DATA PRIVACY AND SECURITY    

Authors : Dr. Urvashi Mishra, Ms. Suraksha Narang

Publishing Date : 2025

DOI : https://doi.org/10.52458/9789349381636.nsp.2025.eb.ch-10

ISBN : 978-93-49381-23-0

Pages : 164-179

Chapter id : NSP/EB/CRRISE/2025/Ch-10

Abstract : The internet is a crucial technology of the 21st century, transforming communication, business, entertainment, commerce, and everyday activities. Digital apps now cater to practically every requirement, enabling actions that previously demanded significant effort, such as bill payments, to be executed swiftly online. Due to smartphones and tablets that maintain our connectivity, Internet technology has progressed to a level where conventional computers are become unnecessary. This shift has facilitated equitable access to services, rendering them more economical and accessible to a broader demographic. For example, international calls, once expensive, are now predominantly supplanted by affordable video chats on platforms such as Skype and Google Meet. Nonetheless, the digital realm has substantial security challenges. Cybercriminals perpetually exploit flaws, jeopardizing data security and personal privacy. Individuals, organizations, and governments must adopt robust data security protocols, reconciling convenience with privacy, to cultivate trust in the digital age.

Keywords :

Cite : Mishra, U., & Narang, S. (2025). Data Privacy And Security (1st ed., pp. 164-179). Noble Science Press. https://doi.org/10.52458/9789349381636.nsp.2025.eb.ch-10

References :
  1. Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509–514. https://doi.org/10.1126/science.1250996
  2. Apple Inc. (2021). App tracking transparency: Empowering users to control data privacy.
  3. Bada, M., & Nurse, J. R. C. (2018). Addressing the human factor in cybersecurity: A review of behavioral interventions. Computers & Security, 78, 218–232.
  4. Bada, M., & Nurse, J. R. C. (2019). The human factor in cybersecurity: Understanding human behaviour to reduce cyber risks. Cybersecurity Journal, 7(1), 3–10.
  5. Bada, M., & Sasse, M. A. (2014). Cybersecurity awareness campaigns: Why do they fail? IEEE Security & Privacy, 12(5), 32–36.
  6. Binns, R. (2020). Privacy risks in data sharing and big data analytics. Journal of Information Systems, 34(1), 90–103. https://doi.org/10.1080/07421222.2020.1710109
  7. Binns, R., & Shapiro, R. (2021). The evolution of privacy-enhancing technologies. Journal of Cybersecurity and Data Privacy, 12(4), 233–251. https://doi.org/10.1080/20421310.2021.1876245
  8. Cate, F. H. (2018). The privacy economy: What can we expect from GDPR? Journal of Data Protection & Privacy, 2(4), 346–359.
  9. Check Point Research. (2024). The surge in utility cyberattacks: Emerging vulnerabilities in critical infrastructure.
  10. Cisco. (2021). Data privacy benchmark study: The impact of transparency on trust.
  11. Clarke, R. (1999). Introduction to dataveillance and information privacy, and definitions of terms. Computer and Society.
  12. DeCew, J. (2019). Privacy and the law: A critical analysis. Journal of Information Privacy and Security, 15(3), 35–50. https://doi.org/10.1080/15536548.2019.1649222
  13. Dinev, T., & Hart, P. (2021). Internet privacy concerns and the trade-off between personalized services and privacy. Information Systems Research, 32(2), 476–490. https://doi.org/10.1287/isre.2021.1006
  14. Rao, Roopa. (2024). Consumer Awareness and Education in India. In S. Singh, S. Dinesh, & R. Rao (Eds.), Resource Management (RM: ASSET): Advancements & strategies for education and transformation. pp. 265 – 324. Satish Serial Pub House, New Delhi, India.  satishserial.com/book/9788119105403/resource-management-rmasset-advancements-strategies-for-education-and-transformation
  15. Singh, S. (2023) Family Finance and Consumption Economics.  Himanshu Publications, New Delhi