skip to main content
10.1145/3277570.3277590acmotherconferencesArticle/Chapter ViewAbstractPublication PagesceccConference Proceedingsconference-collections
research-article

An Ontology Capturing the Interdependence of the General Data Protection Regulation (GDPR) and Information Security

Authors Info & Claims
Published:15 November 2018Publication History

ABSTRACT

High returns for processing personal data and low penalties for privacy violations led to the circumstance that protection of privacy was often not considered a priority. To counter this habit and to harmonize data protection laws throughout the European Union, the EU-Commission has adopted the General Data Protection Regulation (GDPR), clarifying data subject rights and ensuring an appropriate level of privacy protection.

Through high penalties for non-compliance (i.e. up to 2% - 4% of the annual worldwide turnover), GDPR was able to put high pressure on organizations to comply with the requirements. However, studies have shown that organizations are often overwhelmed by the actual requirements.

In this paper, we therefore aim to support organization to understand this complex topic by providing an ontology-based data protection knowledge base, which highlights the interdependency of GDPR and information security.

References

  1. Austrian Data Protection Authority. 2014. Federal Act concerning the Protection of Personal Data (DSG 2000). (2014).Google ScholarGoogle Scholar
  2. Heiko Behrendt. 2016. Neue Anforderungen der DSGVO für die IT Sicherheit. ULD - Unabhängiges Landeszentrum für Datenschutz (2016).Google ScholarGoogle Scholar
  3. Bundesamt für Sicherheit in der Informationstechnik. 2017. DSGVO BfDI Info 6. (2017).Google ScholarGoogle Scholar
  4. Auriol Degbelo. 2017. A Snapshot of Ontology Evaluation Criteria and Strategies. In Proceedings of Semantics 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Andreas Ekelhart, Stefan Fenz, Markus D Klemen, and Edgar R Weippl. 2006. Security ontology: Simulating threats to corporate assets. In International Conference on Information Systems Security. Springer, 249--259. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. EU-Commission. 2000. Charter of Fundamental Rights of the European Union. Official Journal of the European Communities (2000).Google ScholarGoogle Scholar
  7. EU-Commission. 2018. General Data Protection Regulation. Official Journal of the European Communities (2018).Google ScholarGoogle Scholar
  8. EU-Commission. 2018. Protection of personal data. Retrieved August 30, 2018 from https://ec.europa.eu/info/aid-development-cooperation-fundamental-rights/your-rights-eu/know-your-rights/freedoms/protection-personal-data_en/Google ScholarGoogle Scholar
  9. European Privacy Seal. 2017. EuroPriSe Criteria for the certification of IT products and IT-based services. (2017).Google ScholarGoogle Scholar
  10. Matthew Horridge. 2009. A Practical Guide To Building OWL Ontologies Using Protege. The University Of Manchester (2009).Google ScholarGoogle Scholar
  11. IBM. 2017. 10 Key Marketing Trends for 2017. Retrieved June 25, 2018 from https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=WRL12345USENGoogle ScholarGoogle Scholar
  12. ISO/IEC. 2013. ISO 27001: Information technology -- Security techniques -- Information security management systems - Requirements. (2013).Google ScholarGoogle Scholar
  13. ISO/IEC. 2013. ISO 27002: Information technology - Security techniques - Code of practice for information security controls. (2013).Google ScholarGoogle Scholar
  14. ISO/IEC Working Draft. 2017. ISO 27552: Information technology - Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management - Requirements and guidelines. (2017).Google ScholarGoogle Scholar
  15. Rainer Knyrim. 2017. DSGVO: Datenschutz-Grundverordnung. MANZ'sche Verlags-und Universitätsbuchhandlung.Google ScholarGoogle Scholar
  16. Isaac Kohen. 2017. GDPR Compliance: The impact on the information security sector. Retrieved June 25, 2018 from http://bigdata-madesimple.com/gdpr-compliance-the-impact-on-the-information-security-sector/Google ScholarGoogle Scholar
  17. Eirini Mougiakou and Maria Virvou. 2017. Based on GDPR privacy in UML: Case of e-learning program. In Information, Intelligence, Systems & Applications (IISA), 2017 8th International Conference on. IEEE, 1--8.Google ScholarGoogle Scholar
  18. E. Moyakine. 2018. GDPR and Cyber Security: An opportunity that cannot be ignored. Retrieved June 25, 2018 from https://www.scmagazineuk.com/gdpr-and-cybersecurity-an-opportunity-that-cannot-be-ignored/article/739688/Google ScholarGoogle Scholar
  19. Natalya F Noy, Deborah L McGuinness, et al. 2001. Ontology development 101: A guide to creating your first ontology. (2001).Google ScholarGoogle Scholar
  20. ITGP Privacy. 2017. EU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide. IT Governance Ltd. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Bel G Raggad. 2010. Information security management: concepts and practice. CRC Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Knyrim Rainer. 2012. Datenschutzrecht: Praxishandbuch für richtiges Registrieren, Verarbeiten, Übermitteln, Zustimmen, Outsourcen, Werben uvm. Manz.Google ScholarGoogle Scholar
  23. Slimani Thabet. {n. d.}. A Study on Ontologies and their Classification. Recent Advances in Electrical Engineering and Educational Technologies ({n. d.}).Google ScholarGoogle Scholar
  24. ULD. 2018. Standard Datenschutzmodell SDM. In Konferenz der unabhängigen Datenschutzbehörden des Bundes und der Länder.Google ScholarGoogle Scholar
  25. Veriscan Security AB. 2017. Information Security Management System (ISMS) and handling of personal data. Retrieved Oktober 12, 2017 from http://veriscan.se/assets/media/Produktblad/ISMS%20and%20GDPR_EN_v1.0.pdfGoogle ScholarGoogle Scholar
  26. Michael E Whitman and Herbert J Mattord. 2011. Principles of information security. Cengage Learning. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An Ontology Capturing the Interdependence of the General Data Protection Regulation (GDPR) and Information Security

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          CECC 2018: Proceedings of the Central European Cybersecurity Conference 2018
          November 2018
          109 pages
          ISBN:9781450365154
          DOI:10.1145/3277570

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 15 November 2018

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          CECC 2018 Paper Acceptance Rate19of30submissions,63%Overall Acceptance Rate38of65submissions,58%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader