Digital Islamic Humanities

Digital Islamic Humanities

How to secure personal data in digital humanities

Document Type : Original Article

Author
Assistant professor of the research group of jurisprudence and Islamic Law, Ferdowsi University of Mashhad, Mashhad, Iran
Abstract
Benefiting from personal data as one of the basic resources in the field of digital humanities; It is a multifaceted matter and a combination of advantages and challenges. Although data-based research provides valuable insight into how people interact with human and Islamic knowledge and helps to develop learning resources and tools, the use of personal data in the field of digital humanities has many challenges. One of the most important challenges is how to effectively protect information privacy and maintain the security of personal data. This is especially true for specific personal data that require special protection due to the nature of the data itself or the data subjects. In this regard, this research, focusing on the necessity of such protection, by relying on the descriptive-analytical method and benefiting from the comparative method, has concluded that in this field personal data must be protected in both technical and legal dimensions. In fact, the flow of requirements related to personal data, including the principles governing processing as a legal solution, as well as the use of data anonymization and pseudonymization methods and the use of the data protection management system as technical methods are necessary. It seems that paying attention to these dimensions and the legislator's effort to realize such protections can provide maximum benefit and minimum harm to the data subjects in the face of digital humanities.
Keywords

  1.  

    1. Bhaimia, S. (2018). The General Data Protection Regulation: the Next Generation of EU Data Protection. Legal Information Management, 18(1), 21–28. https://doi.org/10.1017/s1472669618000051
    2. Bitar, H. and J., & Bjorn. (2017). GDPR : Securing Personal Data in Compliance with new EU-Regulations A7009N GDPR : Securing Personal Data in Compliance with new EU- Regulations Luleå University of Technology. Business.
    3. Cruz, A. do S. C., Alvarez, E. B., & Vital, L. P. (2022). Web application for data collection in marketing strategies: an approach from the perspective of Digital Humanities. ICST Transactions on Scalable Information Systems, 9(5), 1–10. https://doi.org/10.4108/eetsis.v9i5.2611
    4. Eija, S. (2018). applying general data protection regulation in small organizations simplified framework and templates for managing a privacy. School of Business and Culture.
    5. EUR-Lex. (2016). Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation – GDPR). Official Journal of the European Union, 1–88. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679&from=EN
    6. Hawkins, S. (Ed.). (2021). Access and Control in Digital Humanities. Routledge. https://doi.org/10.4324/9780429259616
    7. Koevoets, D. (2017). The Influence of Article 89 GDPR on the Use of Big Data Analytics for the Purpose of Scientific Research [Tilburg University]. http://arno.uvt.nl/show.cgi?fid=142885
    8. Krtalic, M., Marcetic, H., & Micunovic, M. (2016). Personal digital information archiving among students of social sciences and humanities. Information Research: An International Electronic Journal, 21(2), 1-19
    9. Kubben, P., Dumontier, M., & Dekker, A. (Eds.). (2019). Fundamentals of Clinical Data Science. Springer International Publishing. https://doi.org/10.1007/978-3-319-99713-1
    10. Latifzadeh, Mahdieh., Ghabooli Darafshan, Seyyed Mohammad Mahdi., Mohseni, Saeed., & Abadi, Mohammad. (2023). How personal data processing is conducted in the European Union law and its examination in the Iranian legal system. *Journal of Information Processing and Management, 39*(1), 157-199.
    11. Marelli, L., & Testa, G. (2018). Scrutinizing the EU General Data Protection Regulation How will new decentralized governance impact research? Science, 496–498. https://doi.org/10.1126/science.aar5419
    12. Öğütçü, G., Testik, Ö. M., & Chouseinoglou, O. (2016). Analysis of personal information security behavior and awareness. Computers & Security, 56, 83-93.
    13. Pormeister, K. (2017). Genetic data and the research exemption: Is the GDPR going too far? International Data Privacy Law, 7(2), 137–146. https://doi.org/10.1093/idpl/ipx006
    14. Pratomo, A. B., Mokodenseho, S., & Aziz, A. M. (2023). Data Encryption and Anonymization Techniques for Enhanced Information System Security and Privacy. West Science Information System and Technology, 1(01), 1-9.
    15. Rousseaux, F., & Saurel, P. (2015). How Should Digital Humanities Pioneers Manage Their Data Privacy Challenges? (pp. 75–91). https://doi.org/10.1007/978-3-319-28868-0_5
    16. Shabani, M., & Borry, P. (2018). Rules for processing genetic data for research purposes in view of the new EU General Data Protection Regulation. European Journal of Human Genetics, 26(2), 149–156. https://doi.org/10.1038/s41431-017-0045-7
    17. Singh, A. (2016). Protecting Personal Data as a Property Right. ILI Law Review, Winter Issue, 123–139.
    18. Voigt, P., & von dem Bussche, A. (2017). The EU General Data Protection Regulation (GDPR). Springer International Publishing. https://doi.org/10.1007/978-3-319-57959-7