A Bibliometric Analysis of Legal Approaches to Personal Data Protection
Main Article Content
Abstract
This study employs bibliometric analysis to explore the expansive field of data privacy and security, utilizing data extracted from VOSviewer to identify thematic clusters, discern research trends, evaluate research opportunities, and analyze author collaboration networks. The analysis reveals several key thematic areas, including data security, legal frameworks, information privacy, and technological challenges associated with big data. These themes have evolved over time, demonstrating a shift from foundational legal principles to addressing complex technological and demographic-specific challenges, such as those related to children's data privacy. The study highlights significant concentrations of research activity as well as less explored areas that offer new opportunities for research, such as the legal status of data and specific privacy concerns that are under-represented in current literature. Furthermore, the author collaboration network provides insights into the structure of the research community, showing both dense clusters of collaboration and potential for new entrants to establish niches in emerging topics. This bibliometric perspective not only elucidates the current landscape of data privacy and security research but also points to future directions that can enhance the field's development.
Article Details
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
References
A. Yarali, “Cybersecurity in Digital Transformation Era,” 2023.
G. Harinath, “Does personal data protection matter in data protection law? A transformational model to fit in the digital era,” Handb. Big Data Res. Methods, pp. 267–278, 2023.
V. P. Shehu and V. Shehu, “Human rights in the technology era–Protection of data rights,” Eur. J. Econ. Law Soc. Sci., vol. 7, no. 2, pp. 1–10, 2023.
M. Bocharnikova, T. Pestunova, and V. Selifanov, “Personal information security issues in the context of digital transformation of the economy, management and public communications,” Digit. Technol. Secur., pp. 36–52, Apr. 2023, doi: 10.17212/2782-2230-2023-1-36-52.
S. Solovkin, “Automated Collection of Data on a Person: Implicit Principles of Legal Regulation,” Cour. Kutafin Moscow State Law Univ., pp. 90–100, Apr. 2023, doi: 10.17803/2311-5998.2023.102.2.090-100.
A. Vuković, “Digital Evidence and Protection of Personal Data: Sociological and Law Aspect,” 2022.
R. Romansky, Digital Age and Personal Data Protection. 2022.
C. Wanyi and M. Luqi, “Shanghai Urban Digital Transformation and Enterprise Personal Data Protection,” J. Circuits, Syst. Comput., vol. 32, Dec. 2022, doi: 10.1142/S0218126623501803.
J. Bi, Y. Guo, N. He, and S. Wang, “Research on Personal Information Security Protection Measures in the Big Data Era,” Int. J. New Dev. Eng. Soc., vol. 7, no. 2, 2023.
T. Malik, “Digital Transformation through the Prism of Digital Identity,” J. Public Policy Pract., vol. 1, no. 2, pp. 33–48, 2022.
S. P. Index and G. Index, “Executive summary,” URL https//glavcom. ua/pub/pdf/49/4938/10_1. pdf, 2018.
D. P. F. Möller, “Cybersecurity in digital transformation,” in Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices, Springer, 2023, pp. 1–70.
C. Hu, “Protection of Personal Information in the Era of Big Data,” Front. Humanit. Soc. Sci., vol. 2, pp. 184–193, Sep. 2022, doi: 10.54691/fhss.v2i9.2128.
P. Samadi-Parviznejad, “The role of big data in digital transformation,” J. Data Anal., vol. 1, no. 1, pp. 42–47, 2022.
E. Kornacka and M. Monkiewicz, “Consumer protection in the financial market in the era of digital transformation,” in Digital Finance and the Future of the Global Financial System, Routledge, 2022, pp. 161–179.
P. M. Schwartz and D. J. Solove, “The PII problem: Privacy and a new concept of personally identifiable information,” NYUL rev., vol. 86, p. 1814, 2011.
G. Greenleaf and S. Livingston, “China’s personal information standard: the long march to a privacy law,” 2017.
C. J. Bennett and C. D. Raab, “Revisiting the governance of privacy: Contemporary policy instruments in global perspective,” Regul. Gov., vol. 14, no. 3, pp. 447–464, 2020.
L. A. Bygrave, “Data protection by design and by default: deciphering the EU’s legislative requirements,” Oslo Law Rev., vol. 4, no. 2, pp. 105–120, 2017.
L. M. I. Marcussen, “Promotion of Active and Healthy Ageing through mHealth for Healthy Older Adults: a scoping review.,” 2020.
F. J. Martínez-López, J. M. Merigó, J. C. Gázquez-Abad, and J. L. Ruiz-Real, “Industrial marketing management: Bibliometric overview since its foundation,” Ind. Mark. Manag., vol. 84, pp. 19–38, 2020.
C. Kuner, “International organizations and the EU general data protection regulation: exploring the interaction between EU law and international law,” Int. Organ. law Rev., vol. 16, no. 1, pp. 158–191, 2019.
H. J. Smith, S. J. Milberg, and S. J. Burke, “Information privacy: Measuring individuals’ concerns about organizational practices,” MIS Q., pp. 167–196, 1996.
B. Bulgurcu, H. Cavusoglu, and I. Benbasat, “Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness,” MIS Q., pp. 523–548, 2010.
H. J. Smith, T. Dinev, and H. Xu, “Information privacy research: an interdisciplinary review,” MIS Q., pp. 989–1015, 2011.
B. Goodman and S. Flaxman, “European Union regulations on algorithmic decision-making and a ‘right to explanation,’” AI Mag., vol. 38, no. 3, pp. 50–57, 2017.
M. E. Whitman and H. J. Mattord, Principles of information security. Thomson Course Technology Boston, MA, 2009.
R. H. Weber, “Internet of Things–New security and privacy challenges,” Comput. law Secur. Rev., vol. 26, no. 1, pp. 23–30, 2010.
F. Bélanger and R. E. Crossler, “Privacy in the digital age: a review of information privacy research in information systems,” MIS Q., pp. 1017–1041, 2011.
J. Phelps, G. Nowak, and E. Ferrell, “Privacy concerns and consumer willingness to provide personal information,” J. public policy Mark., vol. 19, no. 1, pp. 27–41, 2000.
D. J. Solove, “Introduction: Privacy self-management and the consent dilemma,” Harv. L. Rev., vol. 126, p. 1880, 2012.
J. R. Reidenberg, “Lex informatica: The formulation of information policy rules through technology,” Tex. L. Rev., vol. 76, p. 553, 1997.