Research Topic

Data and privacy protection in surveillance economy

About this Research Topic

Almost everything we do is subject to surveillance. We are under constant watch and tracing, both physically and electronically. Surveillance is everywhere and this ubiquity makes us accept it as normal.

Big data only worsens the scenario. Data about people, organizations, and institutions are gathered around the clock and are stored, sorted, filtered, filed, and manipulated. Of course, data are also key items in business processes: companies are spending a tremendous amount of money to have access to data and to collect and transfer them.

The set of economic transactions regarding data exchange - players who offer data and customers who buy data - is named “surveillance economy”. The value of this market is currently estimated at over $39 billion annually, and it is growing at around 9% per year according to recent analyses.

This Article Collection aims to bring together research activities on the development of innovative technologies for the collection, filtering, and aggregation of information. The focus is also on how to extract value from data, and which methods, techniques, and technologies can be adopted to protect citizens and organizations’ privacy without compromising all the existing technologies of the digital ecosystem.

Topics in this Article Collection include but are not limited to:
• Extraction of sensitive information from Darknet, DeepWeb and Web
• Techniques and methods to exfiltrate information from protected areas
• Exfiltration of sensitive data from devices and computers with novel techniques
• Methods to aggregate data for obtaining sensitive information
• Data Privacy
• Data Protection
• Software architecture for data protection
• Hardware architecture for data protection
• Novel models and tools for spyware
• Techniques for detecting and contrasting spyware on computer and devices
• Data Protection and Privacy on Internet of Things
• Cyber-Physical surveillance technology
• Testing for data privacy and data protection


Keywords: data protection, privacy protection, surveillance economy, big data, data privacy


Important Note: All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.

Almost everything we do is subject to surveillance. We are under constant watch and tracing, both physically and electronically. Surveillance is everywhere and this ubiquity makes us accept it as normal.

Big data only worsens the scenario. Data about people, organizations, and institutions are gathered around the clock and are stored, sorted, filtered, filed, and manipulated. Of course, data are also key items in business processes: companies are spending a tremendous amount of money to have access to data and to collect and transfer them.

The set of economic transactions regarding data exchange - players who offer data and customers who buy data - is named “surveillance economy”. The value of this market is currently estimated at over $39 billion annually, and it is growing at around 9% per year according to recent analyses.

This Article Collection aims to bring together research activities on the development of innovative technologies for the collection, filtering, and aggregation of information. The focus is also on how to extract value from data, and which methods, techniques, and technologies can be adopted to protect citizens and organizations’ privacy without compromising all the existing technologies of the digital ecosystem.

Topics in this Article Collection include but are not limited to:
• Extraction of sensitive information from Darknet, DeepWeb and Web
• Techniques and methods to exfiltrate information from protected areas
• Exfiltration of sensitive data from devices and computers with novel techniques
• Methods to aggregate data for obtaining sensitive information
• Data Privacy
• Data Protection
• Software architecture for data protection
• Hardware architecture for data protection
• Novel models and tools for spyware
• Techniques for detecting and contrasting spyware on computer and devices
• Data Protection and Privacy on Internet of Things
• Cyber-Physical surveillance technology
• Testing for data privacy and data protection


Keywords: data protection, privacy protection, surveillance economy, big data, data privacy


Important Note: All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.

About Frontiers Research Topics

With their unique mixes of varied contributions from Original Research to Review Articles, Research Topics unify the most influential researchers, the latest key findings and historical advances in a hot research area! Find out more on how to host your own Frontiers Research Topic or contribute to one as an author.

Topic Editors

Loading..

Submission Deadlines

30 June 2020 Manuscript

Participating Journals

Manuscripts can be submitted to this Research Topic via the following journals:

Loading..

Topic Editors

Loading..

Submission Deadlines

30 June 2020 Manuscript

Participating Journals

Manuscripts can be submitted to this Research Topic via the following journals:

Loading..
Loading..

total views article views article downloads topic views

}
 
Top countries
Top referring sites
Loading..