References
Data Protection Act. (2018). http://www.legislation.gov.uk/ukpga/2018/12/contents/enacted
Fadia, A., & Zacharia, M. (2008). Network intrusion alert: An ethical hacking guide to intrusion detection. Boston, Massachusetts: Course Technology.
Gartner. (2018). Gartner worldwide IT spending forecast, Gartner Market Databook. https://www.gartner.com
Islam, M. N., Islam, M. F., & Shahrabi, K. (2015). Robust information security system using steganography, orthogonal code and joint transform correlation. International Journal for Light and Electron Optics, 126, 4026–4031.
Muhleisen, M. (2018). The long and short of digital revolution. Finance & Development, International Monetary Fund.
Stair, R. M., & Reynolds, G. W. (2017). Fundamentals of information systems. Boston, Massachusetts: Cengage Learning.
Stallings, W., & Brown, L. (2018). Computer security: Principles and practice. Upper Saddle River, New Jersey: Pearson.
Whitman, M. E., & Mattord, H. J. (2016). Principles of information security. Boston, Massachusetts: Cengage Learning.
Further Reading
Bala, D. (2008). Biometrics and information security. Proceedings of the 5th annual conference on Information security curriculum development (InfoSecCD '08) ACM, 64–66.
Chen, D., & Zhao, H. (2012). Data security and privacy protection issues in cloud computing. IEEE International Conference on Computer Science and Electronics Engineering.
Hayden, L. (2010). IT Security Metrics: A Practical Framework for Measuring Security and Protecting Data.
Islam, M. N. (2011). Encryption and multiplexing of fingerprints for enhanced security. Proceedings of IEEE Long Island Systems, Applications and Technology Conference (LISAT).
Kaufman LM (2009). Data security in the world cloud of computing. IEEE Security and Privacy, 7(4): 61–64.
Krutz RL & Vines RD (2010). Cloud Security: A Comprehensive Guide to Secure Cloud Computing.
Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in wireless body area networks. 17(1): 51–58.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this entry
Cite this entry
Islam, M.N. (2019). Data Protection. In: Shapiro, L., Maras, MH. (eds) Encyclopedia of Security and Emergency Management. Springer, Cham. https://doi.org/10.1007/978-3-319-69891-5_95-2
Download citation
DOI: https://doi.org/10.1007/978-3-319-69891-5_95-2
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69891-5
Online ISBN: 978-3-319-69891-5
eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences
Publish with us
Chapter history
-
Latest
Data Protection- Published:
- 29 June 2019
DOI: https://doi.org/10.1007/978-3-319-69891-5_95-2
-
Original
Data Protection- Published:
- 28 February 2019
DOI: https://doi.org/10.1007/978-3-319-69891-5_95-1