Review
BibTex RIS Cite

Dijital Verilerimiz

Year 2023, Volume: 2 Issue: 2, 59 - 64, 29.12.2023

Abstract

Günümüz veri çağı olarak adlandırılabilir. Buradan yola çıktığımızda geçmişten günümüze değişen yaşam koşulları ve tarzları, bireysel alışkanlar, düşünme biçimlerinden iletişim şekillerine kadar herşey değişim geçirdi. Geçmiş yıllarda bir ülkede olan değişiklik sadece o ülkede kalırken artık ülke sınırları dışına çıkmasa bile anında herşeye erişim olması tüm dünya ülkelerini etkiler hale gelmiştir. Hem bireysel, fakat özellikle hem akademi hem de iş sektöründe veri önemli bir kavram olmuştur. Günümüzde veri güvenliği, organizasyonu, yönetimi, saklanması ve veri etiği kavramları her durumda karşımıza çıkmaya başlamıştır. Bu kavramlar iş alanında kolaylıklar getirmesinin yanında riskleride içinde barındırır. Bilgilerin saklanması, güvenliği, toplanması, mahremiyeti, kullanılacağı amaçlar, yöntemler ve kullanım süreci gibi aşamalarda eksiklik olması internet üzerinden sızıntılara yol açabildiği gibi art niyetli olarak tabir edilen kişiler ya da suç örgütleri kolayca verilerin tutulduğu merkezlere ulaşabilir. Tüm dünyada ve ülkemizde, özellikle Covid 19 pandemi süreci ile başlayan ve etkileri hala devam eden ekonomik kaygılar ve hayatın getirdiği sıkıntılar insanları internet üzerinden bilgi sahibi oldukları ya da olmadıkları çeşitli sosyal medya araçlarına, platformlara, sitelere bilgilerini girmeleri ile kolay kazanç elde etmeye yöneltmiştir. Bu nedenle internet ortamında girilen verilerin, korunması, güvenliği, mahremiyeti yanında veri etiği gibi konuların veri çağı olarak kabul ettiğimiz bu yüzyılda önemi giderek artmış, ülkeleri ulusal ve uluslararası arenada veri anayasası araştırmaya ve hazırlamaya yöneltmiştir. Bu makalede, ülkelerin istikrarlı bir şekilde yola devam etmesi, toplumun huzuru ve refahı için dikkatle incelenmesi gereken konular arasında olan veri güvenliği, korunması, gizliliği ve veri etiği üzerinde durulmuştur.

References

  • Abeler, J., Bäcker, M., Buermeyer, U., & Zillessen, H. (2020). COVID-19 Contact Tracing and Data Protection Can Go Together. JMIR mHealth and uHealth, 8(4), e19359. https://doi.org/10.2196/19359R.
  • Nikam & R. Shahapurkar, Data Privacy Preservation and Security Approaches for Sensitive Data in Big Data. 10.3233/APC210221 (2021).
  • Nikam, Rohit & Shahapurkar, Rekha. (2021). Data Privacy Preservation and Security Approaches for Sensitive Data in Big Data. 10.3233/APC210221.
  • Alabaichi, Ashwaq. (2020). A Review on Security Challenges and Approaches in the Cloud Computing. Bertino, Elisa & Ferrari, Elena. (2018). Big Data Security and Privacy. 10.1007/978-3-319-61893-7_25.
  • Bertino, E. (2016). Data Security and Privacy: Concepts, Approaches, and Research Directions. 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), 1, 400-407.
  • DJ. Hand, Aspects of Data Ethics in a Changing World: Where Are We Now? Big Data. 2018 Sep 1;6(3):176-190. doi: 10.1089/big.2018.0083. Epub 2018 Sep 17. PMID: 30283727; PMCID: PMC6154451.
  • Herschel, Richard & Miori, Virginia. (2017). Ethics & Big Data. Technology in Society. 49. 10.1016/j.techsoc.2017.03.003. M. K. Kagita, Security and Privacy Issues for Business Intelligence in IoT. 10.1007/978-3-030-12385-7_70 (2020).
  • Kagita, Mohan Krishna. (2020). Security and Privacy Issues for Business Intelligence in IoT. 10.1007/978-3-030-12385-7_70.
  • Kumar, Ravi & Raj, Herbert & Perianayagam, Jelciana. (2018). Exploring Data Security Issues and Solutions in Cloud Computing. Procedia Computer Science. 125. 691-697. 10.1016/j.procs.2017.12.089.
  • Khansa, Lara & Zobel, Christopher. (2014). Assessing Innovations in Cloud Security. Journal of Computer Information Systems. 54. 45-56. 10.1080/08874417.2014.11645703.
  • R. Kumar & H. Raj & J. Perianayagam, Exploring Data Security Issues and Solutions in Cloud Computing. Procedia Computer Science. 125. 691-697. 10.1016/j.procs.2017.12.089 (2018).
  • Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., & Guo, S. (2016). Protection of Big Data Privacy. IEEE Access, 4, 1821-1834.
  • Pronika, & Tyagi, Shyam. (2021). Secure Data Storage in Cloud using Encryption Algorithm. 136-141. 10.1109/ICICV50876.2021.9388388.
  • Rao, R. & Selvamani, K.. (2015). Data Security Challenges and Its Solutions in Cloud Computing. Procedia Computer Science. 48. 204-209. 10.1016/j.procs.2015.04.171.
  • Riaz, Shafia & Khan, Ali & Haroon, Muhammad & Latif, Sadia & Bhatti, Sana. (2020). Big Data Security and Privacy: Current Challenges and Future Research perspective in Cloud Environment.
  • Romansky, Radi & Noninska, Irina. (2020). Challenges of the digital age for privacy and personal data protection. Mathematical Biosciences and Engineering. 17. 5288-5303. 10.3934/mbe.2020286.
  • Coss, David. (2014). The CIA strikes back: Redefining confidentiality, integrity and availability in security. Journal of Information System Security. 10.
  • Shropshire, J.. (2014). Extending the cloud with fog: Security challenges & opportunities. 20th Americas Conference on Information Systems, AMCIS 2014.
  • Su, Chunli. (2019). Big Data Security and Privacy Protection. 87-89. 10.1109/ICVRIS.2019.00030.
  • S. Tabassam, Security and Privacy Issues in Cloud Computing Environment. Journal of Information Technology & Software Engineering. 07. 10.4172/2165-7866.1000216 (2017).
  • Tabassam, Shazia. (2017). Security and Privacy Issues in Cloud Computing Environment. Journal of Information Technology & Software Engineering. 07. 10.4172/2165-7866.1000216.
  • Takabi, Daniel & Joshi, James & Ahn, Gail-Joon. (2011). Security and Privacy Challenges in Cloud Computing Environments. Security & Privacy, IEEE. 8. 24 - 31. 10.1109/MSP.2010.186.
  • Yallop, Anca & Aliasghar, Omid. (2020). No Business as Usual: A Case for Data Ethics and Data Governance in the Age of Coronavirus. Online Information Review. ahead-of-print. 10.1108/OIR-06-2020-0257.
  • D. Zhang, Dongpo. (2018). Big Data Security and Privacy Protection. 10.2991/icmcs-18.2018.56.

Digital Data

Year 2023, Volume: 2 Issue: 2, 59 - 64, 29.12.2023

Abstract

Today can be called the age of data. From this point of view, everything has changed from the past to the present, involving living conditions and styles, individual habits, ways of thinking to forms of communication. In the past, a change in a country was confined to that country, whereas now, even if it does not leave the borders of the country, instant access to everything affects all countries of the world. Both for the individual, but especially in both academia and business, data has been an important concept. Today, the concepts of data security, organization, management, storage and data ethics have begun to appear in every situation. While these concepts bring convenience in business, they also involve risks. Deficiencies in stages such as the storage, security, collection, privacy, purposes, methods and process of use of information can lead to leaks over the internet, and so-called malicious people or criminal organizations can easily access the centers where the data is kept. All over the world and in our country, especially the economic concerns that started with the Covid 19 pandemic process and whose effects are still continuing, and the troubles brought by life have led people to earn easy profits by entering their information on various social media tools, platforms and sites that they may or may not have information on the internet. For this reason, the protection, incolumity and hiddenness of the datum entered on the internet, alongside of issues such as data ethics, have become increasingly important in this century, which we recognize as the data age, and have led countries to research and prepare data constitutions in the national and international arena. In this article, data security, protection, privacy and data ethics, which are among the issues that need to be carefully examined for the stability of countries and the peace and prosperity of society, are emphasized.

References

  • Abeler, J., Bäcker, M., Buermeyer, U., & Zillessen, H. (2020). COVID-19 Contact Tracing and Data Protection Can Go Together. JMIR mHealth and uHealth, 8(4), e19359. https://doi.org/10.2196/19359R.
  • Nikam & R. Shahapurkar, Data Privacy Preservation and Security Approaches for Sensitive Data in Big Data. 10.3233/APC210221 (2021).
  • Nikam, Rohit & Shahapurkar, Rekha. (2021). Data Privacy Preservation and Security Approaches for Sensitive Data in Big Data. 10.3233/APC210221.
  • Alabaichi, Ashwaq. (2020). A Review on Security Challenges and Approaches in the Cloud Computing. Bertino, Elisa & Ferrari, Elena. (2018). Big Data Security and Privacy. 10.1007/978-3-319-61893-7_25.
  • Bertino, E. (2016). Data Security and Privacy: Concepts, Approaches, and Research Directions. 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), 1, 400-407.
  • DJ. Hand, Aspects of Data Ethics in a Changing World: Where Are We Now? Big Data. 2018 Sep 1;6(3):176-190. doi: 10.1089/big.2018.0083. Epub 2018 Sep 17. PMID: 30283727; PMCID: PMC6154451.
  • Herschel, Richard & Miori, Virginia. (2017). Ethics & Big Data. Technology in Society. 49. 10.1016/j.techsoc.2017.03.003. M. K. Kagita, Security and Privacy Issues for Business Intelligence in IoT. 10.1007/978-3-030-12385-7_70 (2020).
  • Kagita, Mohan Krishna. (2020). Security and Privacy Issues for Business Intelligence in IoT. 10.1007/978-3-030-12385-7_70.
  • Kumar, Ravi & Raj, Herbert & Perianayagam, Jelciana. (2018). Exploring Data Security Issues and Solutions in Cloud Computing. Procedia Computer Science. 125. 691-697. 10.1016/j.procs.2017.12.089.
  • Khansa, Lara & Zobel, Christopher. (2014). Assessing Innovations in Cloud Security. Journal of Computer Information Systems. 54. 45-56. 10.1080/08874417.2014.11645703.
  • R. Kumar & H. Raj & J. Perianayagam, Exploring Data Security Issues and Solutions in Cloud Computing. Procedia Computer Science. 125. 691-697. 10.1016/j.procs.2017.12.089 (2018).
  • Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., & Guo, S. (2016). Protection of Big Data Privacy. IEEE Access, 4, 1821-1834.
  • Pronika, & Tyagi, Shyam. (2021). Secure Data Storage in Cloud using Encryption Algorithm. 136-141. 10.1109/ICICV50876.2021.9388388.
  • Rao, R. & Selvamani, K.. (2015). Data Security Challenges and Its Solutions in Cloud Computing. Procedia Computer Science. 48. 204-209. 10.1016/j.procs.2015.04.171.
  • Riaz, Shafia & Khan, Ali & Haroon, Muhammad & Latif, Sadia & Bhatti, Sana. (2020). Big Data Security and Privacy: Current Challenges and Future Research perspective in Cloud Environment.
  • Romansky, Radi & Noninska, Irina. (2020). Challenges of the digital age for privacy and personal data protection. Mathematical Biosciences and Engineering. 17. 5288-5303. 10.3934/mbe.2020286.
  • Coss, David. (2014). The CIA strikes back: Redefining confidentiality, integrity and availability in security. Journal of Information System Security. 10.
  • Shropshire, J.. (2014). Extending the cloud with fog: Security challenges & opportunities. 20th Americas Conference on Information Systems, AMCIS 2014.
  • Su, Chunli. (2019). Big Data Security and Privacy Protection. 87-89. 10.1109/ICVRIS.2019.00030.
  • S. Tabassam, Security and Privacy Issues in Cloud Computing Environment. Journal of Information Technology & Software Engineering. 07. 10.4172/2165-7866.1000216 (2017).
  • Tabassam, Shazia. (2017). Security and Privacy Issues in Cloud Computing Environment. Journal of Information Technology & Software Engineering. 07. 10.4172/2165-7866.1000216.
  • Takabi, Daniel & Joshi, James & Ahn, Gail-Joon. (2011). Security and Privacy Challenges in Cloud Computing Environments. Security & Privacy, IEEE. 8. 24 - 31. 10.1109/MSP.2010.186.
  • Yallop, Anca & Aliasghar, Omid. (2020). No Business as Usual: A Case for Data Ethics and Data Governance in the Age of Coronavirus. Online Information Review. ahead-of-print. 10.1108/OIR-06-2020-0257.
  • D. Zhang, Dongpo. (2018). Big Data Security and Privacy Protection. 10.2991/icmcs-18.2018.56.
There are 24 citations in total.

Details

Primary Language English
Subjects Embedded Systems
Journal Section Reviews
Authors

Nazmiye Öztürk 0000-0002-3527-3258

Tülay Öztürk 0000-0001-8393-2580

Barış Öztürk 0009-0007-8701-4147

Sultan Öztürk This is me 0009-0007-7033-4187

Ahmet Öztürk 0009-0008-4641-4440

Elif Sıla Öztürk This is me 0009-0001-1901-0749

Early Pub Date December 27, 2023
Publication Date December 29, 2023
Published in Issue Year 2023 Volume: 2 Issue: 2

Cite

APA Öztürk, N., Öztürk, T., Öztürk, B., Öztürk, S., et al. (2023). Digital Data. Sivas Cumhuriyet Üniversitesi Bilim Ve Teknoloji Dergisi, 2(2), 59-64.
AMA Öztürk N, Öztürk T, Öztürk B, Öztürk S, Öztürk A, Öztürk ES. Digital Data. CUJAST. December 2023;2(2):59-64.
Chicago Öztürk, Nazmiye, Tülay Öztürk, Barış Öztürk, Sultan Öztürk, Ahmet Öztürk, and Elif Sıla Öztürk. “Digital Data”. Sivas Cumhuriyet Üniversitesi Bilim Ve Teknoloji Dergisi 2, no. 2 (December 2023): 59-64.
EndNote Öztürk N, Öztürk T, Öztürk B, Öztürk S, Öztürk A, Öztürk ES (December 1, 2023) Digital Data. Sivas Cumhuriyet Üniversitesi Bilim ve Teknoloji Dergisi 2 2 59–64.
IEEE N. Öztürk, T. Öztürk, B. Öztürk, S. Öztürk, A. Öztürk, and E. S. Öztürk, “Digital Data”, CUJAST, vol. 2, no. 2, pp. 59–64, 2023.
ISNAD Öztürk, Nazmiye et al. “Digital Data”. Sivas Cumhuriyet Üniversitesi Bilim ve Teknoloji Dergisi 2/2 (December 2023), 59-64.
JAMA Öztürk N, Öztürk T, Öztürk B, Öztürk S, Öztürk A, Öztürk ES. Digital Data. CUJAST. 2023;2:59–64.
MLA Öztürk, Nazmiye et al. “Digital Data”. Sivas Cumhuriyet Üniversitesi Bilim Ve Teknoloji Dergisi, vol. 2, no. 2, 2023, pp. 59-64.
Vancouver Öztürk N, Öztürk T, Öztürk B, Öztürk S, Öztürk A, Öztürk ES. Digital Data. CUJAST. 2023;2(2):59-64.