Personal Data Protection as a Tool to Fight Cyber Corruption
Abstract views: 1829 / PDF downloads: 861
DOI:
https://doi.org/10.59022/ijlp.119Keywords:
Data Protection, Privacy, Cyber-security, Corruption, Digital Ethics, Transparency, Accountability, Data Vulnerabilities, Data Governance, Surveillance, CybercrimeAbstract
As digital technologies proliferate, personal data vulnerabilities enable new
forms of systemic corruption. Robust data protection frameworks are essential
safeguards, yet remain underutilized in anti-corruption efforts. This paper analyzes
the complex intersection between privacy, cyber-security and corruption. Rapid
technological change has led to exponential growth in personal data generation.
However, legal and ethical oversight lags behind. Vast troves of user data are
harvested, often without full consent or transparency, creating information
asymmetries ripe for abuse. Data may be exploited, manipulated, or weaponized to
enable digital authoritarianism, cybercrime, discrimination, elite capture, and other
corrupt ends. Users lack control over or visibility into data misuse once obtained.
Case examples showcase vulnerabilities across sectors. Tighter constraints on data
collection, use and sharing, coupled with oversight and accountability measures,
can help rein in these risks. While data protection principles increasingly shape
global governance frameworks, considerable implementation and enforcement
gaps persist. Integrating privacy into anti-corruption programs as a core pillar,
alongside transparency and ethics initiatives, is vital to secure the data flows
underpinning digital societies against corrupt interests.
References
Aston, M., Pfeffer, J., Meersman, R., Dillon, T.S. & Hengchang, L. (2019). Corruption detection using distributed ledger technologies. Applied Sciences, 9(17), 3500.
Said, G., Azamat, K., Ravshan, S., & Bokhadir, A. (2023). Adapting Legal Systems to the Development of Artificial Intelligence: Solving the Global Problem of AI in Judicial Processes. International Journal of Cyber Law, 1(4). https://doi.org/10.59022/ijcl.49
Allah Rakha, N. (2023). Revolution in Learning Through Digitization: How Technology is Changing the Landscape of Education. International Journal of Cyber Law, 1(3). https://doi.org/10.59022/ijcl.38
Carr, I. (2016). Corruption in the cyber age. Journal of Cyber Policy, 1(1), 75-93.
Custers, B., Calders, T., Schermer, B., & Zarsky, T. (Eds.). (2018). Discrimination and privacy in the information society. Springer.
AllahRakha, N. (2023). REGULATORY SANDBOXES: A GAME-CHANGER FOR NURTURING DIGITAL START-UPS AND FOSTERING INNOVATION. Евразийский журнал права, финансов и прикладных наук, 3(8), 120–128. извлечено от https://in-academy.uz/index.php/EJLFAS/article/view/19825
De Leaniz, P. M. G., & Del Monte, A. (2021). Curbing corruption in public procurement. Transparency International.
Desjardins, J. (2019). How much data is generated each day?. World Economic Forum. https://www.weforum.org/agenda/2019/04/how-much-data-is-generated-each-day-cf4bddf29f/
Diakopoulos, N. (2014). Algorithmic accountability: Journalistic investigation of computational power structures. Digital Journalism, 3(3), 398-415.
Allah Rakha, N. (2023). Revolution in Learning Through Digitization: How Technology is Changing the Landscape of Education. International Journal of Cyber Law, 1(3). https://doi.org/10.59022/ijcl.38
DLA Piper. (2022). Data Protection Laws of the World. https://www.dlapiperdataprotection.com/
Fiedler, A., & Powell, W. (2020). Digital security risks in the OECD: Evidence from a new framework. OECD.
AllahRakha, N. Analysis of the Primary Components Contributing to the Growth of the Digital Economy (November 25, 2022).
FTC (US Federal Trade Commission). (2014). Data brokers: A call for transparency and accountability. https://www.ftc.gov/system/files/documents/reports/data-brokers-call-transparency-accountability-report-federal-trade-commission-may-2014/140527databrokerreport.pdf
Garvie, C., & Frankle, J. (2016). Facial-recognition software might have a racial bias problem. The Atlantic. https://www.theatlantic.com/technology/archive/2016/04/the-underlying-bias-of-facial-recognition-systems/476991/
Greenberg, A. (2019). Sandworm: A new era of cyberwar and the hunt for the Kremlin's most dangerous hackers. Penguin Random House.
AllahRakha, N. (2023). REGULATORY SANDBOXES: A GAME-CHANGER FOR NURTURING DIGITAL START-UPS AND FOSTERING INNOVATION. Евразийский журнал права, финансов и прикладных наук, 3(8), 120–128. извлечено от https://in-academy.uz/index.php/EJLFAS/article/view/19825
Greenleaf, G. (2014). Asian data privacy laws: Trade & human rights perspectives. Oxford University Press.
Isaak, J., & Hanna, M. J. (2018). User data privacy: Facebook, Cambridge Analytica, and privacy protection. Computer, 51(8), 56-59.
Allahrakha, N. (2023). Balancing Cyber-security and Privacy: Legal and Ethical Considerations in the Digital Age. Legal Issues in the Digital Age, 4(2), 78-121. Retrieved from https://lida.hse.ru/article/view/17666
ITU (2021). Global Cybersecurity Index 2020. https://www.itu.int/epublications/publication/name,210405,en
Javelin Strategy & Research. (2019). Identity fraud hits all time high with 16.7 million US victims in past year. https://www.javelinstrategy.com/press-release/identity-fraud-hits-all-time-high-167-million-us-victims-past-year-according-new-javelin
Joseph, G. (2018). The government uses 'near perfect surveillance' data on Americans. The Guardian. https://www.theguardian.com/commentisfree/2018/jun/11/gig economy-data-near-perfect-surveillance-americans
Kaye, D. (2018). Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression. United Nations Human Rights Council. https://digitallibrary.un.org/record/1626792
Koomson, J., Archer-Brown, C., Adu, K.K., & Adjei, D. (2019). The implications of personal data protection for the operations of small businesses in developing countries: A qualitative study. Government Information Quarterly, 36(3), 503-512.
AllahRakha, N. (2023). AI and the Law: Unraveling the Complexities of Regulatory Frameworks in Europe. International Bulletin of Young Scientist, 1(2). https://doi.org/10.59022/ibys.115
Krastev, I. (2004). Shifting obsessions: Three essays on the politics of anticorruption. CEU Press.
Kudo, M. (2018). Technologization of anti-corruption: Transformation of corruption and anti-corruption in the age of open data and artificial intelligence. Asia Pacific Public Policy Review, 1(1), 38-54.
Allahrakha, N. (2023). Balancing Cyber-security and Privacy: Legal and Ethical Considerations in the Digital Age. Legal Issues in the Digital Age, 4(2), 78-121. Retrieved from https://lida.hse.ru/article/view/17666
Lusthaus, J. (2018). Industry of anonymity: Inside the business of cybercrime. Harvard University Press.
Marczak, B., Guarnieri, C., Marquis-Boire, M., & Scott-Railton, J. (2016). The million dollar dissident: NSO Group's iPhone zero-days used against a UAE human rights defender. The Citizen Lab.
AllahRakha, N. (2023). AI and the Law: Unraveling the Complexities of Regulatory Frameworks in Europe. International Bulletin of Young Scientist, 1(2). https://doi.org/10.59022/ibys.115
Mazareanu, E. (2019). Usage of personal data & invasion of privacy: What do consumers think?. Comparitech. https://www.comparitech.com/privacy-security-tools/consumer-privacy-study/
Miller, S. (2018). Ethical governance is the challenge of the digital age. Journal of Cyber Policy, 3(2), 147-156.
Monahan, T., & Regan, P. M. (2012). Zones of opacity: Data fusion in post 9/11 security organizations. Canadian Journal of Law & Society, 27(3), 301-317.
AllahRakha, N. Analysis of the Primary Components Contributing to the Growth of the Digital Economy (November 25, 2022).
Mordor Intelligence. (2021). Data Broker Market - Growth, Trends, COVID-19 Impact, and Forecasts. https://www.mordorintelligence.com/industry-reports/global-data-broker-market-industry
Mozur, P. (2019). One month, 500,000 face scans: How China is using AI to profile a minority. New York Times. https://www.nytimes.com/2019/04/14/technology/china-surveillance-artificial-intelligence-racial-profiling.html
Noveck, B. S. (2015). Smart citizens, smarter state: The technologies of expertise and the future of governing. Harvard University Press.
OECD (2013). The OECD Privacy Framework. https://www.oecd.org/sti/ieconomy/privacy.htm
Allah Rakha, N. (2023). Revolution in Learning Through Digitization: How Technology is Changing the Landscape of Education. International Journal of Cyber Law, 1(3). https://doi.org/10.59022/ijcl.38
Padania, S. (2021). Data Governance and the G20: Balancing Innovation and Regulation. Chatham House. https://www.chathamhouse.org/2021/06/data-governance-and-g20/4-conclusions
Polyakova, A., & Meserole, C. (2019). Exporting digital authoritarianism: The Russian and Chinese models. Brookings Institution.
AllahRakha, N. (2023). AI and the Law: Unraveling the Complexities of Regulatory Frameworks in Europe. International Bulletin of Young Scientist, 1(2). https://doi.org/10.59022/ibys.115
Rai, A. (2019). Auditing for cybersecurity of Aadhaar: Concerns, contractual obligations and transparency. Economic & Political Weekly, 54(12).
Allahrakha, N. (2023). Balancing Cyber-security and Privacy: Legal and Ethical Considerations in the Digital Age. Legal Issues in the Digital Age, 4(2), 78-121. Retrieved from https://lida.hse.ru/article/view/17666
Redden, J. (2018). Democratic governance in an age of datafication: Lessons from mapping government discourses and practices. Big Data & Society, 5(2), 1-13.
Risen, J., & Poitras, L. (2013). N.S.A. Gathers Data on Social Connections of U.S. Citizens. New York Times. https://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html
Allah Rakha, N. (2023). Revolution in Learning Through Digitization: How Technology is Changing the Landscape of Education. International Journal of Cyber Law, 1(3). https://doi.org/10.59022/ijcl.38
Robinson, D., & Koepke, L. (2018). Stuck in a pattern: Early evidence on “predictive policing” and civil rights. Upturn. https://www.upturn.org/static/reports/2018/stuck-in-a-pattern/files/Upturn%20-%20Stuck%20In%20a%20Pattern.pdf
S. S. Gulyamov, A. A. Rodionov, I. R. Rustambekov and A. N. Yakubov, "The Growing Significance of Cyber Law Professionals in Higher Education: Effective Learning Strategies and Innovative Approaches," 2023 3rd International Conference on Technology Enhanced Learning in Higher Education (TELE), Lipetsk, Russian Federation, 2023, pp. 117-119, doi: 10.1109/TELE58910.2023.10184186.
AllahRakha, N. (2023). AI and the Law: Unraveling the Complexities of Regulatory Frameworks in Europe. International Bulletin of Young Scientist, 1(2). https://doi.org/10.59022/ibys.115
S. S. Gulyamov, R. A. Fayziev, A. A. Rodionov and G. A. Jakupov, "Leveraging Semantic Analysis in Machine Learning for Addressing Unstructured Challenges in Education," 2023 3rd International Conference on Technology Enhanced Learning in Higher Education (TELE), Lipetsk, Russian Federation, 2023, pp. 5-7, doi: 10.1109/TELE58910.2023.10184355.
Schneier, B. (2015). Data and Goliath: The hidden battles to collect your data and control your world. WW Norton & Company.
AllahRakha, N. Analysis of the Primary Components Contributing to the Growth of the Digital Economy (November 25, 2022).
Schneier, B. (2019). We're Banning Facial Recognition. We're Missing the Point. New York Times. https://www.nytimes.com/2019/01/20/opinion/facial-recognition-ban-privacy.html
Shah, A. & Schacter, M. (2004). Combating corruption: Look before you leap. Finance and Development, 41(4).
Sigholm, J. (2013). Non-state actors in cyberspace operations. Journal of Military Studies, 4(1), 1-37.
AllahRakha, N. (2023). REGULATORY SANDBOXES: A GAME-CHANGER FOR NURTURING DIGITAL START-UPS AND FOSTERING INNOVATION. Евразийский журнал права, финансов и прикладных наук, 3(8), 120–128. извлечено от https://in-academy.uz/index.php/EJLFAS/article/view/19825
Singer, P.W., & Friedman, A. (2014). Cybersecurity: What everyone needs to know. Oxford University Press.
Solon, O. (2019). ‘Massive violation of privacy’: why are covert data brokers so creepy?. The Guardian. https://www.theguardian.com/world/2019/jan/09/data-brokers-secretly-profile-americans-report-ftc-urged-investigate-abuse
AllahRakha, N. Analysis of the Primary Components Contributing to the Growth of the Digital Economy (November 25, 2022).
Tufekci, Z. (2018). YouTube, the Great Radicalizer. New York Times. https://www.nytimes.com/2018/03/10/opinion/sunday/youtube-politics-radical.html
Tzankova, I., & Flourentzos, F. (2019). The General Data Protection Regulation and anti‐corruption. Regulation & Governance, 15(2), 298-315.
UNODC. (2013). Comprehensive Study on Cybercrime. United Nations Office on Drugs and Crime. https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf
AllahRakha, N. Analysis of the Primary Components Contributing to the Growth of the Digital Economy (November 25, 2022).
WEF. (2020). Global Cybersecurity Outlook 2020. World Economic Forum. http://www3.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2020.pdf
Yuspin, W., Wardiono, K., Budiono, A., & Gulyamov, S. (2022). The law alteration on artificial intelligence in reducing Islamic bank’s profit and loss sharing risk. Legality : Jurnal Ilmiah Hukum, 30(2), 267–282. https://doi.org/10.22219/ljih.v30i2.23051
AllahRakha, N. (2023). REGULATORY SANDBOXES: A GAME-CHANGER FOR NURTURING DIGITAL START-UPS AND FOSTERING INNOVATION. Евразийский журнал права, финансов и прикладных наук, 3(8), 120–128. извлечено от https://in-academy.uz/index.php/EJLFAS/article/view/19825
Zinnbauer, D. (2015). Ambivalent leviathans: Corruption and institutional change. In ANTICORRP Project (Eds). Anticorrp WP Series. https://anticorrp.eu/publications/d10-3-1-v1-anticorrp-wp-series/
Allahrakha, N. (2023). Balancing Cyber-security and Privacy: Legal and Ethical Considerations in the Digital Age. Legal Issues in the Digital Age, 4(2), 78-121. Retrieved from https://lida.hse.ru/article/view/17666
Zuboff, S. (2019). The age of surveillance capitalism: The fight for a human future at the new frontier of power. Profile Books.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Said Gulyamov, Sherzod Raimberdiyev
This work is licensed under a Creative Commons Attribution 4.0 International License.