About this Research Topic
Almost everything we do is subject to surveillance. We are under constant watch and tracing, both physically and electronically. Surveillance is everywhere and this ubiquity makes us accept it as normal.
Big data only worsens the scenario. Data about people, organizations, and institutions are gathered around the clock and are stored, sorted, filtered, filed, and manipulated. Of course, data are also key items in business processes: companies are spending a tremendous amount of money to have access to data and to collect and transfer them.
The set of economic transactions regarding data exchange - players who offer data and customers who buy data - is named “surveillance economy”. The value of this market is currently estimated at over $39 billion annually, and it is growing at around 9% per year according to recent analyses.
This Article Collection aims to bring together research activities on the development of innovative technologies for the collection, filtering, and aggregation of information. The focus is also on how to extract value from data, and which methods, techniques, and technologies can be adopted to protect citizens and organizations’ privacy without compromising all the existing technologies of the digital ecosystem.
Topics in this Article Collection include but are not limited to:
• Extraction of sensitive information from Darknet, DeepWeb and Web
• Techniques and methods to exfiltrate information from protected areas
• Exfiltration of sensitive data from devices and computers with novel techniques
• Methods to aggregate data for obtaining sensitive information
• Data Privacy
• Data Protection
• Software architecture for data protection
• Hardware architecture for data protection
• Novel models and tools for spyware
• Techniques for detecting and contrasting spyware on computer and devices
• Data Protection and Privacy on Internet of Things
• Cyber-Physical surveillance technology
• Testing for data privacy and data protection
Keywords: data protection, privacy protection, surveillance economy, big data, data privacy
Important Note: All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.