Data protection
Research Topic
Language: English
This is a research topic created to provide authors with a place to attach new problem publications.
Research topics above this in the hierarchy
Research problems linked to this topic
- What impact did data regulations (linking to data prospects consultation and Impact Assessments) have on data sharing? What should we expect from the Government’s proposed changes?
- How should government encourage open data publication while minimising re-identification risks (the Mosaic Effect)?
- How can data flows be rapidly improved, promoting data sharing across research, government and industry to allow secure collaboration?
- How should the government best enable its transformation work to be ‘cloud native’ through scalable and secure digital services?
- How effective is UK government messaging and guidance on adopting cybersecurity? Do some messages land better than others? Why? With whom?
- How can governance and standards frameworks encourage greater inclusion and security across the ecosystem? What would a good framework for measuring inclusion in digital identity markets look like? How can we minimise security and privacy risks within digital identity solutions?
- Are there different hierarchies, professional groups or user types and behaviours that aid or block cyber security implementation? How do we best understand this both quantitatively and qualitatively?
- What are the critical emerging technologies on the 5, 10, and 15-year horizon which have the potential to change cyberspace or impact on the UK’s cyber-power and strategic advantage? What novel critical applications of existing technologies could have the potential to transform cyberspace? How should emerging technologies be prioritised for cyber security research?
- How do we ensure that AI adoption in the public sector is safe?
- Does the cyber security of AI models need to follow any novel principles that aren’t set out under existing policy and technology security principles? If so, what are these measures and how do the differ from what exists? How do the vulnerabilities/risk of AI model security differ from existing cyber threats?
- How can the quality assurance of security systems and processes be improved?
- Trust and accountability in using AI and machine learning within policing
- What measures and prioritisation tools can be used to better evaluate and target cyber risks with government interventions?
- What is the fragmentation impact of disparate data standards and regulations being developed globally?
- Real world threat detection and mitigation capability, ensuring minimal impact on privacy rights. This includes the exploitation of more of the electromagnetic spectrum; compressive sensing; connectivity; use of video analytics; the internet of things; wider use of smart technologies including tracking and remote systems; advanced materials; informatics. ###Threats in the stream of commerce (including people, vehicles, freight, parcels; to detect threats to safety, security, economy, health):
- How can open source data, big data and data science techniques inform us about the emerging trends in trade across different sectors?
- Public expectations and trust in relation to the capture and use of data within law enforcement
- Using biometrics, digital and behavioural aspects to assure identity and to understand and mitigate the possible deception of systems.
- In what ways will AI exacerbate the spread of mis/disinformation and is mis/disinformation spread by AI likely to be more effective in influencing UK audiences?
- What does the evidence show was more or less effective about the particularly intense engagement between local and national government during the pandemic, and what we have learnt about the key enablers developed between the tiers of government in this last period? Which of these would most helpfully be sustained in future (e.g. data sharing)?
- Data as a rival and nonrival economic good: Is there evidence that data privacy laws centred around individuals’ rights might hinder realising collective benefits? What are the potential remedies and interventions to resolve that?
- How are different countries balancing privacy concerns around digital contact tracing apps
- Exploitation of robust data sources.
- How would a shift towards interoperable / decentralised social media (aka ‘the fediverse’) alter how disinformation spreads, and the ability to be able to address it?
- What cyber interventions that DSIT or NCSC runs are the most effective at reducing cyber incidents and improving cyber resilience? How effective are the NIS Regulations at securing operators of essential services in the UK? How effective is carrying out each of the 10 Steps to Cyber Security at reducing cyber risk?
- To what extent are the types and trends of harmful online mis/disinformation consistent between larger and smaller platforms?
- How can we better understand the opportunities and impact of the use of digital technology on those engaging with the courts and tribunals system?
- What regulatory solutions could be efficiently deployed to mitigate harmful practices for digital consumers online? How do we measure their effectiveness?
- How can we ensure use of AI is ethical?
- What are the most effective policies and approaches taken by platforms to counter disinformation?
- What cyber interventions that DSIT or NCSC runs are most likely to be adopted and what is the positive impact of these? What drivers exist for the adoption of these? What are the barriers to adoption? Do sectors with more stringent regulatory measures see higher adoption of cyber security principles than non-regulatory driven protocols? What other non-UK government frameworks matter most to organisations?
- What is the impact of data security measures on international data flows?
- How does mis/disinformation spread between social media platforms, particularly primary and secondary platforms? How can it be identified and contained?
- What evidence is there for not embedding adequate cyber security in highly commercialised or direct-to-consumer tech? What evidence is there on cybersecurity not being embedded adequately in sectors with lower regulation?
- What risk is there that generative AI evolves such that the content it generates can avoid detection faster than tools can be developed to detect it? How can international and industry collaboration limit this risk?
- What is the trade-off of cost compared to security that companies are seeing? Could the cost of security cause businesses to minimise or abstain from effective security protocols and codes of practice that are produced by governments, regulators and international organisations/bodies? If so, what could be done to mitigate this risk?
- What is the potential of ledger technology for the measurement of financial services trade?