2019
DOI: 10.2139/ssrn.3490606
|View full text |Cite
|
Sign up to set email alerts
|

IoT and Smart Home Data Breach Risks from the Perspective of Croatian Data Protection and Information Security Law

Abstract: Standard-Nutzungsbedingungen:Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Zwecken und zum Privatgebrauch gespeichert und kopiert werden.Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich machen, vertreiben oder anderweitig nutzen.Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, gelten abweichend von diesen Nutzungsbedingungen die in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…This type of attack poses a new threat to smart home device users. The risks in smart homes fall into five classes: technical vulnerabilities, user data risk, a lack of encryption, privacy issues and increased complexity of the system [33]. On October of 2016, in one of the worst breaches, Mirai botnet attacked IoT, which affected the control of the world's Domain Name Server (DNS) infrastructure.…”
Section: Resultsmentioning
confidence: 99%
“…This type of attack poses a new threat to smart home device users. The risks in smart homes fall into five classes: technical vulnerabilities, user data risk, a lack of encryption, privacy issues and increased complexity of the system [33]. On October of 2016, in one of the worst breaches, Mirai botnet attacked IoT, which affected the control of the world's Domain Name Server (DNS) infrastructure.…”
Section: Resultsmentioning
confidence: 99%
“…Data Breach The intention of the attacker is to retrieve private and confidential information which may result through theft, loss of storage drives, stolen hardware, etc. A data breach may be unintentional which can occur due to accidental corruption of storage media resulting in privacy and data leakage [66].…”
Section: Data Attacksmentioning
confidence: 99%
“…When such services are in place and large amounts of data are collected, the current framework of data protection in the EU requires certain safeguards need to be undertaken to protect privacy of the users and prevent misuse of their personal data. This data may contain sensitive data or categories of data of interest to many data controllers, from the financial sector to the communication and content providers, market researches, and others (Vojković et al 2019).…”
Section: Smart City Iot and Privacymentioning
confidence: 99%
“…Finally, the data controllers need to carefully examine their processing operations. Through the records of processing activities, they need to establish proper and applicable basis for every personal data processing activity and those controllers responsible for IoT infrastructure will need to develop easily accessible and functional ways to let users exercise their data protection rights (Vojković et al 2019).…”
Section: Smart City Iot and Privacymentioning
confidence: 99%