Skip to main content

Data Protection

  • Living reference work entry
  • Latest version View entry history
  • First Online:
Book cover Encyclopedia of Security and Emergency Management
  • 82 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Data Protection Act. (2018). http://www.legislation.gov.uk/ukpga/2018/12/contents/enacted

  • Fadia, A., & Zacharia, M. (2008). Network intrusion alert: An ethical hacking guide to intrusion detection. Boston, Massachusetts: Course Technology.

    Google Scholar 

  • Gartner. (2018). Gartner worldwide IT spending forecast, Gartner Market Databook. https://www.gartner.com

  • Islam, M. N., Islam, M. F., & Shahrabi, K. (2015). Robust information security system using steganography, orthogonal code and joint transform correlation. International Journal for Light and Electron Optics, 126, 4026–4031.

    Article  Google Scholar 

  • Muhleisen, M. (2018). The long and short of digital revolution. Finance & Development, International Monetary Fund.

    Google Scholar 

  • Stair, R. M., & Reynolds, G. W. (2017). Fundamentals of information systems. Boston, Massachusetts: Cengage Learning.

    Google Scholar 

  • Stallings, W., & Brown, L. (2018). Computer security: Principles and practice. Upper Saddle River, New Jersey: Pearson.

    Google Scholar 

  • Whitman, M. E., & Mattord, H. J. (2016). Principles of information security. Boston, Massachusetts: Cengage Learning.

    Google Scholar 

Further Reading

  • Bala, D. (2008). Biometrics and information security. Proceedings of the 5th annual conference on Information security curriculum development (InfoSecCD '08) ACM, 64–66.

    Google Scholar 

  • Chen, D., & Zhao, H. (2012). Data security and privacy protection issues in cloud computing. IEEE International Conference on Computer Science and Electronics Engineering.

    Google Scholar 

  • Hayden, L. (2010). IT Security Metrics: A Practical Framework for Measuring Security and Protecting Data.

    Google Scholar 

  • Islam, M. N. (2011). Encryption and multiplexing of fingerprints for enhanced security. Proceedings of IEEE Long Island Systems, Applications and Technology Conference (LISAT).

    Google Scholar 

  • Kaufman LM (2009). Data security in the world cloud of computing. IEEE Security and Privacy, 7(4): 61–64.

    Google Scholar 

  • Krutz RL & Vines RD (2010). Cloud Security: A Comprehensive Guide to Secure Cloud Computing.

    Google Scholar 

  • Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in wireless body area networks. 17(1): 51–58.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Nazrul Islam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Islam, M.N. (2019). Data Protection. In: Shapiro, L., Maras, MH. (eds) Encyclopedia of Security and Emergency Management. Springer, Cham. https://doi.org/10.1007/978-3-319-69891-5_95-2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69891-5_95-2

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69891-5

  • Online ISBN: 978-3-319-69891-5

  • eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences

Publish with us

Policies and ethics

Chapter history

  1. Latest

    Data Protection
    Published:
    29 June 2019

    DOI: https://doi.org/10.1007/978-3-319-69891-5_95-2

  2. Original

    Data Protection
    Published:
    28 February 2019

    DOI: https://doi.org/10.1007/978-3-319-69891-5_95-1