Theoretical aspects of the protection of personal data of employees of the enterprise by the method of pseudonymization
The topic of pseudonymization of personal data has shown, that theoretical and methodological basics in sphere of automatized systems have just started to gain general trend. The majority of studies in this sphere are, commonly, about personal data in general, rarely touching the topic of pseudonymi...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2020-01-01
|
Series: | E3S Web of Conferences |
Online Access: | https://www.e3s-conferences.org/articles/e3sconf/pdf/2020/70/e3sconf_itse2020_11001.pdf |
id |
doaj-239159d304904a8384b52dfab8a042e7 |
---|---|
record_format |
Article |
spelling |
doaj-239159d304904a8384b52dfab8a042e72021-04-02T16:19:55ZengEDP SciencesE3S Web of Conferences2267-12422020-01-012101100110.1051/e3sconf/202021011001e3sconf_itse2020_11001Theoretical aspects of the protection of personal data of employees of the enterprise by the method of pseudonymizationGazizov Andrey0Gazizov Evgeny1Gazizova Svetlana2Don State Technical UniversityKazan state agrarian UniversityKazan (Volga region) Federal UniversityThe topic of pseudonymization of personal data has shown, that theoretical and methodological basics in sphere of automatized systems have just started to gain general trend. The majority of studies in this sphere are, commonly, about personal data in general, rarely touching the topic of pseudonymization and depersonalization. Therefore, the topic of pseudonymization has not fully assimilated in enterprise systems and has not grown any popularity, because enterprises tend to choose reliable tools and methods of information security while depersonalization is only beginning its way and is not common for big corporations. This leads to disinterestedness in solving known issues and goals of pseudonymization, universal methods have not been researched. However, low cost and simplicity of this method of personal data protection is turning our attention on it and ask ourselves a question: “Should we have a deep dive in it?”. Answer is obvious – yes. Certainly, this method has its disadvantages and it is not an ideal solution. But it certainly should be distributed worldwide.https://www.e3s-conferences.org/articles/e3sconf/pdf/2020/70/e3sconf_itse2020_11001.pdf |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Gazizov Andrey Gazizov Evgeny Gazizova Svetlana |
spellingShingle |
Gazizov Andrey Gazizov Evgeny Gazizova Svetlana Theoretical aspects of the protection of personal data of employees of the enterprise by the method of pseudonymization E3S Web of Conferences |
author_facet |
Gazizov Andrey Gazizov Evgeny Gazizova Svetlana |
author_sort |
Gazizov Andrey |
title |
Theoretical aspects of the protection of personal data of employees of the enterprise by the method of pseudonymization |
title_short |
Theoretical aspects of the protection of personal data of employees of the enterprise by the method of pseudonymization |
title_full |
Theoretical aspects of the protection of personal data of employees of the enterprise by the method of pseudonymization |
title_fullStr |
Theoretical aspects of the protection of personal data of employees of the enterprise by the method of pseudonymization |
title_full_unstemmed |
Theoretical aspects of the protection of personal data of employees of the enterprise by the method of pseudonymization |
title_sort |
theoretical aspects of the protection of personal data of employees of the enterprise by the method of pseudonymization |
publisher |
EDP Sciences |
series |
E3S Web of Conferences |
issn |
2267-1242 |
publishDate |
2020-01-01 |
description |
The topic of pseudonymization of personal data has shown, that theoretical and methodological basics in sphere of automatized systems have just started to gain general trend. The majority of studies in this sphere are, commonly, about personal data in general, rarely touching the topic of pseudonymization and depersonalization. Therefore, the topic of pseudonymization has not fully assimilated in enterprise systems and has not grown any popularity, because enterprises tend to choose reliable tools and methods of information security while depersonalization is only beginning its way and is not common for big corporations. This leads to disinterestedness in solving known issues and goals of pseudonymization, universal methods have not been researched. However, low cost and simplicity of this method of personal data protection is turning our attention on it and ask ourselves a question: “Should we have a deep dive in it?”. Answer is obvious – yes. Certainly, this method has its disadvantages and it is not an ideal solution. But it certainly should be distributed worldwide. |
url |
https://www.e3s-conferences.org/articles/e3sconf/pdf/2020/70/e3sconf_itse2020_11001.pdf |
work_keys_str_mv |
AT gazizovandrey theoreticalaspectsoftheprotectionofpersonaldataofemployeesoftheenterprisebythemethodofpseudonymization AT gazizovevgeny theoreticalaspectsoftheprotectionofpersonaldataofemployeesoftheenterprisebythemethodofpseudonymization AT gazizovasvetlana theoreticalaspectsoftheprotectionofpersonaldataofemployeesoftheenterprisebythemethodofpseudonymization |
_version_ |
1721556984367415296 |