.1.1.46-68

Imakura, Akira, Tetsuya Sakurai, Yukihiko Okada, Tomoya Fujii, Teppei Sakamoto, and Hiroyuki Abe, ‘Non-Readily Identifiable Data Collaboration Analysis for Multiple Datasets Including Personal Information’, Information Fusion, 98 (2023), 101826 https://doi.org/https://doi.org/10.1016/j.inffus.2023.101826

Ismail, Hamzah, Finley Febiyanto, Kevin, and Jurike V. Moniaga, ‘Methods to Prevent Privacy Violations on the Internet on the Personal Level in Indonesia’, Procedia Computer Science, 216.2022 (2022), 650–54 https://doi.org/10.1016/j.procs.2022.12.180

Isus, Raichuk, Kateryna Kolesnikova, Iulia Khlevna, Timinskyi Oleksandr, and Kubiavka Liubov, ‘Development of a Model of Personal Data Protection in the Context of Digitalization of the Educational Sphere Using Information Technology Tools’, Procedia Computer Science, 231 (2024), 347–52 https://doi.org/https://doi.org/10.1016/j.procs.2023.12.215

Kant, Immanuel, Kant: The Metaphysics of Morals (Cambridge University Press, 2017)

Karjalainen, Tuulia, ‘The Battle of Power: Enforcing Data Protection Law against Companies Holding Data Power’, Computer Law and Security Review, 47.August 2018 (2022), 105742 https://doi.org/10.1016/j.clsr.2022.105742

Kaya, G.K., S. Ustebay, J. Nixon, C. Pilbeam, and M. Sujan, ‘Exploring the Impact of Safety Culture on Incident Reporting: Lessons Learned from Machine Learning Analysis of NHS England Staff Survey and Incident Data’, Safety Science, 166 (2023), 106260 https://doi.org/10.1016/j.ssci.2023.106260

Kollnig, Konrad, Lu Zhang, Jun Zhao, and Nigel Shadbolt, ‘Privacy in Chinese IOS Apps and Impact of the Personal Information Protection Law’, Computer Law and Security Review, 55.February 2020 (2024), 106041 https://doi.org/10.1016/j.clsr.2024.106041

Kuang, Linghong, Wenlong Shi, and Jing Zhang, ‘Hierarchical Privacy Protection Model in Advanced Metering Infrastructure Based on Cloud and Fog Assistance’, Computers, Materials and Continua, 80.2 (2024), 3193–3219 https://doi.org/https://doi.org/10.32604/cmc.2024.054377

Laxton, Debra, Linda Cooper, and Sarah Younie, ‘Translational Research in Action: The Use of Technology to Disseminate Information to Parents during the COVID-19 Pandemic’, British Journal of Educational Technology, 52.4 (2021), 1538–53 https://doi.org/https://doi.org/10.1111/bjet.13100

Lee, Jaeung, Melchor C. de Guzman, Jingguo Wang, Manish Gupta, and H. Raghav Rao, ‘Investigating Perceptions about Risk of Data Breaches in Financial Institutions: A Routine Activity-Approach’, Computers and Security, 121 (2022) https://doi.org/10.1016/j.cose.2022.102832

Li, Wenlong, and Jiahong Chen, ‘From Brussels Effect to Gravity Assists: Understanding the Evolution of the GDPR-Inspired Personal Information Protection Law in China’, Computer Law & Security Review, 54 (2024), 105994 https://doi.org/https://doi.org/10.1016/j.clsr.2024.105994

Li, Yuanxin, and Darina Saxunová, ‘A Perspective on Categorizing Personal and Sensitive Data and the Analysis of Practical Protection Regulations’, Procedia Computer Science, 170 (2020), 1110–15 https://doi.org/https://doi.org/10.1016/j.procs.2020.03.060

Lin, Jiacheng, Xianwen Dai, Ke Nai, Jin Yuan, Zhiyong Li, Xu Zhang, and others, ‘BRPPNet: Balanced Privacy Protection Network for Referring Personal Image Privacy Protection’, Expert Systems with Applications, 233 (2023), 120960 https://doi.org/https://doi.org/10.1016/j.eswa.2023.120960

Livingstone, Sonia, Kruakae Pothong, Ayça Atabey, Louise Hooper, and Emma Day, ‘The Googlization of the Classroom: Is the UK Effective in Protecting Children’s Data and Rights?’, Computers and Education Open, 7.June (2024), 100195 https://doi.org/10.1016/j.caeo.2024.100195

Llanos, Jose Tomas, Madeline Carr, and Omer Rana, ‘Using the Blockchain to Enable Transparent and Auditable Processing of Personal Data in Cloud- Based Services: Lessons from the Privacy-Aware Cloud Ecosystems (PACE) Project’, Computer Law & Security Review, 51 (2023), 105873 https://doi.org/https://doi.org/10.1016/j.clsr.2023.105873

Locke, John, Two Treatises of Government (Cambridge university press, 1967)

Loideain, Nóra Ni, and Rachel Adams, ‘From Alexa to Siri and the GDPR: The Gendering of Virtual Personal Assistants and the Role of Data Protection Impact Assessments’, Computer Law and Security Review, 36 (2020), 1–14 https://doi.org/10.1016/j.clsr.2019.105366

———, ‘From Alexa to Siri and the GDPR: The Gendering of Virtual Personal Assistants and the Role of Data Protection Impact Assessments’, Computer Law & Security Review, 36 (2020), 105366 https://doi.org/https://doi.org/10.1016/j.clsr.2019.105366

Lubis, Muharman, and Dini Oktarina D. Handayani, ‘The Relationship of Personal Data Protection towards Internet Addiction: Cyber Crimes, Pornography and Reduced Physical Activity’, Procedia Computer Science, 197.2021 (2021), 151–61 https://doi.org/10.1016/j.procs.2021.12.129

Maple, Carsten, Security and Privacy in the Internet of Things, Journal of Cyber Policy, 2017, II https://doi.org/10.1080/23738871.2017.1366536

Marelli, Massimo, ‘The Law and Practice of International Organizations’ Interactions with Personal Data Protection Domestic Regulation: At the Crossroads between the International and Domestic Legal Orders’, Computer Law & Security Review, 50 (2023), 105849 https://doi.org/https://doi.org/10.1016/j.clsr.2023.105849

‘Marriott Breached Again’, Computer Fraud & Security, 2020.4 (2020), 3 https://doi.org/https://doi.org/10.1016/S1361-3723(20)30035-X

Milkaite, Ingrida, Ralf De Wolf, Eva Lievens, Tom De Leyn, and Marijn Martens, ‘Children’s Reflections on Privacy and the Protection of Their Personal Data: A Child-Centric Approach to Data Protection Information Formats’, Children and Youth Services Review, 129.December 2020 (2021), 106170 https://doi.org/10.1016/j.childyouth.2021.106170

Mollaeefar, Majid, and Silvio Ranise, ‘Identifying and Quantifying Trade-Offs in Multi-Stakeholder Risk Evaluation with Applications to the Data Protection Impact Assessment of the GDPR’, Computers & Security, 129 (2023), 103206 https://doi.org/https://doi.org/10.1016/j.cose.2023.103206

Montenarh, Jonas, and Simon Marsden, ‘Unmasking the Oligarchs – Using Open Source Data to Detect Sanctions Violations’, Journal of Economic Criminology, 3.February (2024), 100055 https://doi.org/10.1016/j.jeconc.2024.100055

Mourby, Miranda, Elaine Mackey, Mark Elliot, Heather Gowans, Susan E. Wallace, Jessica Bell, and others, ‘Are “Pseudonymised” Data Always Personal Data? Implications of the GDPR for Administrative Data Research in the UK’, Computer Law and Security Review, 34.2 (2018), 222–33 https://doi.org/10.1016/j.clsr.2018.01.002

Mutiara, Upik, and Romi Maulana, ‘Perlindungan Data Pribadi Sebagai Bagian Dari Hak Asasi Manusia Atas Perlindungan Diri Pribadi’, Indonesian Journal of Law and Policy Studies, 1.1 (2020), 42 https://doi.org/10.31000/ijlp.v1i1.2648

Navickas, Katrina, ‘Legal and Historical Geographies of the Greenham Common Protest Camps in the 1980s’, Journal of Historical Geography, 82 (2023), 11–22 https://doi.org/10.1016/j.jhg.2023.07.002

Niffari, Hanifan, ‘Perlindungan Data Pribadi Sebagai Bagian Dari Hak Asasi Manusia Atas Perlindungan Diri Pribadi Suatu Tinjauan Komparatif Dengan Peraturan Perundang-Undangan Di Negara Lain’, Jurnal Hukum Dan Bisnis (Selisik), 6.1 (2020), 1–14 https://doi.org/10.35814/selisik.v6i1.1699

Noor, Hendry Julian, Kardiansyah Afkar, and Henning Glaser, ‘Application of Sanctions Against State Administrative Officials in Failure to Implement Administrative Court Decisions’, BESTUUR, 9.1 (2021), 72 https://doi.org/10.20961/bestuur.v9i1.49686

Pascual, Hugo, Jose M del Alamo, David Rodriguez, and Juan C Dueñas, ‘Hunter: Tracing Anycast Communications to Uncover Cross-Border Personal Data Transfers’, Computers & Security, 141 (2024), 103823 https://doi.org/https://doi.org/10.1016/j.cose.2024.103823

Pauletto, Christian, ‘Options towards a Global Standard for the Protection of Individuals with Regard to the Processing of Personal Data’, Computer Law & Security Review, 40 (2021), 105433 https://doi.org/https://doi.org/10.1016/j.clsr.2020.105433

Phillips, Benjamin, ‘UK Further Education Sector Journey to Compliance with the General Data Protection Regulation and the Data Protection Act 2018’, Computer Law & Security Review, 42.105586 (2021), 1–13 https://doi.org/https://doi.org/10.1016/j.clsr.2021.105586

Pleger, Lyn E., Katharina Guirguis, and Alexander Mertes, ‘Making Public Concerns Tangible: An Empirical Study of German and UK Citizens’ Perception of Data Protection and Data Security’, Computers in Human Behavior, 122.February 2020 (2021), 106830 https://doi.org/10.1016/j.chb.2021.106830

Pratono, Aluisius Hery, and Ari Sutanti, ‘The Ecosystem of Social Enterprise: Social Culture, Legal Framework, and Policy Review in Indonesia’, Pacific Science Review B: Humanities and Social Sciences, 2.3 (2016), 106–12 https://doi.org/10.1016/j.psrb.2016.09.020

Purtova, Nadezhda, and Robin L Pierce, ‘Citizen Scientists as Data Controllers: Data Protection and Ethics Challenges of Distributed Science’, Computer Law & Security Review, 52 (2024), 105911 https://doi.org/https://doi.org/10.1016/j.clsr.2023.105911

Qaid, Hanif, Ari Widyanti, Sheila Amalia Salma, Fitri Trapsilawati, Titis Wijayanto, Utami Dyah Syafitri, and others, ‘Speed Choice and Speeding Behavior on Indonesian Highways: Extending the Theory of Planned Behavior’, IATSS Research, 46.2 (2022), 193–99 https://doi.org/10.1016/j.iatssr.2021.11.013

Ranjan, Aditya Kaushal, and Prabhat Kumar, ‘APPS: Authentication-Enabled Privacy Protection Scheme for Secure Data Transfer in Internet of Things’, Ad Hoc Networks, 164 (2024), 103631 https://doi.org/https://doi.org/10.1016/j.adhoc.2024.103631

Rataj, Piotr, ‘Botnet Defense under EU Data Protection Law’, Computer Law & Security Review, 56 (2025), 106080 https://doi.org/https://doi.org/10.1016/j.clsr.2024.106080

Rupp, Valentin, and Max von Grafenstein, ‘Clarifying “Personal Data” and the Role of Anonymisation in Data Protection Law Including and Excluding Data from the Scope of the GDPR (More Clearly) through Refining the Concept of Data Protection’, Computer Law and Security Review, 52.1 (2024), 105932 https://doi.org/10.1016/j.clsr.2023.105932

Sautunnida, Lia, ‘Urgensi Undang-Undang Perlindungan Data Pribadi Di Indonesia: Studi Perbandingan Hukum Inggris Dan Malaysia’, Kanun Jurnal Ilmu Hukum, 20.2 (2018), 369–84 https://doi.org/10.24815/kanun.v20i2.11159

Setiabudhi, Donna Okthalia, Ahsan Yunus, Irwansyah Irwansyah, and Andi Rifky, ‘The Role of Land Management Paradigm Towards Certainty and Justice’, BESTUUR, 11.1 (August) (2023), 43 https://doi.org/10.20961/bestuur.v11i1.71710

Sharpe, Sybil, National Security, Personal Privacy and the Law: Surveying Electronic Surveillance and Data Acquisition, National Security (Routledge, 2019) https://doi.org/10.4324/9780429020025

Silbey, Susan S., Legal Culture and Legal Consciousness, International Encyclopedia of the Social & Behavioral Sciences: Second Edition, Second Edi (Elsevier, 2015), XIII https://doi.org/10.1016/B978-0-08-097086-8.86067-5

de Sousa Rocha, Núbia Augusto, Alexandre Nascimento de Almeida, André Nunes, and Humberto Angelo, ‘Critical Points for the Processing of Personal Data by the Government: An Empirical Study in Brazil’, Computer Law & Security Review, 54 (2024), 106023 https://doi.org/https://doi.org/10.1016/j.clsr.2024.106023

Steppe, Richard, ‘Online Price Discrimination and Personal Data: A General Data Protection Regulation Perspective’, Computer Law and Security Review, 33.6 (2017), 768–85 https://doi.org/10.1016/j.clsr.2017.05.008

Studzinska, Joanna, ‘Request for Information as an Auxiliary Measure in Intellectual Property Litigation Concerning Electronic Works and the Protection of Personal Data’, Procedia Computer Science, 207 (2022), 4276–87 https://doi.org/https://doi.org/10.1016/j.procs.2022.09.491

Sun, Panjun, Yi Wan, Zongda Wu, Zhaoxi Fang, and Qi Li, ‘A Survey on Privacy and Security Issues in IoT-Based Environments: Technologies, Protection Measures and Future Directions’, Computers & Security, 148 (2025), 104097 https://doi.org/https://doi.org/10.1016/j.cose.2024.104097

Tang, Alan, Privacy in Practice, Privacy in Practice, 2022 https://doi.org/10.1201/9781003225089

Tauda, Gunawan A., Andy Omara, and Gioia Arnone, ‘Cryptocurrency: Highlighting the Approach, Regulations, and Protection in Indonesia and European Union’, BESTUUR, 11.1 (August) (2023), 1 https://doi.org/10.20961/bestuur.v11i1.67125

de Terwangne, Cécile, ‘Council of Europe Convention 108+: A Modernised International Treaty for the Protection of Personal Data’, Computer Law and Security Review, 40.September 1980 (2021), 3–4 https://doi.org/10.1016/j.clsr.2020.105497

Tonheim, Milfrid, Muireann Ní Raghallaigh, Ketil Eide, and Ala Sirriyeh, ‘Relational and Cultural Continuity for Children in Foster Care; A Critical Explo‐ Ration of National Policies in Norway, Sweden, Denmark, England, Ireland and Scotland’, Children and Youth Services Review, 2024, 108040 https://doi.org/10.1016/j.childyouth.2024.108040

‘UK Strategy Slated by Own Biometrics Commissioner’, Biometric Technology Today, 2018.7 (2018), 11–11 https://doi.org/10.1016/s0969-4765(18)30096-1

Valero, Cayetano, Jaime Pérez, Sonia Solera-Cotanilla, Mario Vega-Barbas, Guillermo Suarez-Tangil, Manuel Alvarez-Campana, and others, ‘Analysis of Security and Data Control in Smart Personal Assistants from the User’s Perspective’, Future Generation Computer Systems, 144 (2023), 12–23 https://doi.org/https://doi.org/10.1016/j.future.2023.02.009

Wang, Feng, Yongjie Gai, and Haitao Zhang, ‘Blockchain User Digital Identity Big Data and Information Security Process Protection Based on Network Trust’, Journal of King Saud University - Computer and Information Sciences, 36.4 (2024), 102031 https://doi.org/https://doi.org/10.1016/j.jksuci.2024.102031

Wang, Wayne Wei, ‘Contextualizing Personal Information: Privacy’s Post-Neoliberal Constitutionalism and Its Heterogeneous Imperfections in China’, Computer Law & Security Review, 55 (2024), 106030 https://doi.org/https://doi.org/10.1016/j.clsr.2024.106030

Wang, Yu, ‘Data Structure and Privacy Protection Analysis in Big Data Environment Based on Blockchain Technology’, International Journal of Intelligent Networks, 5 (2024), 120–32 https://doi.org/https://doi.org/10.1016/j.ijin.2024.02.005

Wicaksono, Agung, Irni Yunita, and Gede Ginaya, ‘Living Side by Side with Nature: Evidence of Self-Governance in Three Local Communities in Indonesia’, Heliyon, 8.12 (2022), e12248 https://doi.org/10.1016/j.heliyon.2022.e12248

Xiao, Zhiqiang, Jiacheng Lin, Jiajun Chen, Haolong Fu, Yifan Li, Jin Yuan, and others, ‘Privacy Preservation Network with Global-Aware Focal Loss for Interactive Personal Visual Privacy Preservation’, Neurocomputing, 602 (2024), 128193 https://doi.org/https://doi.org/10.1016/j.neucom.2024.128193

Yang, Shuling, and Yan Hou, ‘Cultivation Strategies of English Thinking Ability in the Environment of Internet of Things Shuling’, HELIYON, 2024, e39515 https://doi.org/10.1016/j.heliyon.2024.e39515

Yang, Zenghui, Xiubo Chen, Yunfeng He, Luxi Liu, Yinmei Che, Xiao Wang, and others, ‘An Attribute-Based Access Control Scheme Using Blockchain Technology for IoT Data Protection’, High-Confidence Computing, 4.3 (2024), 100199 https://doi.org/https://doi.org/10.1016/j.hcc.2024.100199

Ye, Jun, Ling Wang, Zhiyu Wang, Zhengqi Zhang, Zheng Xu, and Jinghua Zhao, ‘An Electronic Voting Scheme with Privacy Protection’, Procedia Computer Science, 243 (2024), 1248–56 https://doi.org/https://doi.org/10.1016/j.procs.2024.09.147

Ye, Xiongbiao, Yuhong Yan, Jia Li, and Bo Jiang, ‘Privacy and Personal Data Risk Governance for Generative Artificial Intelligence: A Chinese Perspective’, Telecommunications Policy, 48.10 (2024), 102851 https://doi.org/https://doi.org/10.1016/j.telpol.2024.102851

Zheng, Guan, and Jinchun Shu, ‘In the Name of Protection—A Critical Analysis of China’s Legal Framework of Children’s Personal Information Protection in the Digital Era’, Computer Law and Security Review, 53.April (2024), 105979 https://doi.org/10.1016/j.clsr.2024.105979

Zinovieva, Vera, Mikhail Shchelokov, and Evgeny Litvinovsky, ‘Legal Issues of Protection of Personal Data: Cases of Transport Data Leaks’, Transportation Research Procedia, 68 (2023), 461–67 https://doi.org/https://doi.org/10.1016/j.trpro.2023.02.062

Downloads

Published

2024-12-04

Citation Check