Cyber Security and Personal Data Protection in the Digital Age: Challenges, Impacts, and Urgency of Global Collaboration

Authors

  • Bayar Gardi Knowledge University, Erbil, Iraq
  • Belouadah Ahmed Seif Eddine University of Saida Dr Moulay Tahar, Algeria

Keywords:

Cybersecurity, Data protection, Cyberattacks, Digital privacy, Regulation, Global collaboration, Cyber resilience

Abstract

Cybersecurity and personal data protection have become major issues in the rapidly growing digital era. This research aims to analyze the main challenges in cybersecurity and the urgency of personal data protection in a global perspective. The research method used is a literature study, by reviewing various academic sources and international journals that discuss aspects of digital security. The results show that increasingly complex cyber threats, lack of user awareness, and weak data protection regulations are the main factors that increase the risk of data leaks and cybercrime. In addition, global cooperation in cybersecurity is key to addressing cross-border threats. By sharing information and mitigation strategies, countries and organizations can collectively improve cyber resilience. Stricter and more transparent regulations and increased public awareness of the importance of cybersecurity are also crucial steps to reduce the risk of digital crime. Education and training of cybersecurity experts also needs to be improved to deal with evolving threats. With a more comprehensive and collaborative approach, personal data protection and cybersecurity can be better maintained in the global digital ecosystem.

References

Amanowicz, M. 2021. A Shared Cybersecurity Awareness Platform. Journal of Telecommunications and Information Technology, (3), 32-41.

Arifin, S., & D. Darmawan. 2021. Technology Access and Digital Skills: Bridging the Gaps in Education and Employment Opportunities in the Age of Technology 4.0, Journal of Social Science Studies, 1(1), 163 – 168.

Bhardwaj, G., R. Gupta, A. P. Srivastava, & S. V. Singh. 2021. Cyber Threat Landscape of G4 Nations: Analysis of Threat Incidents & Response Strategies. 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), 75-79.

Biros, D. 2020. The Challenges of New Information Technology on Security, Privacy and Ethics. Journal of Information Security, 12(3), 45-59.

Butunbaev, T. N. 2020. Features of International Legal Cooperation in Combating Cyber Crime. International Journal of Approximate Reasoning, 8(5), 100-107.

Cai, C. 2015. Cybersecurity in the Chinese Context: Changing Concepts, Vital Interests, and Prospects for Cooperation. Journal of Cybersecurity, 1(1), 471-496.

Caporale, G., W.-Y. Kang, F. Spagnolo, & N. Spagnolo. 2020. Cyber-Attacks and Cryptocurrencies. CESifo Working Paper Series No. 8124.

Cho, Y. & J. Chung. 2017. Bring the State Back In: Conflict and Cooperation Among States in Cybersecurity. Pacific Focus, 32, 290-314.

Christou, G. 2016. Cybersecurity in the Global Ecosystem. Journal of Cyber Policy, 2, 35-61.

da Costa, S., D. Darmawan, & A. de Jesus Isaac. 2022. Self-Identity Formation and Social Perception of Individuals through Interaction on Social Media in a Digital World, Journal of Social Science Studies, 2(2), 273 – 278.

Darmawan, D, C, N. Mendonca, & A. de Jesus Isaac. 2022. Managing Corporate Reputation in the Digital Age: Challenges and Solutions for Maintaining a Positive Image on Social Media, Journal of Social Science Studies, 2(1), 283 – 288.

Das, S., R. Gutzwiller, R. D. Roscoe, P. Rajivan, Y. Wang, L. J. Camp, & R. Hoyle. 2020. Humans and Technology for Inclusive Privacy and Security. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 64(1), 461-464.

DeCoste, J. 2017. The Impact of Cyber-attacks on Publicly Traded Companies. Theses, Concordia University

DeNardis, L. 2020. The Cyber-Physical Policy Moment. The Internet in Everything, 1(1), 112-130.

Duan, Y. 2019. Balancing the Free Flow of Information and Personal Data Protection. SSRN Electronic Journal, 3484713.

Fujs, D., A. Mihelič, & S. Vrhovec. 2019. The Power of Interpretation: Qualitative Methods in Cybersecurity Research. Proceedings of the 14th International Conference on Availability, Reliability and Security, 1-10.

Haapamäki, E. & J. Sihvonen. 2019. Cybersecurity in Accounting Research. Managerial Auditing Journal, 34(7), 808-834.

Holsopple, J., S. Yang, & M. Sudit. 2015. Mission Impact Assessment for Cyber Warfare. In Intelligent Methods for Cyber Warfare. Springer, Switzerland.

Hussain, A., A. Mohamed, & S. Razali. 2020. A Review on Cybersecurity: Challenges & Emerging Threats. Proceedings of the 3rd International Conference on Networking, Information Systems & Security, 1-7.

Ilves, L. K., T. Evans, F. J. Cilluffo, & A. A. Nadeau. 2016. European Union and NATO Global Cybersecurity Challenges: A Way Forward. Prism: A Journal of the Center for Complex Operations, 6, 126-141.

Issalillah, F. & R. Hardyansah. 2022. The Impact of the Digital Divide and Misinformation on Participation and Trust in Local Communities, Journal of Social Science Studies, 2(2), 7 – 12.

Jha, S. K. & S. S. Kumar. 2021. Cybersecurity in the Age of the Internet of Things: An Assessment of the Users’ Privacy and Data Security. Expert Clouds and Applications, 5(2), 98-115.

Kalalo, F. P. & F. Maramis. 2019. Urgency of Private Data Protection in the Digital Communication Era. Journal of Legal Studies, 2(1), 261-268.

Liu, X., C. Qian, W. G. Hatcher, H. Xu, W. Liau, & W. Yu. 2019. Secure Internet of Things (IoT)-based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities. IEEE Acess, 7, 79523-79544.

Pala, A. & J. Zhuang. 2019. Information Sharing in Cybersecurity: A Review. Decision Analysis, 16(2), 172-196.

Peters, A. & A. Jordan. 2019. Countering the Cyber Enforcement Gap: Strengthening Global Capacity on Cybercrime. Journal of National Security Law & Policy, 10(3), 487-524.

Piduru, B. R. 2021. Cybersecurity in the Era of Remote Work: Challenges and Strategies for Secure Digital Workplaces. International Journal of Science and Research (IJSR), 9(4), 12-27.

Rahim, N. A., S. Hamid, M. L. M. Kiah, S. Shamshirband, & S. Furnell. 2015. A Systematic Review of Approaches to Assessing Cybersecurity Awareness. Kybernetes, 44(5), 606-622.

Rodrigues, M. A. & M. Kormann. 2015. Collecting and Processing Personal Data: Addressing Data Protection and Privacy Issues by Design. Proceedings of the European Conference on Information Systems, 40-41.

Romansky, R. & I. Noninska. 2020. Challenges of the Digital Age for Privacy and Personal Data Protection. Mathematical Biosciences and Engineering, 17(5), 5288-5303.

Rout, M. & A. Kaur. 2020. A Review on Cybersecurity and its Challenges. Journal of Emerging Tehcnologies and Innovative Research (JETIR), 5(11), 322-325.

Shaikh, A. S., A. Khan, S. Zebanaaz, S. Shaikh, & N. Akhter. 2021. Exploring Recent Challenges in Cyber Security and Their Solutions. Journal of Cybersecurity Studies, 15(3), 67-89.

Sheffi, Y. 2015. The Power of Resilience: How the Best Companies Manage the Unexpected. MIT Press.

Soldatova, V. I. 2020. Protection of Personal Data in Digital Environment. Journal of Digital Law, 1, 33-43.

Tanczer, L., I. Brass, & M. Carr. 2018. CSIRTs and Global Cybersecurity: How Technical Experts Support Science Diplomacy. Global Policy, 9(3), 60-66.

Tatar, U., H. Bahsi, & A. Gheorghe. 2016. Impact Assessment of Cyber-attacks: A Quantification Study on Power Generation Systems. 2016 11th System of Systems Engineering Conference (SoSE), 1-6.

Tawalbeh, L., F. Muheidat, M. Tawalbeh, & M. Quwaider. 2020. IoT Privacy and Security: Challenges and Solutions. Applied Sciences, 10, 4102.

Downloads

Published

2023-11-24

How to Cite

Gardi, B., & Eddine, B. A. S. (2023). Cyber Security and Personal Data Protection in the Digital Age: Challenges, Impacts, and Urgency of Global Collaboration. Bulletin of Science, Technology and Society, 2(3), 58–63. Retrieved from https://inti.ejournalmeta.com/index.php/inti/article/view/89

Similar Articles

<< < 1 2 3 4 5 6 7 8 9 > >> 

You may also start an advanced similarity search for this article.