An Overcoming the Privacy Paradox: Legal Aspects of Data Protection in the Digital Age
Abstract views: 392 / PDF downloads: 321
DOI:
https://doi.org/10.59022/ijcl.47Keywords:
Data Privacy, Digital Era, Global Issues, Legal FrameworkAbstract
In the digital age, the protection of data privacy has become increasingly crucial due to the widespread use of digital technologies and the vast amount of confidential information being transmitted and stored online. This article focuses on the privacy paradox, which revolves around the tension between individual privacy rights and the public's demand for easily accessible and shared data. To address this issue, an examination of international legal acts, practices, and proposed solutions is necessary. Additionally, this article delves into the legislative framework of the Republic of Uzbekistan to provide insights into the country's efforts in resolving data protection concerns. By exploring these legal aspects, this study aims to shed light on effective strategies for overcoming the privacy paradox and ensuring data protection in the digital era.
References
Allan Acquisti, Laura Brandimarte, and Gregory Loewenstein. (2016). Behavior and privacy in the digital era. Retrieved from "https://www.cmu.edu/dietrich/sds/docs/loewenstein/PrivacyHumanBeh.pdf" (Science 347, 6221, p.509).
Allah Rakha, N. (2023). Artificial Intelligence strategy of the Uzbekistan: Policy framework, Preferences, and challenges. International Journal of Law and Policy, 1(1). https://doi.org/10.59022/ijlp.27 retrieved from https://irshadjournals.com/index.php/ijlp/article/view/27
Andrejevic M. (2014). The chasm of big data. Retrieved from "https://ijoc.org/index.php/ijoc/article/view/2161/1163" International Journal of Communication 8 (2019): 1673-1689.
Bernstein, D.J., & Lange, T. (2017). Security after quantum computing. Retrieved from "https://www.researchgate.net/profile/Nicolas-Sendrier-2/publication/226115302_Code-Based_Cryptography/links/540d62d50cf2df04e7549388/Code-Based-Cryptography.pdf" (Nature, 549(7671), 188-195).
Cate, F.H., and C. Kuner. (2018). User-centered, interoperable digital service development and the GDPR's right to data portability. https://www.sciencedirect.com/science/article/pii/S0267364917303333 International Data Privacy Law.8(4), 265–286.
A. Cavoukian. (2011). The seven pillars of privacy through design. Commissioner for Information and Privacy in the Province of Ontario, Canada https://forms1.ieee.org
Dwork, C. (2006). Privacy with a differential. Citation Information: https://doi.org/10.1007/11787006_1 Proceedings of the 33rd International Colloquium on Automata, Languages, and Programming (ICALP), pages 1–12.
A body representing Europe. (2018). The EU's new data protection law is called GDPR. Commission of the European Union. Law. Law Topic. Data Protection. Data Protection.
Allah Rakha, Naeem, “GOVERNANCE OF DIGITAL ECONOMY” Yurisprudensiya, Vol, Issue No. (2022), pp. 159-162, ISSN 2181-1938
X. Li, J. Chiang, & W. Fang. (2018). The privacy dilemma explained: a meta-analysis of research on subjects of interest. https://www.sciencedirect.com/science/article/abs/pii/S0167404818303031 Journal of Management Information Systems, 35(4), 992-1028
Floridi, L.; Cowls, J.; Beltrametti, M.; Chatila, R.; Chazerand, P.; Dignum, V.;... C. Luetge & R. (2018). Opportunities, hazards, principles, and proposals for an ethical AI society (AI4People). Link.Springer.com/10.1007/s11023-018-9482-5 Minds and Machines 28(4):689-707.
Greenleaf (2017) and de Hert (2017). The maturation of European data protection. The European Union's General Data Protection Regulation (GDPR)https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679
Said Saidakhrarovich Gulyamov. (2022). World Bulletin of Management and Law, Volume 10, Issue 1, Pages 31–45, December 2018, available at: https://scholarexpress.net/index.php/wbml/article/view/948.
Hert, P (2017). The maturation of European data protection. 7(2) International Journal of Information Security and Privacy Law 77–89 (https://link.springer.com/book/10.1007/978-94-007-5170-5)
W. Hong; J. Y. Thong; W. M. Wong; and K. Y. Tam (2019). The privacy conundrum of social networking sites from a self-control point of view. The Privacy Paradox in the Context of Online Social Networking: A Self-Identity Perspective, Information Systems Research, 20(2), 292-315 (https://www.researchgate.net/publication/329039895). The Journal of the Association for Information Science and Technology, DOI:10.1002/asi.24113.
Allah Rakha, Naeem, “Analysis of the Primary Components Contributing to the Growth of the Digital Economy” SSRN Electronic Journal, 2022, http://doi.org/10.2139/ssrn.4286088.
ISO/IEC. (2013). https://www.iso.org/ru/standard/27001 Information technology—Security techniques—Information security management systems—Requirements ISO/IEC 27001:2013
Allo, P.; Taddeo, M.; Wachter, S.; Floridi, L.; and Mittelstadt, B.D. (2016). A road map for the discussion of algorithmic ethics. 3(2) Big Data & Society, 205395171667969.https://journals.sagepub.com/doi/10.1177/2053951716679679;https://doi.org/10.1177/2053951716679679
Felten, E.W.; Huey, J.; Narayanan, A. (2018). Differential privacy explained in layman's terms. 16(3), ACM Queue, pp. 1–29.
Allah Rakha, N. (2023). Artificial Intelligence and Sustainability. International Journal of Cyber Law, 1(3). https://doi.org/10.59022/ijcl.42 retrieved from https://irshadjournals.com/index.php/ijcl/article/view/42
H. Nissenbaum. (2009). Understanding privacy: The role of legislation, technology, and the protection of personal relationships. Website: https://www.sup.org/books/title/ Stanford University Press.id=8862
Norberg, P. A., D. R. Horne, and D. A. Horne. (2007). Intentions vs actions regarding the sharing of personally identifiable information: the privacy conundrum. Although customers seem to be, the disparity %E2%80%9D has never been assessed, Journal of Consumer Affairs, 41(1), 100-126 (https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1745-6606.2006.00070.x).
The "On Cybersecurity" Law of the Republic of Uzbekistan. On April 15th, 2022, ZRU-764 will be going to sleep. Security in the Digital Age: https://lex.uz/ru/docs/5960609
Specifically, Uzbekistan's "On Personal Data" law. 07/02/2019 ZRU-547 sleep. https://lex.uz/docs/4396428 "About Personal Data"
Allah Rakha, N. (2023). Ensuring Cyber-security in Remote Workforce: Legal Implications and International Best Practices. International Journal of Law and Policy, 1(3). https://doi.org/10.59022/ijlp.43 retrieved from https://irshadjournals.com/index.php/ijlp/article/view/43
International Arbitration: The Conceptual Foundations and Essential Principles of Law, by I. Rustambekov and M. Bakhramova. Website address (URL): https://www. ijsshr. in/v5i1/Doc/18. pdf, 122-129.