ArticlePDF Available

Identifying personal physiological data risks to the Internet of Everything: the case of facial data breach risks

Authors:

Abstract and Figures

Personal physiological data is the digital representation of physical features that identify individuals in the Internet of Everything environment. Such data includes characteristics of uniqueness, identification, replicability, irreversibility of damage, and relevance of information, and this data can be collected, shared, and used in a wide range of applications. As facial recognition technology has become prevalent and smarter over time, facial data associated with critical personal information poses a potential security and privacy risk of being leaked in the Internet of Everything application platform. However, current research has not identified a systematic and effective method for identifying these risks. Thus, in this study, we adopted the fault tree analysis method to identify risks. Based on the risks identified, we then listed intermediate events and basic events according to the causal logic, and drew a complete fault tree diagram of facial data breaches. The study determined that personal factors, data management and supervision absence are the three intermediate events. Furthermore, the lack of laws and regulations and the immaturity of facial recognition technology are the two major basic events leading to facial data breaches. We anticipate that this study will explain the manageability and traceability of personal physiological data during its lifecycle. In addition, this study contributes to an understanding of what risks physiological data faces in order to inform individuals of how to manage their data carefully and to guide management parties on how to formulate robust policies and regulations that can ensure data security.
This content is subject to copyright. Terms and conditions apply.
ARTICLE
Identifying personal physiological data risks to the
Internet of Everything: the case of facial data
breach risks
Meng Wang1,2, Yalin Qin1,2, Jiaojiao Liu1,2 & Weidong Li 1
Personal physiological data is the digital representation of physical features that identify
individuals in the Internet of Everything environment. Such data includes characteristics of
uniqueness, identication, replicability, irreversibility of damage, and relevance of informa-
tion, and this data can be collected, shared, and used in a wide range of applications. As facial
recognition technology has become prevalent and smarter over time, facial data associated
with critical personal information poses a potential security and privacy risk of being leaked in
the Internet of Everything application platform. However, current research has not identied a
systematic and effective method for identifying these risks. Thus, in this study, we adopted
the fault tree analysis method to identify risks. Based on the risks identied, we then listed
intermediate events and basic events according to the causal logic, and drew a complete fault
tree diagram of facial data breaches. The study determined that personal factors, data
management and supervision absence are the three intermediate events. Furthermore, the
lack of laws and regulations and the immaturity of facial recognition technology are the two
major basic events leading to facial data breaches. We anticipate that this study will explain
the manageability and traceability of personal physiological data during its lifecycle. In
addition, this study contributes to an understanding of what risks physiological data faces in
order to inform individuals of how to manage their data carefully and to guide management
parties on how to formulate robust policies and regulations that can ensure data security.
https://doi.org/10.1057/s41599-023-01673-3 OPEN
1School of Journalism and Information Communication, Huazhong University of Science and Technology, Wuhan, Hubei Province, China.
2
These
authors contributed equally: Meng Wang, Yalin Qin, Jiaojiao Liu. email: liweidong_hust@qq.com
HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | (2023) 10:216 | https://doi.org/10.1057/s41599-023-01673-3 1
1234567890():,;
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
Introduction
We are now on the threshold of a new era of networking
in which the Internet of Everything (IoE) can embrace
IoE technologies, such as social networking, bio-
metrics, multimedia and data mining, that can build relationships
in various ways with terminals, platforms and users by connecting
things, people, data and business processes (Adel and Michael,
2014). Given the relentless growth in IoE devices and their
interaction with anybody with Internet access, virtually every-
thing from physiological data to behaviour data is collected
(Komendantova et al., 2021). The in-depth development of this
data offers benets to society for a variety of purposes in relation
to authentication, border security, marketing, photo editing and
social networking (Buckley and Hunter, 2011), but it also causes
frequent data leakage events due to increased potential for a
surveillance society (Buckley and Hunter, 2011).
In the past 5 years, a large number of serious personal data
leakage incidents have occurred around the world. For example,
in 2019 data leakage from Facebook in the United States impacted
540 million people. In addition, the SenseNets Horizon company
leaked billions of facial data. These noncompliant and illegal data
processing actions violate data protection laws (Raposo, 2022).
Furthermore, in the IoE environment, personal physiological data
has the characteristics of uniqueness, forever identication,
replicability, irreversibility of damage and relevance of informa-
tion. Leaked data violates individualsfundamental rights, such as
the right to consent and deletion, privacy, equality and property
(Brous et al., 2020; Raposo, 2022; Kindt, 2013). Data leaks can
also lead to enormous, permanent damage to governments and
enterprises. For example, in 2020 the Clearview AI data breach
exposed the rms client list, resulting in bankruptcy (Hill, 2020).
To prevent data breaches and protect overall privacy, various
countries have launched personal data protection mechanisms
and promulgated laws and regulations on data security. A total of
142 countries issued data privacy legislation by 2020, of which the
General Data Protection Regulation (GDPR) issued by the Eur-
opean Union (EU) has the greatest inuence (Greenleaf and
Cottier, 2020). Within the EU, the GDPR provides comprehen-
sive and strict protection for facial data, and it gives individuals
the right to informed consent and the right to delete. At the same
time, countries and companies have also established the ethics
compliance review to address accountability and transparency
concerns and to mitigate risks. For example, IBM established an
Ethics AI Board led by a Chief Privacy Ofcer for reviewing the
ethics of technology rollouts (Almeida et al., 2022).
Although there are numerous efforts to address these concerns,
data security and privacy risks have not been eradicated. The IoE
era is aimed at connecting everything, and physiological data is
easily accessible due to a large number of digital collecting devices
around us with high-risk factors for data breaches. Moreover, the
complexity of the cloud environment, the abundance of personal
data and the lack of a unied framework of risk identication
create real challenges to establishing a robust IoE scenario that
acknowledges all these elements and comprises comprehensive
data regulations (Al-Sharhan et al., 2019; Millard, 2013). There-
fore, the identication of personal physiological data risks is the
main task of current work and is also an important prerequisite to
solve the security and privacy problems of personal
physiological data.
Risk identication is the rst step of risk management (Ozgur
and Alkan, 2020; Mao et al., 2020). Only by choosing an effective
risk identication method and correctly identifying personal
physiological data risks can we actively take appropriate actions
to avoid risks and ensure the safety of personal physiological data.
The fault tree analysis method can identify the risks in the fault
system and rank the importance of these risks (Ruijters and
Stoelinga, 2015). Thus, by collecting, summarising and studying
cases of facial data breaches, we can summarise the causes of
personal physiological data breaches through the fault tree ana-
lysis method and provide insight into personal physiological data
security.
The IoE context connecting everything leads to more risk
sources for data breaches. Currently, a better and more profound
analysis of the data breach risks is necessary due to the lack of an
adequate understanding of privacy and risk awareness. Based on
these myriad considerations, this study uses facial data breach
accidents as the research objects and adopts fault tree analysis to
systematically and comprehensively investigate the risks of phy-
siological data breaches in line with the data lifecycle. The paper
is structured as follows. The next section provides a literature
review of relevant research. In the Methods section, we explain
the concepts of fault tree analysis and data lifecycle and further
outline the research steps. In the Data and Process section, we
describe the data selection criteria and present a complete fault
tree diagram of a facial data breach. In the Data Analysis and
Results section, we analyse reports of the minimal cut set and
reect on the structural importance of basic events. This works
contributions are presented in the Discussion section, after which
the Conclusion section briey summarises the main ndings and
implications.
The generation and application of personal physiological data
in the era of IoE
The IoE is a massive, complex network ecosystem consisting of
various elements such as objects, digital devices, individuals,
enterprises, governments and data resources through the support
of digital platforms and digital processes (Li, 2020). Compared
with the Internet of Things, the IoE has a wider range of con-
nected objects and can interact more profoundly with people and
the social environment (Adel and Michael, 2014), while the
Internet of Things only connects things (sensors and devices)
(Diega and Walden, 2016). In other words, the IoE is based on the
Internet of Things but enables thingsto be connected to any
device and anyone using any path (network) and any service at
any time (context) and anywhere (Spyros, 2018). In the IoE, the
generation and application of personal physiological data mainly
occur in the cloud, applications, and terminals.
In the traditional social environment, humans natural attri-
butes essentially belong to the category of privacy and are rarely
collected digitally. Nevertheless, personal physiological data has
been a crucial resource for data collection in the IoE environment.
Physiological data is more reliable and measurable than abstract
forms such as behavioural data because physiological data can
reect the human state intuitively and even can capture ones
state of mind. In a general sense, all human organs that constitute
physiological humanstend to be digitised.
Firstly, especially with the development of Internet of Nano
Things (IoNT) technology, more human organs can be digitised
and connected to the Internet. As the latest innovation of the IoE,
IoNT is a network formed by integrating nanomachines (with a
size range of 1100 nm) with the existing traditional commu-
nication network and high-speed Internet (Anand et al., 2017).
The IoNT can integrate nanosensors into various miniature
objects to realise the intelligent perception of subtle environ-
ments, and each of its functional tasks is performed by nano
machines. This allows the depth and breadth of the IoE to be
greatly expanded and enables sensors to connect nano-scale
devices as well. Thus, as long as the nanosensor is integrated into
the networked object, it can be connected to and communicate
with the Internet (Mainor and Patricia, 2019).
ARTICLE HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | https://doi.org/10.1057/s41599-023-01673-3
2HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | (2023) 10 :216 |https://doi.org /10.1057/s41599-023-01673-3
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
Secondly, the development of face recognition technology and
human body recognition technology has allowed increasing
amounts of facial data and human body data to be perceived and
collected. In order to achieve environmental intelligence, the IoE
needs to monitor and record the body movements, gestures,
location, background and environment of human users (Miraz
et al., 2015). Existing face recognition technology is mainly used
to distinguish facial attributes. The facial data that can be
recognised mainly includes the face frame, the key points of the
face, the pose estimation of the face, the natural attributes of the
face (i.e., whether one is wearing sunglasses, whether the face is
covered, whether there is a beard), and emotional expressions
(Kachur et al., 2020). Current human body recognition technol-
ogy mainly carries out human key point detection, which can
accurately estimate the 14 main key points of the human body in
pictures or videos, such as elbows, wrists and shoulders (Xu et al.,
2021). With multiple scenes, it can estimate multiple postures of
standing, sitting and moving so as to detect and recognise pos-
tures (Patel et al., 2017).
Moreover, with the innovation of emotion recognition system
and emotion computing technology, some new application plat-
forms are trying to scientically monitor individual emotions
(surprised, happy, sad, angry, calm), psychological conditions and
ideas by analysing the facial data or voice (Isiaka and Adamu,
2022; Kachur et al., 2020). For example, a mental health platform
based on biofeedback and emotional computing attempts to
capture and analyse the subtle colour changes of the facial
capillaries through the mobile phone camera to achieve the
monitoring of instantaneous heart rate and implicit respiration,
and on this basis, it helps users resist psychological problems such
as tension, anxiety, anger, depression, fatigue and insomnia (Li,
2020). In addition, digital platforms and technology companies
integrate and correlate usersphysiological data through emo-
tional calculation, in order to summarise the usersemotional
response to different stimuli, portray user images, and then put
advertisements or carry out targeted promotions (Isiaka and
Adamu, 2022).
Finally, with technological progress and the continuous gen-
eration of personal physiological data, the application of personal
physiological data in medical treatment, nance, education and
other elds has expanded rapidly. Taking the medical eld as an
example, a patient-centred health-data-sharing platform can
harvest data from multiple personal digital devices to increase
information accessibility and enhance the quality of health ser-
vices (Dhruva et al., 2020; Al-Sharhan et al., 2019; Carvalho et al.,
2019; Haraty et al., 2018; Gagnon et al., 2016). Medical and health
wearable devices generally have built-in sensors for measuring
human health that can automatically collect important data such
as blood pressure, pulse, heart rate and body temperature. At
present, smart bracelets, watches, glasses and athletic shoes can all
perform this function. Overall, health data is generated from
various sources, including electronic medical records, insurance
claims, Internet of Things devices, and social media posts, which
can be widely shared and applied, especially when it comes to
disease treatment (Wang et al., 2017).
Risks to personal physiological data in the IoE
The IoE has a wide range of connected objects and can interact in
profound ways with people and the social environment (Mahoney
and LeHong, 2012; Adel and Michael, 2014). The IoE has formed
a huge user pool and has revolutionised social relations, infor-
mation and knowledge sharing, as well as marketing opportu-
nities (AlAlwan et al., 2017; Kapoor et al., 2018; Shiau et al.,
2017). In this process, a variety of embedded devices or operating
systems monitor an individuals vital organs to continuously
create physiological data second-by-second in order to provide
various intelligent services, such as smartwatches used for eval-
uating sleeping quality (Sundar, 2020; Kwon et al., 2014). Hence,
personal physiological data is becoming the most important data
resource in the IoE era, and this data is widely digitised, recorded
and tracked.
However, efciency and service improvements are often
accompanied by increased security concerns (Sundar, 2020; Hadi
et al., 2019; Hashem et al., 2016; Hossain and Dwivedi, 2014).
Worse still, in the era of the IoE, technology companies, digital
media platforms and the governmentpowered by intelligent
collection equipment and information technologyare collecting
physiological data on peoples digital daily lives in invisible ways.
From the security inspection measures in public places such as
airports and stadiums to ubiquitous cameras and face payment in
supermarkets, physiological data is increasingly becoming an
indispensable part of digital life that is almost beyond personal
control (Lyon, 2017). A new survey has listed 10 breach risk
sources and costs of a personal data breach (see Fig. 1), indicating
that data breach is a complex and systematic problem. Particu-
larly, physiological data is sensitive personal data and can face
unprecedented threats once leaked (Jain et al., 2008). These
threats abound in personal physiological data and may carry dire
consequences for individuals, enterprises and nations (Brous
et al., 2020). For individuals, physiological data breaches can
cause privacy violations, property loss, genetic discrimination,
security threats, and serious emotional and mental harm (Chin
et al., 2012; Ji et al., 2018; Li et al., 2017; Kindt, 2013; Kilovaty,
2021). Breaches can also violate the fundamental rights of indi-
viduals which are enshrined in data protection laws, such as the
right to informed consent, access and erasure, which can further
damage traditional rights to ones personal image, reputation and
dignity. For enterprises, a variety of problems such as reduced
credibility, damage to economic interests and lawsuits can result
from a data breach (Kshetri, 2014). In the Clearview AI case,
several major technology companies such as Google, Facebook,
YouTube and Twitter publicly condemned Clearview AI follow-
ing the data breach. On the national level, the impact of a phy-
siological data breach can be far-reaching. For example, US credit
enterprise Equifax was attacked by hackers who breached the data
of 143 million US citizens, posing a serious threat to US national
security. Undoubtedly, the serious threats of data breaches cause
great costs to the damaged entities for mitigating its effect, such as
repairing the vulnerability, training employees, legal costs, and
more (Kilovaty, 2021), which has led to the urgency of the breach
Fig. 1 Cost of a Data Breach Report 2022 (from IBM Security, 2022).
Note: Measured in USD millions. The most common initial attack vector in
2022 was stolen or compromised credentials, responsible for 19% of
breaches in the study, at an average cost of USD 4.50 million.
HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | https://doi.org/10.1057/s41599-023-01673-3 ARTICLE
HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | (2023) 10:216 | https://doi.org/10.1057/s41599-023-01673-3 3
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
problem. Thus, a better and more profound analysis of the data
breach risks is necessary due to the lack of an adequate under-
standing of threats and risk awareness.
The application and uniqueness of facial data
The GDPR denes personal data as information related to an
identied or identiable natural person (data subject) and limits
the processing of special types of personal data (personal sensitive
information), including ngerprints, DNA, height, iris patterns,
facial features and palm prints. As a special category of personal
physiological data, facial data is a highly sensitive form of per-
sonal sensitive information. At the same time, facial data has
assumed as an increasingly vital role in daily life due to the
ubiquitous presence of face recognition technology, which is
characterised by high acceptability, collectability and universality
(Jain and Ross, 2004; Günther et al., 2017; Sepas-Moghaddam
et al., 2019). Face recognition technology became especially suc-
cessful as a result of the non-contact measures imposed during
the COVID-19 pandemic. Scenarios in which face recognition
technology has been applied include smart transportation
(Karantzoulidis, 2019; Wollerton, 2019; Toor, 2017), device
unlocking (Chmielewski, 2015; Finnegan and Kapo, 2018;
Tengyuen, 2017), banking (Kan, 2015; Knight, 2017; Petroff,
2016), online retailer services (Association, 2013; Bates, 2017;
Pearson, 2018; Romero, 2019), security checks (Wallace, 2018;
West, 2019; Wolfe-Robinson, 2019; Oliver, 2019) and health care
(Li et al., 2017; Ji et al., 2018).
Compared with other physiological data, facial data is unique.
Firstly, facial data can be collected imperceptibly and used widely
compared with ngerprint, palmprint or iris data due to non-
contact and wide application of face recognition technology, thus
facing more breach risks. Secondly, facial data has certain varia-
bility. The face can be changed through time, cosmetic surgery or
light, resulting in more recognition difculties and even recog-
nition errors than that of ngerprint, palmprint or iris data. In
addition, facial data is a special kind of personal sensitive data
related with privacy, which not only covers the personality
interests of the face, such as personal portrait, reputation and
human dignity, but also reects the additional economic value of
data. Therefore, due to these similarities and differences, on the
one hand, just like facial data breaches, other physiological data
breaches can also be caused by similar risk sources and can
produce similar serious consequences, such as privacy violations,
property loss or physical danger (Sepas-Moghaddam et al., 2019;
Ghaffary, 2019; Mehmood and Selwal, 2020; Nandakumar and
Jain, 2015). On the other hand, compared with other physiolo-
gical data, a facial data breach occurs more frequently and can
lead to more harmful effects. Given that facial data is widely used
and has high breach frequency, it is necessary to study facial data
breach risks in order to inform individuals and data management
parties of how to manage data carefully. Therefore, the identi-
cation of personal physiological data risks, especially facial data
risks, is the main task of current work.
Current research on risk identication
Risk identication is the foremost step of risk evaluation and
management because timely and effective risk identication
serves as the basis of overall safety protection. The results of risk
identication can help to inform individuals, government agen-
cies and enterprises of the appropriate measures they should take
to address data security concerns. When identifying personal data
breach risks, previous scholars have mainly adopted empirical
and positive research approaches, and empirical research is more
used comparatively. Existing empirical research has identied
several risks leading to data breach accidents; these risks are
primarily related to IoE devices, IoE technologies, third parties
(enterprises, governments), user behaviour, malicious attackers
and irregular operations (Palattella et al., 2016; Perlroth, 2016;
Kshetri, 2014). Positive research methods are diverse and more
often rely on questionnaires. Scholars have used questionnaires to
collect information on hidden risks that endanger personal data
security and have concluded that insufcient personal protection
awareness and imperfect management systems are the reasons for
personal information disclosure (Yan et al., 2018; Liu, 2015). As
security incidents caused by physiological data breaches have
raised concerns all over the world, individuals are increasingly
aware of the importance of their physiological data and the
possible risks of data breaches (Finnegan and Kapo, 2018).
Scholars have also dedicated research efforts to the identication
of personal physiological data breach risks (Ratha et al., 2001;
Tuyls et al., 2007; Kumar et al., 2018). Previous studies have
determined that the risks of physiological data breaches mainly
come from indirect attacks and direct attacks (Jain et al., 2018;
Smith et al., 2018; Wang et al., 2020). Indirect attacks are carried
out from inside the data system, such as attacks by hackers, staff
stealing data, template or database modifying, and other unau-
thorised accessing or activity (Tuyls et al., 2007). Direct attacks
mainly refer to technology and device attacks, which are espe-
cially prevalent among immature face recognition technology and
vulnerable collecting sensors.
In sum, existing research on the risks of personal data breaches
has established a basic risk identication reference and listed
several risk sources, but the research also has deciencies. Firstly,
particularly in the IoE era, primary data risks arise during data
liquidity (Etzioni, 2015; Mayer-Schönberger and Cukier, 2013).
To date, there has been little research on risks during data
liquidity. Alshammari and Simpson (2017) suggested that
understanding the data lifecycle as a representation of data
liquidity could be the path to perceiving and tracing physiological
data risks. Secondly, few studies have used systematic and
objective methods to study and explain personal data breach risks
and their logical relationship. A data breach is a kind of accident,
but no one has tried to analyse data breaches with accident
management methods. Thirdly, physiological data has multiple
attributes, once leaked, the consequences are more serious than
traditional personal data breaches. Moreover, facial data, as a
special kind of personal physiological data, is widely used and has
high breach risks. However, there is little research on the iden-
tication of personal physiological data breach risks, especially
facial data breach risks. Finally, data breach is a widespread and
complex problem involving multiple cases, and a single data
breach case cannot fully explain comprehensive breach risks, and
can no longer meet the research needs.
Methods
There are many studies related to risk identication methods. The
main methods of risk identication include fault tree analysis
(Yuan et al., 2021), the Delphi method (Gephart et al., 2013),
brainstorming (Feng et al., 2017), scenario analysis (Haab et al.,
2010), checklist method (Ozgur and Alkan, 2020), Bayesian
network analysis (Mao et al., 2020) and the analytic hierarchy
process (Liang and Lin, 2017). Considering the complexity of data
breaches as well as the effectiveness and reliability of conclusions,
we selected fault tree analysis (FTA) as our method for the fol-
lowing reasons.
Firstly, the fault tree analysis method has a wide range of
applications and a mature research system. It is a diagram and
deductive procedure for safety and reliability analysis in which
the causal chain leading to failure is explored using graphical
tools (Ruijters and Stoelinga, 2015). It can determine the various
ARTICLE HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | https://doi.org/10.1057/s41599-023-01673-3
4HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | (2023) 10 :216 |https://doi.org /10.1057/s41599-023-01673-3
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
combinations of system failures and human errors that can cause
undesired events (referred to as top events) at the system level
through logic gates (Kabir, 2017). In fault tree analysis, starting
from the fault state of the system, we aim to comprehensively
identify the risk causes leading to the top event, and we clarify the
direct and potential events of the accident through in-depth
analysis in a logical and hierarchical way. This method is parti-
cularly suited to the analysis of complex systems because it can
effectively model a vast number of system components, and it is
therefore widely used in the aerospace, energy, network infor-
mation systems and construction elds.
Secondly, as a massive and complex system, the IoE contains a
large amount of personal data. Within such a complex system,
there are various factors that can lead to a data breach. Fault tree
analysis can be used in complex systems to identify multiple risks
caused by personal, administrative and environmental factors in
an intuitive and logical way. It can specically and clearly analyse
the causes and propagation processes of faults, which is conducive
to further risk management and data safety.
Thirdly, a data breach is a kind of accident, but no one has
tried to analyse data breaches with accident management meth-
ods. The fault tree analysis method can explore the impact of each
basic event on the accident through qualitative analysis so as to
determine the priority of measures for the safety control of each
basic event and to provide a timely and effective solution or
reference for urgent data breach accidents. Therefore, the fault
tree analysis method is feasible and appropriate for analysing
personal data security problems.
Horton (1985) proposed the concept of an information life-
cycle composed of a series of logical stages and maintained that
this lifecycle is the natural law of information movement. In the
context of information-centric domains, data is dynamic,
changeable and ubiquitous, and it is subject to a variety of actions
including collection, storage, usage, transmission and destruc-
tionby several actors for various purposes. These combined
actions constitute a data lifecycle. The data lifecycle provides a
means to classify, compare and construct data and provides a
framework that can systematically and proactively identify and
address risks during the various periods of a potential data
breach. Likewise, any kind of physiological data undergoes the
process of collection, storage, usage, transmission and destruc-
tion. In each period of the data lifecycle, a physiological data
breach usually involves similar functions, purposes and partici-
pants. Therefore, physiological data breach risks can be general-
ised by taking a facial data breach event as the research object
based on data lifecycle.
We regard facial data breaches as an undesired or top event,
and we analyse facial data breaches through a case study based on
a data lifecycle with ve stages: data collection, data storage, data
transmission, data usage and data destruction. We adopt fault
tree analysis to determine the failure mode leading to facial data
breach and the importance of various risk factors to the accident.
The procedure is performed stepwise, with the rst step being a
choice of the top event (T), in this case, facial data breach, which
is an undesirable event associated with the facial data system. The
next step is to determine all the secondary events classied into
intermediate events (M) and basic events (X) by considering the
data lifecycle and risk factors that can cause the top event (T). If
two or more secondary events must both occur to cause the top
event, these events will be linked in the tree by an ANDgate.
According to this study, the top event T is caused by the three
intermediate events of M
1
,M
2
and M
3
with the logic of the AND
gate. However, if either of the events will cause the top event, the
secondary events will be linked to the top event by an ORgate.
Then, an ordering of causative events with a logical relationship
will be generated until the fault tree diagram is presented. A
further step involves sorting out the minimal cut sets of the fault
tree and then calculating the structural importance. Finally,
according to the results, we can identify the most signicant
vulnerabilities in the system and make effective recommendations
for reducing the risks associated with those vulnerabilities. The
terminologies and symbols in the fault tree diagram are explained
in Table 1.
Data and process. A personal data breach means a breach of
security leading to the accidental or unlawful destruction, loss,
alteration, or unauthorised disclosure of or access to personal
data (Voigt and Von dem Bussche, 2017). Thus, a breach is more
than just losing personal data. Facial data, as a sensitive data type
that can be linked to eternal identity, can also have a detrimental
impact on an individual or society if the data is breached. In order
to identify and enumerate the risks leading to facial data breach
and to list the casual events in the fault tree diagram, we collect
cases from the China National Knowledge Internet (CNKI)
newspaper database, China Search (chinaso.com), Baidu News
and Google News using the keywords facial data breach,facial
data accident,facial data abuse,face recognitionand facial
data. We select 22 facial data breach cases that have occurred
since 2019 as the research objects. The selected cases meet the
following criteria.
1) Typicality: The case has attracted extensive attention and
discussion across society and has a certain social inuence and
representativeness.
2) Availability: As a method suitable for complex systems, fault
tree analysis requires multi-channel and multi-type data to
explain and support a case. Therefore, we generally select current
cases that have been publicly reported by the media or studied in
academic research to obtain detailed supporting materials. These
Table 1 Fault tree symbols (Barlow and Proschan, 1975).
Event symbol Terminology Description
Top Event, T
represents top
event
The TOP event is the accident
that is being analysed.
Intermediate Event,
Mi represents
intermediate event
The INTERMEDIATE events are
system states or occurrences that
somehow contribute to the
accident.
Basic Event, Xi
represents basic
event
The BASIC event indicates a
basic initiating event at the limit
of resolution.
Undeveloped Event The UNDEVELOPED event is
undeveloped because there we
either lack information or the
event is of no consequence.
Gate symbol Terminology Description
AND Gate The AND gate indicates that the
output fault (drawn above the
gate) only occurs if two (or
more) input faults (drawn below
the gate) occur.
OR Gate The OR gate indicates that the
output fault occurs if at least one
of the two (or more) input faults
occur.
HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | https://doi.org/10.1057/s41599-023-01673-3 ARTICLE
HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | (2023) 10:216 | https://doi.org/10.1057/s41599-023-01673-3 5
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
cases have a complete and clear development background, which
can ensure the validity of the research.
3) Heterogeneity: Facial data breach accidents are pervasive
issues, and therefore similar, homogeneous cases that make it
difcult to extract variables. As such, cases with a range of elds,
places of occurrence and subjects involved shall be considered.
The breach cases are shown in Table 2. The details of these
cases can be found in Appendix 1.
This paper analyses and extracts the risks of each facial data
breach accident according to two aspects: (1) The causes or risks
of facial data breaches are directly pointed out in the news report.
For example, in the passenger information breach of U.S.
Customs and Border Protection (CBP) in May 2019, the causes
for the data breach were that a subcontractor violated the
protocol policy and transmitted photos of passengers and license
plates to a home network without authorisation; this database was
then attacked by hackers. (2) The other aspect is based on the
expert analysis of a news report. For example, February 2019
witnessed a facial data breach accident in SenseNets Horizon. The
direct causes of the breach were no password protection for the
internal databaseand an access restriction conguration fault.
However, some experts added that the company had insufcient
security awareness and there are loopholes in its network security
compliance.
This paper starts from the top event and then determines the
intermediate events, basic events and the logical relationship
between them level by level based on the risks of facial data
breach cases identied via the aspects of direct cause and expert
analysis. Three PhD students initially sort the risks based on the
two aspects and then discuss them, and one professor nally
checks and conrms the risks. Overall, the validity of the selected
cases and collective intelligence contribute to the accuracy and
completeness of the identied risks and the logical relationship.
After that, to simplify the fault tree diagram, we code each event
and present an event code list, as shown in Table 3.
Then, in line with the event code list (Table 3), the events of
each level are connected by logic gates according to the logical
relationship between the top event (T), intermediate event (M)
and basic event (X) sorted from the 22 selected breach cases so as
to present the fault tree diagram of facial data breach level by level
(as shown in Fig. 2). The rst level is the top event (T), the second
level is the intermediate event (M), the third level is the basic
event (X). Overall, Tis caused by M,Mis caused by X.T,Mand
Xare all exacted from the 22 cases.
Facial data breach is always caused by various factors. These
factors can form some causal chain, such as Individuals
insufcient security awarenesscan be caused by Personal greed
for small gainsor Incautious about the related productsor
Individuals lack deletion consciousness. The following example
will clearly present how this process could be applied when
performing a fault tree analysis on the facial data breach (see Fig. 3):
The event to analyse: M
1
(Risk arisen by individual)
The contributing factor 1: M
4
(Individuals insufcient security
awareness)
Possible causes for M
4
:X
1
(Personal greed for small gains), X
2
(Incautious about the related products), X
3
(Individuals lack
deletion consciousness)
The contributing factor 2: M
5
(Individuals unsafe actions)
Possible contributing factors to M
5
:X
4
(Individuals use simple
password), X
5
(Individuals upload facial data for entertainment
actively and casually), X
6
(Individuals download unapproved
APPs)
In this example, factor 1 (M
4
) and factor 2 (M
5
) combined
could ultimately cause M
1
, represented by an ANDgate,
meaning the two events always occur together which could lead
to M
1
. Each gate is then expanded level by level to ultimately
identify the lowest-level causes.
Data analysis and results
Analysis of minimal cut set. In the structural analysis of a fault
tree diagram, the minimal cut set (MCS) is the minimal basic
event combination leading to the occurrence of a top event, and
this reects the risk of the system. The number of MCSs in the
fault tree is equal to the kinds of possibilities leading to the top
event. In other words, the more the MCSs, the more the paths of
accidents, and therefore the riskier the system. The Fussell-Vesely
algorithm is usually adopted to calculate MCSs: starting from the
top event, the upper-output event of the logic gate is explained by
the lower-input event level by level according to the different
logical relations of the intersection. If it is an ORgate, the union
of input events (represented by multiplication) is presented. If it is
Table 2 Facial data breach cases.
No. Case No. Case
1 New data breach has exposed millions of ngerprint and facial
recognition records
12 Students sue online exam proctoring service Proctor U for
biometrics violations following data breach
2 Clearview AI data breach exposes facial recognition rms client list 13 Hackers breach thousands of security cameras, exposing Tesla,
Jails, hospitals
3 In 2019, it was reported that hackers breached Apples iPhone FaceID
user authentication in just 120s
14 The SenseNets Horizon company leaks billions of facial data.
4 A group of hackers breached popular surveillance and facial recognition
camera company, Verkada
15 IBM collects online photos without consent, the individual nd it
impossible to delete their facial data
5 Facial data of thousands of Chinese students has been leaked 16 Everalbum collects facial pictures illegally
6 Residential neighbourhoods across China are adopting facial recognition 17 Facial data leakage of students in some schools in Sichuan and
Gansu
7 LLC, transferred copies of CBPs biometric data, such as traveller images,
to its own company network
18 Zhang Fu and others violated citizenspersonal information and
fraud
8 Biometric information exposed in slot machine operator data breach 19 Abuse of face recognition in stores such as Kohler bathroom and
BMW
9 7-Eleven breached customer privacy by collecting facial imagery without
consent
20 Twinnings personal information breach
10 Consumer-facing companies still have few incentives to stop data
breaches, and thats a national security concern
21 The biometric data leakage occurred to Suprema
11 Massive biometric data breach found in system used by banks and Met
police
22 Abuse of face recognition technology in housing sales industry
(29 administrative punishment cases)
ARTICLE HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | https://doi.org/10.1057/s41599-023-01673-3
6HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | (2023) 10 :216 | https://doi.org /10.1057/s41599-023-01673-3
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
Table 3 List of events at all levels.
Code Event Code Event
TFacial data breach X
12
Web crawler collection
M
1
Risk caused by an individual X
13
Illegal collection by ofine face recognition camera
M
2
Risk during data management X
14
App illegally opens cameras of mobile phone and other devices to collect
data
M
3
Supervision absence X
15
The enterprise has ineffective security measures and insufcient data
protection capacity
M
4
Individuals insufcient security awareness X
16
Insufcient safety education
M
5
Individuals unsafe actions X
17
The database without password
M
6
Risk during data collection X
18
Simple username and password
M
7
Risk during data storage X
19
Access rights conguration error
M
8
Risk during data transmission X
20
Incorrectly congured databases
M
9
Risk during data usage X
21
Not desensitised core data
M
10
Risk during data destruction X
22
Low server security
M
11
The supporting policies not keeping up with technology X
23
Equipment lost
M
12
Data is collected randomly X
24
The physically compromised storage device
M
13
Insufcient awareness of safety responsibilities X
25
The equipment is not updated in time
M
14
Unsafe database X
26
Interface attack
M
15
Illegal use X
27
Management account is hijacked
M
16
Defective collection equipment X
28
Malware attack
M
17
Low difculty of collection X
29
Data outsourcing, hosted by a third-party company
M
18
Illegal collection X
30
Data exiting
M
19
Database security protocol aw X
31
Data is captured during data transmission
M
20
Vulnerable physical storage device X
32
Commercial companies actively sell data
M
21
Database is attacked X
33
Commercial companies went bankrupt and data was resold
M
22
Illegal actions by data management party X
34
Operators steal data
M
23
Illegal actions by the third party X
35
Remote access by operators leaves data on other devices
M
24
Hacker attack X
36
Illegal storage of data by third parties
X
1
Personal greed for small gains X
37
Illegal transfer of copies by third parties
X
2
Incautious about the related products X
38
The third-party did not delete the data as required
X
3
Individuals lack deletion consciousness X
39
Illegal trade
X
4
Individuals use simple password X
40
The data user has not fully considered or prepared for the risk
X
5
Individuals upload facial data for entertainment actively and
casually
X
41
The management party failed to delete the data as required
X
6
Individuals download unapproved Apps X
42
Incomplete data deletion
X
7
Immature face recognition technology X
43
Lack of laws and regulations
X
8
The device is invaded by Trojan Horse programme X
44
Lack of collection standards and specications
X
9
The collection device is invaded physically X
45
Lack of implementation rules for face recognition technology
X
10
Rough collection method X
46
The review mechanism of science and technology ethics is incomplete
X
11
Concealed collection means X
47
Lack of data deletion mechanism
Fig. 2 Fault tree diagram of a facial data breach. Tis caused by M,Mis caused by X.
HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | https://doi.org/10.1057/s41599-023-01673-3 ARTICLE
HUMANITIES AND SOC IAL SCIENCES COMMUNICATIONS | (2023) 10:216 | https://doi.org/10.1057/s41599-023 -01673-3 7
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
an ANDgate, the intersection of input events (represented by
addition) is presented. This continues until all events are replaced
with bottom events (basic events). In this way, the nal algorithm
result is composed of several MCSs. According to Fig. 1, the top
event Tis caused by the three intermediate events of M
1
,M
2
and
M
3
with the logic of the ANDgate. In this way, we obtain the
formula of the top event as T=M
1
×M
2
×M
3
. Subsequently, M
1
is caused by M
4
ANDM
5
;M
2
is caused by M
6
ORM
7
ORM
8
ORM
9
ORM
10
; and M
3
is caused by M
11
ANDX
43
.
Accordingly;M1¼M4´M5
M2¼M6þM7þM8þM9þM10
M3¼M11 ´X43
We simplify the fault tree diagram of facial data breach by
Boolean algebra as follows:
T¼M1´M2´M3¼ðM4´M5Þ´ðM6þM7þM8
þM9þM10Þ´ðM11 ´M43 Þ
After step-by-step analysis, the bottom combination which
cannot be decomposed constitutes the MCS, or the most basic path
to the top event. Finally, we obtain 1224 MCSs, indicating that the
current facial data system is extremely vulnerable and weak.
Analysis of structural importance. The structural importance
analysis serves to assess the importance of each basic event from
the fault tree diagram. The occurrence of each basic event has an
impact on the top event, but the degree of impact is different. We
conduct a structural importance analysis to clarify the degree of
impact of each basic event, and we then rank each event
according to impact degree. In this way, we can prioritise the
events when taking safety precautions and ensure that the system
remains economical, effective and safe. As a method of qualitative
importance analysis, structural importance analysis is easy to
perform and interpret, especially when quantitative data is absent.
There are two means to analysing structural importance: the rst
is to accurately calculate the structural importance of each basic
event and then arrange it from large to small, but this is complex and
cannot be carried out when the fault tree is large. The second is to
approximately calculate the importance of each basic event according
to the MCS. The following four principles should be followed when
using the second approach (Barlow and Proschan, 1975):
(1) The structural importance of the basic event in a single
MCS is the largest.
(2) All basic events that appear only in the same MCS have the
same structural importance.
(3) The degree of structural importance of each basic event that
appears in several MCSs with the same number of basic
events depends on the number of occurrences; that is, the
number of occurrences is low and the structural importance
degree is small. The number of occurrences is greater, its
structural importance degree is also large. The occurrence
times are equal, and the structural importance degree
is equal.
(4) If two basic events occur in MCSs with a different number
of basic events, their structural importance degree is
determined according to the following conditions: if
their occurrence frequencies in the MCSs are equal, the
structural importance degree of basic events in the MCSs
with few events is greater. If the events appear less often
in the MCS with few events and more often in the MCS
with multiple events, they can be approximately calculated
by the following formula (Zhang and Cui, 2002):
IiðÞ¼
Xi2Kj
1
2ni1
where I(i) represents the approximate value of structural
importance degree of basic event Xi;Xi Kj represents the basic
event Xi belongs to the MCS of Kj; and n
i
represents the number
of basic events in the MCS where the basic event Xi is located.
Based on this principle, the structural importance analysis of
the basic event of a facial data breach is carried out. Combined
with the fault tree diagram, it is found that X
43
is a single event
that lies at the third level, which is the highest level among all
basicevents.Therefore,theimportanceofthebasiceventX
43
is
the largest. X
7
appears twice in the fourth level of the fault tree
diagram. The number of occurrences is higher, and its
structural importance degree is accordingly large; therefore,
X
7
has the second greatest importance. According to principle
(4), if the occurrence frequencies in the MCSs are equal, the
structural importance of basiceventsintheMCSswithfew
events is greater. Compared with (X
44
,X
45
,X
46
,X
47
), (X
1
,X
2
,X
3
)
and (X
4
,X
5
,X
6
) have fewer basic events, and the importance
rank shall be X
1
=X
2
=X
3
=X
4
=X
5
=X
6
>X
44
=X
45
=X
46
=
X
47
. Likewise, X
44
=X
45
=X
46
=X
47
>X
40
>X
8
=X
9
=X
10
=
X
11
=X
12
=X
13
=X
14
=X
15
=X
16
=X
17
=X
18
=X
19
=X
20
=
X
21
=X
22
=X
23
=X
24
=X
25
=X
26
=X
27
=X
28
=X
29
=X
30
=
X
31
=X
32
=X
33
=X
34
=X
35
=X
36
=X
37
=X
38
=X
39
=X
41
=
X
42.
Finally, the rank of structural importance of each basic event
can be obtained as follows:
X
43
>X
7
>X
1
=X
2
=X
3
=X
4
=X
5
=X
6
>X
44
=X
45
=X
46
=
X
47
>X
40
>X
8
=X
9
=X
10
=X
11
=X
12
=X
13
=X
14
=X
15
=
X
16
=X
17
=X
18
=X
19
=X
20
=X
21
=X
22
=X
23
=X
24
=X
25
=
X
26
=X
27
=X
28
=X
29
=X
30
=X
31
=X
32
=X
33
=X
34
=X
35
=
X
36
=X
37
=X
38
=X
39
=X
41
=X
42.
By comparing and analysing the occurrence frequency of the
basiceventsintheMCS,itcanbefoundthatLack of laws and
regulations(X
43
)andImmaturity of face recognition technol-
ogy(X
7
) have the greatest structural importance, which are
important factors for a facial data breach. Facial data breach is a
comprehensive issue involving multiple stakeholders, including
Fig. 3 Part of fault tree diagram of facial data breach. M
1
is caused by M
4
and M
5
.M
4
is caused by X
1
or X
2
or X
3
.M
5
is caused by X
4
or X
5
or X
6
.
ARTICLE HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | https://doi.org/10.1057/s41599-023-01673-3
8HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | (2023) 10 :216 | https://doi.org /10.1057/s41599-023-01673-3
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
technology companies, data platforms and various government
departments. At present, it is difcult to clarify and agree on the
lack of supervision and which jurisdiction the leakage of facial
data belongs to, so it is future critical work to clarify the
regulatory authority and regulatory responsibilities as well as to
establish a unied and authoritative regulatory body and a
multi-sector coordination mechanism. Particularly since the
COVID-19 pandemic, face recognition technology has been
widely applied, but the technology is far from mature, and there
is a lack of corresponding regulatory rules and standards.
Considering these vulnerabilities, many countries have issued
national technology development strategies and formulated
laws, regulations and national standards to monitor the
development and application of facial recognition technology.
In addition, the events related to individual consciousness (X
1
,X
2
,
X
3
) and unsafe behaviour (X
4
,X
5
,X
6
) also have greater structural
importance, demonstrating that the individual plays a vital role in
personal data protection. Therefore, all related parties should
jointly carry out public education on Personal greed for small
gains(X
1
), being Incautious about the related products(X
2
)and
the fact that Individuals lack deletion consciousness(X
3
)to
comprehensively improve individualsawareness of data protection
and further avoid personal unsafe behaviours, such as Individuals
use simple password(X
4
), Individuals upload facial data for
entertainment actively and casually(X
5
)andIndividuals down-
load unapproved apps(X
6
).
Discussion
In this work, we identify potential and traditional breach risks of
personal physiological data and assess the degree of importance of
risk factors based on the fault tree diagram of facial data breach
cases. We are also interested in proposing measures to reduce
risks and opening up more avenues for building a robust data
system for personal physiological data security.
First of all, the risk sources identied can effectively help
identify various risks of physiological data breaches, providing
some reference for relevant parties to conduct privacy and data
protection. We take facial data breaches as the top event, collect
related facial data breach cases, and identify the risks of cases
combined with the risk causes of facial data breaches that are
directly observed in the news reports and the expert analyses.
Based on the risk identication, we list the 24 intermediate events
and 47 basic events according to a logical relationship and thus
draw a complete fault tree diagram of facial data breaches.
According to the fault tree diagram of facial data breaches, we
identied 1224 MCSs leading to the top event, demonstrating that
facial data is vulnerable and can easily be breached. In the IoE era,
personal physiological data is collected, stored and used on a large
scale by various Internet service providers, which poses a sig-
nicant risk of leakage. To some extent, this will seriously
threaten the privacy and security of individuals (Li, 2020). Then,
through the calculation of the structural importance based on the
MCS, we obtained the importance rank of each basic event. The
results indicated that Lack of laws and regulations(X
43
),
Immature face recognition technology(X
7
), Personal greed for
small gains(X
1
), Incautious about the related products(X
2
),
Individuals lack deletion consciousness(X
3
), Individuals use the
simple password(X
4
), Individuals upload facial data for enter-
tainment actively and casually(X
5
) and Individuals download
unapproved apps(X
6
) are the main factors leading to a facial
data breach. In addition, in the context of IoE, we have also found
some potential breach risk sources that have been ignored by
previous studies, such as devices on physical attack surfaces and
unsafe data transmission in cloud environments. Aiming at the
emerging potential risk sources, the related parties need to update
the risk knowledge and take targeted preventive measures to
better protect privacy and data security.
Then, we have found that three types of events most easily lead
to facial data breach: Risk caused by individual(M
1
), Risk
during data management(M
2
) and Supervision absence(M
3
),
because they are the three intermediate events closest to the top
event. Facial data breach is an integrative problem, and its
complexity indicates that a breach is closely related to various
factors, such as individuals, data management and legal super-
vision. Firstly, the disclosure of personal physiological data is
closely related to personal active online behaviour. The pre-
valence of social media and the ubiquity of biometric technology
have jointly subverted our way of life (Isaka and Adamu, 2022).
Individuals need to use symbols that can identify themselves to
promote and show themselves to society. In this process, personal
privacy regarded as an important part of digital personal identity
will be actively spread. Secondly, data management presents more
intensive branches, indicating that data management involves the
most breach problems. Primary data is not static and can be
changed. Data undergoes a variety of actions for various pur-
poses, including collection, storage, transmission, usage and
destruction, which forms the data lifecycle and is difcult to
manage. Each data lifecycle model has its own specic focus and
risks (Alshammari and Simpson, 2017). Below the data man-
agement, the periods of data collection, data storage and data
usage are the intermediate events that incur the most risk, indi-
cating that there are many management vulnerabilities in the
collection, storage and usage of physiological data. Moreover, a
proactive regulator is a signicant attribute in privacy security
and data protection (Almeida et al., 2022). Supervision absence
(M
3
) can easily lead to problems such as shifting responsibility,
the excessive power of the platform, and difculties in safe-
guarding personal rights, which increases the occurrence of data
breach events and the severity of risks (Almeida et al., 2022). In
recent years, with the popularisation of biometric technology, the
supporting regulatory policies and practical operation procedures
have not been fully implemented. Although the EU has begun to
implement GDPR known as the strictest data act, most countries
are still in the exploratory stage. Taking face recognition tech-
nology as an example, there are great disputes between several
states in the United States and European countries on whether to
allow the use of this technology, which reects the difculty of
legislation and regulation of this technology. Physiological data
breach is a comprehensive issue involving multiple stakeholders,
including third parties, technology companies, data platforms and
various government departments. At present, it is difcult to
clarify and agree on the lack of supervision and which jurisdiction
the leakage of physiological data belongs to. Overall, the large-
scale application of physiological data closely related to personal
privacy is a worrying problem. During the data uid procedure,
there are more personnel and processes involved and invisible
data breach risks are increased accordingly. Privacy has been
placed in the dynamic practice of highly networked social
structure, and individuals are increasingly difcult to control the
ow and boundary of privacy.
We have assessed the structural importance of each basic event.
The basic events are located at the end of each branch of the fault
tree, and they are the initial causes of the top event. According to
the structural importance of each basic event, it can effectively
prevent the occurrence of breach events, timely discover hidden
information such as the severity, macro situation, and driving
factors of breach events (Ruijters and Stoelinga, 2015), and pro-
vide more reliable decision-making support for maintaining the
safety of physiological data.
Firstly, we nd that Lack of laws and regulations(X
43
) has the
greatest structural importance, which is an important factor for
HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | https://doi.org/10.1057/s41599-023-01673-3 ARTICLE
HUMANITIES AND SOC IAL SCIENCES COMMUNICATIONS | (2023) 10:216 | https://doi.org/10.1057/s41599-023 -01673-3 9
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
facial data breaches. As individual awareness of data rights is
booming, especially due to the COVID-19 pandemic, the for-
mulation of special legislation for personal information protection
has become an international demand. Personal information pro-
tection rules have been issued all over the world, including the
GDPR in the European Union, the California Privacy Rights Act in
the US, and the Civil Code and Personal Information Protection
Law in China. In 2022, personal information legislation and law
enforcement were further promoted, and the proportion of the
global population whose personal information is protected will
increase from 10% in 2020 to 65% in 2023 (Gartner, 2020). How-
ever, the effectiveness of protecting physiological data is unknown
due to the absence of specic and unied personal physiological
data protection legislation, with some regional laws providing only
very basic rights for accountability (Almeida, et al., 2022;Raposo,
2022). Therefore, it is suggested that national agendas should fast-
track the process of special data supervision rules, especially
focusing on addressing the problems including Lack of collection
standards and specications(X
44
), Lack of implementation rules
for face recognition technology(X
45
)andThe review mechanism
of science and technology ethics is incomplete(X
46
). In addition,
special legislation related to personal physiological data protection
should also be forward-looking to improve The supporting policies
not keeping up with technology(M
11
). The rapid development of
information technology and its profound shaping of society have
made data governance increasingly integrated with technology
governance. OECD, OECD Digital Economy Outlook 2020 (2020)
shows that countries generally recognise that adapting to infor-
mation technology iteration is the current biggest challenge in data
protection legislation and privacy regulations. The data protection
laws that apply in the domain of emerging biometric technologies
could provide a framework to alleviate individualsconcerns about
how their physiological data is used.
Similarly, how to effectively regulate and advance Immature
face recognition technology(X
7
) has also become a major issue
that requires attention. Biometric recognition technology, espe-
cially face recognition technology has become widely used in
various sectors. It can collect personal data remotely due to its
non-contact characteristics, which leads to concerns regarding
technical security, personal data disclosure and privacy violation.
At present, many platforms publicly refuse to use biometric
recognition technology; for example, in November 2021, Face-
book claimed it would no longer use facial recognition technology
to identify photos. However, the technology itself is not the main
problem; if used and developed appropriately, this technology can
bring great value to society. Due to the current rapid development
of biometric technology, it is complex and highly uncertain,
regulation in terms of legislation, government, industry and
technology is advisable. In legislation, legal guarantees should be
improved to clarify the application boundaries of biometric
recognition by setting franchiseand entry standards that ensure
the security of data information. The government should handle
physiological data openly and transparently to ensure the right to
access and modify personal physiological data. In terms of
industry, the main responsibilities of the industry should be
claried, and the innovation of biometric recognition technology
should be encouraged. Regarding the technology itself, the tech-
nological protections and technological norms should be
strengthened and improved through, for example, encryption
protection and authentication. All regulations will contribute to
ensuring the security of personal data and promoting the
maturity of biometric recognition technology.
Individual errors are the main cause of data breaches and
individuals play a vital role in personal data protection
(Boxcryptor, 2021). At present, individuals have insufcient
awareness of personal privacy protection, they are accustomed to
relying on Internet services, and lack an adequate understanding
of privacy and awareness of risks. Despite individuals claim the
importance of privacy protection, their actual behaviour often
belies the importance. Scholars dene this gulf between self-
reported privacy attitudes and actual privacy behaviours as a
privacy paradox (Hargittai and Marwick, 2016). Existing studies
mostly explain the privacy paradox based on privacy computing
and privacy fatigue (Choi et al., 2018). In the context of the IoE,
the risk of personal physiological data breach is usually long-term
and hidden, while the immediate interest temptation is direct,
individuals usually give up their right to privacy control in order
to obtain more personalised services. In addition, faced with
complex terms, constantly changing settings and the prevalence
of data breaches (Hargittai and Marwick, 2016), feelings of
cynicism (Hoffmann et al., 2016), insensitivity (Moritz et al.,
2021) or apathy (Hargittai and Marwick, 2016) could make
individuals more passive and resigned, and choose not to read or
agree directly (Choi et al., 2018). Individuals as the data subject
should take the initiative to inltrate the awareness of main-
taining privacy and data security into daily life and reect on their
interweaving with social practice(Seubert and Becker, 2019).
Moreover, in the highly connected and networked IoE era, the
awareness and ability of individuals to control their personal
privacy are compromised by structural violations of privacy.
Privacy protection is not an individual process, but rather a
collective effect (Hargittai and Marwick, 2016), requiring gov-
ernments, technology companies, individuals, and other privacy-
related participants to continuously adjust policies, regulations,
and behaviour patterns in the practice of economic development
and technological innovation, in order to achieve privacy pro-
tection and comprehensive human development.
Finally, we also found the hidden risk sources of personal
physiological data breaches in the IoE terminals and cloud. The
IoE terminals are in the perception layer of the IoE, such as
smartphones, wearable devices, sensors. Personal data is collected
by perception layers in terminals, and then transmitted through
the complex network, and nally stored in the server of the cloud
service provider. In the context of IoE, the interaction between the
IoE terminal devices and the cloud environment will lead to more
personal data breach risk sources (Li, 2020; Fosch-Villaronga et al.,
2018). First, devices with limited resources are difcult to deploy
more advanced security mechanisms (such as complex encryption
algorithms) (Iqbal et al., 2016), which can not only be connected
by owners but also be intercepted by attackers (Mahmoud et al.,
2015). In this case, an attacker can gain access to and control the
device and may manipulate or extract data, control or interrupt the
service. Second, many terminal devices generally exist in an open,
untrusted and unmonitored physical environment, such as trafc
control cameras, cloud robotics and environmental sensors
exposed to the outside, maybe damaged articially (Fosch-Villar-
onga et al., 2018;Iqbaletal.,2016). Third, cloud platforms open
personal data to third parties, which also easily leads to personal
data breaches. In the future, edge computing or fog computing
architecture of digital individualswill be an effective mechanism
for data protection in the IoE era (Dang et al., 2019). In this
architecture, the terminal device responsible for sensing physical
objects sends personal data to the upper layer for processing and
storage but does not need to upload all personal data to the cloud
in real-time, which to a certain extent allows users to control their
personal physiological data independently and reduce personal
physiological data breach risks from the source.
Conclusion
In the IoE environment, the emergence of a series of data tech-
nologies such as multimedia, biometrics, cloud computing and
ARTICLE HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | https://doi.org/10.1057/s41599-023-01673-3
10 HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | (2023) 10 :216 | https://doi.org /10.1057/s41599-023-01673-3
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
data mining has opened a new set of possibilities for innovative
services and applications. However, this technology also intro-
duces a complex scenario that must be efciently managed to
protect data security. In this scenario, the identication of per-
sonal physiological data risks is key to ensuring privacy and data
security in the IoE environment. This study provides an impor-
tant practical approach to revealing the occurrence and evolution
mechanism of personal physiological data breaches and to
implementing privacy protection measures by taking facial data
breaches as a research object. Based on the ndings, we maintain
that personal physiological data breach has become a key security
issue that deserves more attention in the theoretical and practical
arenas. Overall, the core contributions and innovations of this
research can be summarised into three aspects.
(1) In terms of method, this study rstly attempts to use fault
tree analysis to analyse facial data breaches, which is
feasible and innovative in method. The security problem of
physiological data systems is not caused by one aspect, and
there are various relationships between many security risks.
However, few studies have used systematic and objective
methods to study and explain personal physiological data
breach risks and their logical relationship. It is more
comprehensive and reasonable to explore the logical
relationship between risk sources at a deeper level in
combination with real cases and to understand the
importance of various factors in the whole risk system to
then take well-directed measures.
(2) In terms of practice, the construction of the fault tree
diagram of a facial data breach can help the data
management parties track the development of the data
breach system and provide a knowledge base for risk
identication. On the one hand, the knowledge base of risk
sources can provide support for the identication of risk
sources of subsequent physiological data breaches; On the
other hand, the causal relationship is used to clarify the
structural characteristics of the accident system, which is
convenient for the control of the panoramic situation of
physiological data breach and the oversight of the breach
risk sensitive nodes. Moreover, it is of practical signicance
for improving the ability of risk adaptive governance and
supporting the manageability and traceability of physiolo-
gical data from data collection to data destruction.
(3) In terms of theory, this study explores the plight of
physiological data in the IoE era, providing a reference for
privacy protection under the new situation. This study
conrms that in a highly networked environment, a
physiological data breach is a systematic process, so privacy
protection is not a personal process, but a collective effort.
In addition, it is found that the security of physical devices
and the complexity of the cloud environment have triggered
some new risk sources, providing ideas for building an
effective mechanism for personal privacy protection in the
future IoE era and enriching the relevant theories of privacy
management.
Data availability
The data used in this article has been included in the article.
Received: 25 September 2020; Accepted: 13 April 2023;
Appendix 1 The details of 22 cases
NO. Time Case Risk Expert analysis URL
1 2019 New data breach has
exposed millions of
ngerprint and facial
recognition records
Simple user name and password;
Access rights conguration error;
Data exiting
https://www.forbes.com/sites/
zakdoffman/2019/08/14/new-data-
breach-has-exposed-millions-of-
ngerprint-and-facial-recognition-
records-report/?sh=2f1bbaf546c6
2 2020 Clearview AI data breach
exposes facial recognition
rms client list
The hacker; Individuals upload
facial data for entertainment
actively and casually, which are
crawled;
Lack of collection standards and
specications
https://www.cpomagazine.com/
cyber-security/clearview-ai-data-
breach-exposes-facial-recognition-
rms-client-list/
3 2019 In 2019, it was reported that
hackers breached Apples
iPhone Face ID user
authentication in just 120
seconds
The hacker; Immature face
recognition technology
https://www.analyticsinsight.net/
what-will-happen-when-a-facial-
recognition-rm-is-hacked/
4 2021 A group of hackers breached
popular surveillance and
facial recognition camera
company, Verkada
Hacker attack; Illegal collection by
ofine face recognition camera
https://www.analyticsinsight.net/
what-will-happen-when-a-facial-
recognition-rm-is-hacked/
5 2020 Facial data of thousands of
Chinese students has been
leaked
Data outsourcing, hosted by a third
party company
Lack of laws and regulations; Lack
of implementation rules for face
recognition technologyInsufcient
safety education
https://baijiahao.baidu.com/s?id=
1656340231011283716&wfr=
spider&for=pc
HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | https://doi.org/10.1057/s41599-023-01673-3 ARTICLE
HUMANITIES AND SOC IAL SCIENCES COMMUNICATIONS | (2023) 10:216 | https://doi.org/10.1057/s41599-023 -01673-3 11
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
Table (continued)
NO. Time Case Risk Expert analysis URL
6 2020 Residential neighbourhoods
across China are adopting
facial recognition
Incorrectly congured databases;
Insufcient safety education
https://www.scmp.com/abacus/
tech/article/3104512/facial-
recognition-data-leaks-rampant-
across-china-covid-19-pushes
7 2019 LLC, transferred copies of
CBPs biometric data, such
as traveler images, to its own
company network
Malware attack; Remote access by
operators leaves data on other
devices; The improper download
and storage of database data
https://www.oig.dhs.gov/sites/
default/les/assets/2020-09/OIG-
20-71-Sep20.pdf
8 2021 Biometric Information
Exposed in Slot Machine
Operator Data Breach
Malware attack; Illegal storage of
data by third parties; Illegal transfer
of copies by third parties
https://ndbiometrics.com/
biometric-information-exposed-in-
slot-machine-operator-data-breach/
9 2021 711 breached customer
privacy by collecting facial
imagery without consent
Low server security; App illegally
opens cameras of mobile phone
and other devices to collect data;
Lack of deletion consciousness;
Lack of collection standards and
specications
https://www.zdnet.com/article/7-
eleven-collected-customer-facial-
imagery-during-in-store-surveys-
without-consent/
10 2021 Consumer-facing Companies
Still Have Few Incentives to
Stop Data Breaches, and
Thats a National Security
Concern
Operators steal data The enterprise has ineffective
security measures and insufcient
data protection capacity
https://www.cfr.org/blog/
consumer-facing-companies-still-
have-few-incentives-stop-data-
breaches-and-thats-national
11 2019 Massive biometric data
breach found in system used
by banks and Met police
The database without password;
Web crawler collection
The physically collection device is
invaded physically
https://www.itpro.co.uk/data-
breaches/34206/massive-
biometric-data-breach-found-in-
system-used-by-banks-and-met-
police
12 2021 Students sue online exam
proctoring service ProctorU
for biometrics violations
following data breach
The third-party did not delete the
data as required; The review
mechanism of science and
technology ethics is incomplete;
Lack of data deletion mechanism
https://lawstreetmedia.com/news/
tech/students-sue-online-exam-
proctoring-service-proctoru-for-
biometrics-violations-following-data-
breach/
13 2021 Hackers Breach Thousands
of Security Cameras,
Exposing Tesla, Jails,
Hospitals
An international
hackerUnauthorized access
https://www.bloomberg.com/
news/articles/2021-03-09/hackers-
expose-tesla-jails-in-breach-of-150-
000-security-cams
14 2019 The SenseNets Horizon
company leaks billions of
facial data
The database without password
Individuals insufcient security
awareness; Database security
protocol aw
Illegal trade; The enterprise has
ineffective security measures and
insufcient data protection capacity;
The database without password;
Access rights conguration error
https://baijiahao.baidu.com/s?id=
1625635651342970434&wfr=
spider&for=pc
15 2019 IBM collects online photos
without consent, the
individual nd it impossible
to delete their facial data
The management failed to delete
the data as required Hacker attack
https://www.nbcnews.com/tech/
internet/facial-recognition-s-dirty-
little-secret-millions-online-photos-
scraped-n981921
16 2021 Everalbum collects facial
pictures illegally
App illegally opens cameras of
mobile phone and other devices to
collect data; The management
failed to delete the data as required
Lack of laws and regulations; Lack of
implementation rules for face
recognition technology
https://www.latimes.com/
business/story/2021-01-29/
column-facial-recognition-privacy
17 2020 Facial data leakage of
students in some schools in
Sichuan and Gansu
Unsafe database; Illegal storage of
data by third parties
https://baijiahao.baidu.com/s?id=
1656340231011283716&wfr=
spider&for=pc
18 2020 Zhang Fu and others violated
citizenspersonal
information and fraud
Commercial companies actively sell
data; Immature face recognition
technology
https://www.sohu.com/a/
373482018_120032
ARTICLE HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | https://doi.org/10.1057/s41599-023-01673-3
12 HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | (2023) 10 :216 | https://doi.org /10.1057/s41599-023-01673-3
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
Table (continued)
NO. Time Case Risk Expert analysis URL
19 2021 Abuse of face recognition in
stores such as Kohler
bathroom and BMW
Concealed collection means; Rough
collection method; Illegal trade
Lack of laws and regulations; Lack of
implementation rules for face
recognition technology
https://www.sohu.com/a/
456089454_393779
20 2019 Twinnings personal
information breach
Incautious about the related
products; Incorrectly congured
databases; The physically invaded
collection device
http://www.woshipm.com/ai/
1844718.html
21 2019 The biometric data leakage
occurred to Suprema
Not desensitized core data; Data
deletion incompletely; The
physically compromised storage
device
Commercial companies went
bankrupt and data were resold
https://us.norton.com/
internetsecurity-emerging-threats-
biometric-data-breach-database-
exposes-ngerprints-and-facial-
recognition-data.html
22 2020 Abuse of face recognition
technology in housing sales
industry (29 Administrative
Punishment Cases)
Concealed collection means; Illegal
transfer of copies by third parties
Lack of implementation rules for face
recognition technology; The review
mechanism of science and
technology ethics is incomplete
https://m.thepaper.cn/baijiahao_
10148531
References
Adel SE, Michael ML (2014) Cyber security challenges in Smart Cities: safety,
security and privacy. J Adv Res 5(4):491497. https://doi.org/10.1016/j.jare.
2014.02.006
AlAlwan A, Rana NP, Dwivedi YK, Algharabat R (2017) Social media in mar-
keting: a review and analysis of the existing literature. Telemat Inform
34(7):11771190. https://doi.org/10.1016/j.tele.2017.05.008
Almeida D, Shmarko K, Lomas E (2022) The ethics of facial recognition tech-
nologies, surveillance, and accountability in an age of articial intelligence: a
comparative analysis of US, EU, and UK regulatory frameworks. AI Eth
2(3):377387. https://doi.org/10.1007/s43681-021-00077-w
Alshammari M, Simpson A (2017) A UML prole for privacy-aware data lifecycle
models. In: Computer Security: ESORICS 2017 international workshops,
CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 1415, 2017,
Revised selected papers 3. Springer International Publishing, pp. 189209
Al-Sharhan S, Omran E, Lari K (2019) An integrated holistic model for an eHealth
system: a national implementation approach and a new cloud-based security
model. Int J Inform Manage 47:121130. https://doi.org/10.1016/j.ijinfomgt.
2018.12.009
Anand N, Vikram P, Dac-Nhuong L (2017) Internet of Nano Things (IoNT), next
evolutionary step in nanotechnology. Nanosci Nanotechnol 7(1):48. https://
doi.org/10.5923/j.nn.20170701.02
Association P (2013) Tescos plan to tailor adverts via facial recognition stokes
privacy fears. Guardian. http://www.theguardian.com/business/2013/nov/03/
privacy-tesco-scan-customers-faces. Accessed 25 Dec 2022
Barlow RE, Proschan F (1975) Importance of system components and fault tree
events. Stoch Proc Appl 3(2):153173. https://doi.org/10.1016/0304-4149(75)
90013-7
Bates D (2017) Face recognition technology set to transform retail. FORBES.
https://www.forbes.com/sites/sap/2017/11/08/face-recognition-technology-
set-to-transform-retail/. Accessed 20 Feb 2021
Boxcryptor (2021) Human errors are still the top cause of data breach-interview
with Paula Januszkiewicz, Expert of cyber security. Inf Secur Commun Priv
12:3639
Brous P, Janssen M, Herder P (2020) The dual effects of the Internet of Things
(IoT): a systematic review of the benets and risks of IoT adoption by
organizations. Int J Inf Manage 51:101952. https://doi.org/10.1016/j.
ijinfomgt.2019.05.008
Buckley B, Hunter M (2011) Say cheese! Privacy and facial recognition. Comput
Law Secur Rev 27(6):637640. https://doi.org/10.1016/j.clsr.2011.09.011
Carvalho JV, Rocha Á, Vasconcelos J, Abreu A (2019) A health data analytics
maturity model for hospitals information systems. Int J Inf Manage
46:278285. https://doi.org/10.1016/j.ijinfomgt.2018.07.001
Chin CA, Crosby GV, Ghosh T, Murimi R (2012) Advances and challenges of
wireless body area networks for healthcare applications. In: 2012 Interna-
tional Conference on Computing, Networking and Communications
(ICNC). IEEE, pp. 99103
Chmielewski D (2015) Apple to use seles to unlock phones? Vox. https://www.
vox.com/2015/3/31/11560978/apple-to-use-seles-to-unlock-phones. Acces-
sed 20 Sept 2021
Choi H, Park J, Jung Y (2018) The role of privacy fatigue in online privacy
behavior. Comput Hum Behav 81:4251. https://doi.org/10.1016/j.chb.2017.
12.001
Dang LM et al. (2019) A survey on Internet of Things and cloud computing for
healthcare. Electronics-Switz 8(7):768. https://doi.org/10.3390/
electronics8070768
Dhruva SS, Ross JS, Akar JG (2020) Aggregating multiple real-world data sources
using a patient-centered health-data-sharing platform. npj Digit Med 3(1):60.
https://doi.org/10.1038/s41746-020-0265-z
Diega GN, Walden I (2016) Contracting for the Internet of Things: looking into
the nest. Queen Mary School of Law Legal Studies Research Paper 219
Etzioni A (2015) A cyber age privacy Doctrine: more coherent, less subjective, and
operational. Brooklyn Law Rev 80(4):Article 2
Feng HX, Li GH, Xu CR (2017) A quality control circle process to improve
implementation effect of prevention measures for high-risk patients. Int
Wound J 14(6):10941099. https://doi.org/10.1111/iwj.12764
Finnegan M, Kapo M (2018) What is windows hello? Microsofts biometrics
security system explained. Comput World. https://www.computerworld.
com/article/3244347/what-is-windows-hello-microsofts-biometrics-
securitysystem-explained.html. Accessed 20 Oct 2021
Fosch-Villaronga E et al (2018) Cloud services for robotic nurses? Assessing legal
and ethical issues in the use of cloud services for healthcare robots. In: 2018
IEEE/RSJ International Conference on Intelligent Robots and Systems
(IROS), University Carlos III of Madrid, Madrid, IEEE, pp. 290296. https://
doi.org/10.1109/IROS.2018.8593591
Gagnon MP, Simonyan D, Ghandour EK, Godin G, Labrecque M, Ouimet M et al.
(2016) Factors inuencing electronic health record adoption by physicians: a
multilevel analysis. Int J Inform Manage 36:258270. https://doi.org/10.1016/
j.ijinfomgt.2015.12.002
Gartner S (2020) 65% of the Worlds population will have its personal data covered
under modern privacy regulations. https://www.gartner.com/en/newsroom/
press-releases/2020-09-14-gartner-says-by-2023--65--of-the-world-s-
population-w. Accessed 20 Feb 2022
Gephart SM, Effken JA, McGrath JM (2013) Expert consensus building using
e-Delphi for necrotizing enterocolitis risk assessment. Jognn-J Obst Gyn Neo
42(3):332347
Ghaffary S (2019) Amazon is trying to regulate itself over facial recognition
software before congress does. Vox. https://www.vox.com/technology/2019/
2/7/18216125/amazon-regulation-facial-recognition-software. Accessed 13
Dec 2022
Greenleaf G, Cottier B(2020) Ends a decade of 62 New Data Privacy Laws Privacy
Laws Bus Int Rep 163:2426. https://ssrn.com/abstract=3572611
Günther M, El Shafey L, Marcel S (2017) 2D face recognition: an experimental and
reproducible research survey. No. REP_WORK. Idiap
HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | https://doi.org/10.1057/s41599-023-01673-3 ARTICLE
HUMANITIES AND SOC IAL SCIENCES COMMUNICATIONS | (2023) 10:216 | https://doi.org/10.1057/s41599-023 -01673-3 13
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
Haab TC, Whitehead JC, Parsons GR (2010) Effects of information about invasive
species on risk perception and seafood demand by gender and race. Resour
Energy Econ 32(4):586599. https://doi.org/10.1016/j.reseneeco.2010.04.008
Hadi H, Brian HN, Fazel A, Burak K, Tolga S (2019) A survey on cybersecurity,
data privacy, and policy issues in cyber-physical system deployments in smart
cities. Sustain Cities Soc 50(3):101660. https://doi.org/10.1016/j.scs.2019.
101660
Haraty RA, Kaddoura S, Zekri AS (2018) Recovery of business intelligence systems:
towards guaranteed continuity of patient centric healthcare systems through
a matrix-based recovery approach. Telemat Inform 35:801814. https://doi.
org/10.1016/j.tele.2017.12.010
Hargittai E, Marwick A (2016) What can I really do? Explaining the privacy
paradox with online apathy. Int J COMMUN-US 10:37373757
Hashem IAT, Chang V, Anuar NB, Adewole K, Yaqoob I, Gani A, Chiroma H
(2016) The role of big data in smart city. Int J Inform Manage 36(5):748758.
https://doi.org/10.1016/j.ijinfomgt.2016.05.002
Hill K (2020) The secretive company that might end privacy as we know it. N Y
Times. https://www.nytimes.com/2020/01/18/technology/clearview-privacy-
facial-recognition.html. Accessed 20 Dec 2021
Hoffmann CP, Lutz C, Ranzini G (2016) Privacy cynicism: a new approach to the
privacy paradox. Cyberpsychology 10(4). https://doi.org/10.5817/CP2016-4-7
Horton FW (1985) Information resources management. Nanjing University
Publication
Hossain MA, Dwivedi YK (2014) What improves citizensprivacy perceptions
toward RFID technology? A cross-country investigation using mixed method
approach. Int J Inform Manage 34(6):711719. https://doi.org/10.1016/j.
ijinfomgt.2014.07.002
IBM Security (2022) Cost of a Data Breach Report 2022. https://www.ibm.com/
downloads/cas/3R8N1DZJ. Accessed 20 Feb 2023
Iqbal MA, Olaleye OG, Bayoumi MA (2016) A review on Internet of Things (IoT):
security and privacy requirements and the solution approaches. Global J
Comput Sci Technol 16(7)
Isiaka F, Adamu Z (2022) Custom emoji based emotion recognition system for
dynamic business webpages. Int J Intell Comput 15(4):497509. https://doi.
org/10.1108/IJICC-11-2021-0254
Jain AK, Ross A (2004) An introduction to biometric recognition. IEEE Trans
Circuits Syst Video Technol 14(1):420. https://doi.org/10.1109/TCSVT.
2003.818349
Jain AK, Flynn P, Ross AA (2018) Handbook of biometrics. Springer, Berlin
Jain AK, Nandakumar K, Nagar A (2008) Biometric template security. Eurasip J
Adv Signal Process 117. https://doi.org/10.1155/2008/579416
Ji S, Gui ZY, Zhou TQ, Yan HY, Shen J (2018) An efcient and certicateless
conditional privacy-preserving authentication scheme for wireless body area
networks big data services. IEEE Access 6:6960369611. https://doi.org/10.
1109/ACCESS.2018.2880898
Kabir S (2017) An overview of fault tree analysis and its application in model based
dependability analysis. Expert Syst Appl 77:114135. https://doi.org/10.1016/
j.eswa.2017.01.058
Kachur A, Osin E, Davydov D et al. (2020) Assessing the Big Five personality traits
using real-life static facial images. Sci Rep 10:8487. https://doi.org/10.1038/
s41598-020-65358-6
Kan M (2015) Alibaba uses facial recognition tech for online payments. Computer
World. https://www.computerworld.com/article/2897117/alibaba-uses-facial-
recognition-tech-for-online-payments.html. Accessed 20 Feb 2022
Kapoor KK, Tamilmani K, Rana NP, Patil P, Dwivedi YK, Nerur S (2018)
Advances in social media research: Past, present and future. Inf. Syst Front
20(3):531558. https://doi.org/10.1007/s10796-017-9810-y
Karantzoulidis S (2019) This Smart Lock has a built-in facial recognition camera.
Secur Sales Integr. http://www.securitysales.com/news/smart-lock-
facialrecognition-camera/. Accessed 20 Feb 2022
Kilovaty I (2021) Psychological data breach harms. NCJL & Tech 23:1
Kindt EJ (2013) Privacy and data protection issues of biometric applications: a
comparative legal analysis. Springer Netherlands, New York. https://doi.org/
10.1007/978-94-007-7522-0
Knight W (2017) In China, You Can Pay for Goods Just by Showing YourFace.
MIT Technol Rev. http://technologyreview.com/s/603494/10-breakthrough-
technologies-2017-paying-with-your-face/. Accessed 21 Feb 2022
Komendantova N, Ekenberg L, Svahn M, Larsson A, Shah SIH, Myrsini Glinos,
Koulolias V, Danielson M (2021) A value-driven approach to addressing
misinformation in social media. Humanit Soc Sci Commun 8:33. https://doi.
org/10.1057/s41599-020-00702-9
Kshetri N (2014) Big Datas impact on privacy, security and consumer welfare.
Telecommun Policy 38:11341145. https://doi.org/10.1016/j.telpol.2014.10.002
Kumar S, Singh SK et al. (2018) Privacy preserving security using biometrics in
cloud computing. Multimed Tools Appl 77(9):1101711039
Kwon O, Lee N, Shin B (2014) Data quality management, data usage experience
and acquisition intention of big data analytics. Int J Inform Manage
34(3):387394. https://doi.org/10.1016/j.ijinfomgt.2014.02.002
Li T, Zheng YH, Zhou T (2017) Efcient anonymous authenticated key agreement
scheme for wireless body area networks. Secur Commun Netw 8. https://doi.
org/10.1155/2017/4167549
Li WD (2020) The connotation, elements and composition of the Internet of
Everything. Acad Front 6:4045
Liang ZQ, Lin DS (2017) Information security risk assessment mechanism research
based on power system. Netinfo Secur 4:8690
Liu YQ (2015) The requirement analysis on exploitation and utilization of personal
information in the Big Data Environment. Res Lib Sci 15:6776. https://doi.
org/10.15941/j.cnki.issn1001-0424.2015.15.013
Lyon D (2017) Digital citizenship and surveillance surveillance culture: engage-
ment, exposure, and ethics in digital modernity. Int J Commun-US
11(19):824842
Mahmoud R et al (2015) Internet of Things (IoT) security: current status, chal-
lenges and prospective measures. In: 2015 10th International Conference For
Internet Technology and Secured Transactions (ICITST). IEEE, pp. 336341
Mahoney J, LeHong H (2012) Innovation Insight: the Internet of Everythinginno-
vation will transform business. Gartner https://www.gartner.com/doc/1886915/
innovation-insight-internet-everything-innovation. Accessed 20 Dec 2022
Mainor AC, Patricia AB (2019) Understanding the Internet of Nano Things:
overview, trends, and challenge. e-Cienc Inf 9(1):130. https://doi.org/10.
15517/eci.v1i1.33807
Mao ZJ, Mei H, Xiao YM et al. (2020) Risk assessment of smart city information
security based on Bayesian network. J Modern Inf 40(5):1926
Mayer-Schönberger V, Cukier K (2013) Big data: a revolution that will transform
how we live, work and think. Houghton Mifin Harcourt, Boston
Mehmood R, Selwal A (2020) Fingerprint biometric template security schemes:
attacks and countermeasures. In: Singh PK, Kar AK, Singh Y, Kolekar MH,
Tanwar S (eds) Proceedings of ICRIC. Springer International Publishing,
Cham, pp. 455467
Millard CJ (2013) Cloud computing law. Oxford University Press, Oxford, p. 2
Miraz MH, Ali M, Excell PS, Picking R (2015) A review on Internet of Things
(IoT), Internet of Everything (IoE) and Internet of Nano Things (IoNT), 2015
International Technology Applications (ITA), pp. 219224
Moritz B et al. (2021) Making sense of algorithmic proling: user perceptions on
Facebook. Inf Commun Soc 117. https://doi.org/10.1080/1369118X.2021.
1989011
Nandakumar K, Jain AK (2015) Biometric template protection: bridging the per-
formance gap between theory and practice. IEEE Signal Process Mag
32(5):88100. https://doi.org/10.1109/MSP.2015.2427849
OECD, OECD Digital Economy Outlook (2020). OECD Publishing, Paris. https://
doi.org/10.1787/bb167041-en
Oliver D (2019) Facial recognition scanners are already at some USAirports. Heres
what to know. USA Today. https://www.usatoday.com/story/travel/airline-
news/2019/08/16/biometric-airport-screening-facial-recognition-
everythingyou-need-know/1998749001/. Accessed 17 Jul 2022
Ozgur L, Alkan O (2020) Risk assessment of sea rescue activities on search/rescue
ships using L type matrix method. J Home-Page 3(2):6678
Palattella MR, Dohler M, Grieco A et al. (2016) Internet of things in the 5G era:
enablers, architecture, and business models. IEEE J Sel Area Commun
34(3):510527. https://doi.org/10.1109/JSAC.2016.2525418
Patel P, Bhatt B, Patel B (2017) Human body posture recognition-A survey. In:
International Conference on Innovative Mechanisms for Industry Applica-
tions (ICIMIA), Bengaluru, India, IEEE, pp. 473477. https://doi.org/10.
1109/ICIMIA.2017.7975660
Pearson B (2018) 3 Ways retailers can use facial recognition to create computer
security. Forbes. http://www.forbes.com/sites/bryanpearson/2018/03/15/3-
ways-retailers-can-use-facial-recognition-to-expressbetter-experiences/.
Accessed 14 Feb 2023
Perlroth N (2016) Hackers used new weapons to disrupt major websites across U.S.
NY Times. http://www.nytimes.com/2016/10/22/business/internetproblems-
attack.html?_r¼0. Accessed 14 Feb 2023
Petroff A (2016) MasterCard launching sele payments. CNN Money. https://
money.cnn.com/2016/02/22/technology/mastercard-sele-pay-ngerprint-
payments/index.html. Accessed 17 Jul 2022
Raposo VL (2022) (Do not) remember my face: uses of facial recognition tech-
nology in light of the general data protection regulation. Inf Commun
Technol 119. https://doi.org/10.1080/13600834.2022.2054076
Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in
biometrics-based authentication systems. IBM Syst J 40(3):614634. https://
doi.org/10.1147/sj.403.0614
Romero M (2019) Portland gas station using facial recognition technology to curb
crime. KGW. http://www.kgw.com/article/news/local/portland-gas-
stationusing-facial-recognition-technology-to-curb-crime/283-8ce9f30a-
2ac8-4c07-9ea9-11518a75e40a. Accessed 17 Jul 2022
Ruijters E, Stoelinga M (2015) Fault tree analysis: a survey of the state-of-the-art in
modeling, analysis and tools. Comput Sci Rev 15(3):2962. https://doi.org/10.
1016/j.cosrev.2015.03.001
ARTICLE HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | https://doi.org/10.1057/s41599-023-01673-3
14 HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | (2023) 10 :216 | https://doi.org /10.1057/s41599-023-01673-3
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
Sepas-Moghaddam A, Correia P, Nasrollahi K et al. (2019) A double-deep spatio-
angular learning framework for light eld based face recognition. IEEE Trans
Circuits Syst Video Technol 30(12):44964512. https://doi.org/10.1109/
TCSVT.2019.2916669
Seubert S, Becker C (2019) The culture industry revisited: sociophilosophical
reections on privacyin the Digital Age. Philos Soc Crit 45(08):930947.
https://doi.org/10.1177/0191453719849719
Shiau WL, Dwivedi YK, Yang HS (2017) Co-citation and cluster analyses of extant
literature on social networks. Int J Inf Manage 37(5):390399. https://doi.org/
10.1016/j.ijinfomgt.2017.04.007
Smith M, Mann M, Urbas G (2018) Biometrics, crime and security. Routledge, New
York
Spyros GT (2018) Ethics and Law in the Internet of Things World. Smart Cities
1:8120. https://doi.org/10.3390/smartcities10100062018
Sundar SS (2020) Rise of machine agency: a framework for studying the psychology
of humanAI interaction (HAII). J Comput-Mediat Commun 25(1):7488.
https://doi.org/10.1093/jcmc/zmz026
Tengyuen N (2017) Webcam face recognition security software and bio-metrics
password manager. GECKO FLYURL. https://www.geckoandy.com/4068/
webcam-facerecognition-security-software-and-password-managerprogram/.
Accessed 25 Dec 2022
Toor A (2017) This French School is using facial recognition to nd out when
students arent paying attention. The Verge 2017. https://www.theverge.com/
2017/5/26/15679806/ai-education-facial-recognition-nestor-france. Accessed
20 Sep 2021
Tuyls PP, Skoric BB, Kevenaar TT (2007) Security with noisy data: on private
biometrics, secure key storage and anti-counterfeiting. Springer, Berlin
Voigt P, Von dem Bussche A (2017) The eu general data protection regulation (gdpr):
A Practical Guide. Cham: Springer International Publishing, Switzerland
Wallace G (2018) Instead of the boarding pass, bring your smile to the airport.
CNN Travel. https://www.cnn.com/travel/article/cbp-facial-recognition/
index.html. Accessed 20 Sep 2021
Wang HY, Tang SJ, Ding Y, Wang YJ, Li JH (2020) Survey on biometrics template
protection. J Comput Res Dev 05:10031021
Wang S, Jiang X, Tang H et al. (2017) A community effort to protect genomic data
sharing, collaboration and outsourcing. Npj Genom Med 2(33):16. https://
doi.org/10.1038/s41525-017-0036-1
West DJ (2019) 5 Ways face recognition can transform customer loyalty. FaceFirst
Face Recognition Software. http://www.facerst.com/blog/ways-face-
recognitioncan-transform-customer-loyalty/. Accessed 20 Sept 2021
Wolfe-Robinson M (2019) Manchester City warned against using facial recognition
on Fans. The Guardian. https://www.theguardian.com/technology/2019/aug/
18/manchester-city-face-calls-to-reconsider-facial-recognition-tech. Accessed
20 Sept 2021
Wollerton M (2019) Elecpros smart lock scans faces to let people in CNET. https://
www.cnet.com/news/elecpros-smart-lock-scans-faces-to-let-people-in-ces-
2019/. Accessed 20 Sept 2021
Xu T, An D, Jia Y, Yue Y (2021) A review: point cloud-based 3D human joints
estimation. Sensors (Basel, Switzerland) 21(5):1684. https://doi.org/10.3390/
s21051684
Yan BN, Ye ZY, Duan ML (2018) Analysis of the causes of personal information
security risks of express usersinvestigation from users angle. J Mod Inform
02:9195
Yuan CF, Zhang YL, Wang JH, Tong JH (2021) Modeling and evaluation of causal
factors in emergency responses to re accidents involving oil storage system.
Sci Rep-UK 11(1):19018. https://doi.org/10.1038/s41598-021-97785-4
Zhang JL, Cui GZ (2002) Safety system engineering. Beijing. Coal Industry Press
Acknowledgements
This research was funded by the National Natural Science Fund of China (Grant Nos.
71974060 and 71734002).
Competing interests
The authors declare no competing interests.
Ethical approval
This article does not contain any studies with human participants performed by any of
the authors.
Informed consent
This article does not contain any studies with human participants performed by any of
the authors.
Additional information
Correspondence and requests for materials should be addressed to Weidong Li.
Reprints and permission information is available at http://www.nature.com/reprints
Publishers note Springer Nature remains neutral with regard to jurisdictional claims in
published maps and institutional afliations.
Open Access This article is licensed under a Creative Commons
Attribution 4.0 International License, which permits use, sharing,
adaptation, distribution and reproduction in any medium or format, as long as you give
appropriate credit to the original author(s) and the source, provide a link to the Creative
Commons license, and indicate if changes were made. The images or other third party
material in this article are included in the articles Creative Commons license, unless
indicated otherwise in a credit line to the material. If material is not included in the
articles Creative Commons license and your intended use is not permitted by statutory
regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder. To view a copy of this license, visit http://creativecommons.org/
licenses/by/4.0/.
© The Author(s) 2023
HUMANITIES AND SOCIAL SCIENCES COMMUNICATIONS | https://doi.org/10.1057/s41599-023-01673-3 ARTICLE
HUMANITIES AND SOC IAL SCIENCES COMMUNICATIONS | (2023) 10:216 | https://doi.org/10.1057/s41599-023 -01673-3 15
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
1.
2.
3.
4.
5.
6.
Terms and Conditions
Springer Nature journal content, brought to you courtesy of Springer Nature Customer Service Center GmbH (“Springer Nature”).
Springer Nature supports a reasonable amount of sharing of research papers by authors, subscribers and authorised users (“Users”), for small-
scale personal, non-commercial use provided that all copyright, trade and service marks and other proprietary notices are maintained. By
accessing, sharing, receiving or otherwise using the Springer Nature journal content you agree to these terms of use (“Terms”). For these
purposes, Springer Nature considers academic use (by researchers and students) to be non-commercial.
These Terms are supplementary and will apply in addition to any applicable website terms and conditions, a relevant site licence or a personal
subscription. These Terms will prevail over any conflict or ambiguity with regards to the relevant terms, a site licence or a personal subscription
(to the extent of the conflict or ambiguity only). For Creative Commons-licensed articles, the terms of the Creative Commons license used will
apply.
We collect and use personal data to provide access to the Springer Nature journal content. We may also use these personal data internally within
ResearchGate and Springer Nature and as agreed share it, in an anonymised way, for purposes of tracking, analysis and reporting. We will not
otherwise disclose your personal data outside the ResearchGate or the Springer Nature group of companies unless we have your permission as
detailed in the Privacy Policy.
While Users may use the Springer Nature journal content for small scale, personal non-commercial use, it is important to note that Users may
not:
use such content for the purpose of providing other users with access on a regular or large scale basis or as a means to circumvent access
control;
use such content where to do so would be considered a criminal or statutory offence in any jurisdiction, or gives rise to civil liability, or is
otherwise unlawful;
falsely or misleadingly imply or suggest endorsement, approval , sponsorship, or association unless explicitly agreed to by Springer Nature in
writing;
use bots or other automated methods to access the content or redirect messages
override any security feature or exclusionary protocol; or
share the content in order to create substitute for Springer Nature products or services or a systematic database of Springer Nature journal
content.
In line with the restriction against commercial use, Springer Nature does not permit the creation of a product or service that creates revenue,
royalties, rent or income from our content or its inclusion as part of a paid for service or for other commercial gain. Springer Nature journal
content cannot be used for inter-library loans and librarians may not upload Springer Nature journal content on a large scale into their, or any
other, institutional repository.
These terms of use are reviewed regularly and may be amended at any time. Springer Nature is not obligated to publish any information or
content on this website and may remove it or features or functionality at our sole discretion, at any time with or without notice. Springer Nature
may revoke this licence to you at any time and remove access to any copies of the Springer Nature journal content which have been saved.
To the fullest extent permitted by law, Springer Nature makes no warranties, representations or guarantees to Users, either express or implied
with respect to the Springer nature journal content and all parties disclaim and waive any implied warranties or warranties imposed by law,
including merchantability or fitness for any particular purpose.
Please note that these rights do not automatically extend to content, data or other material published by Springer Nature that may be licensed
from third parties.
If you would like to use or distribute our Springer Nature journal content to a wider audience or on a regular basis or in any other manner not
expressly permitted by these Terms, please contact Springer Nature at
onlineservice@springernature.com
... The IoE is considered a huge, complex network ecosystem composed of objects, digital devices, digital individuals, digital enterprises, digital governments, data resources, and other elements connected by digital platforms and digital processes (Li 2020). Compared with the Internet of Things (IoT), which connects aspects such as sensors and devices, the IoE has a wider range of connected objects and can interact strongly with individual and social environments (Martino et al. 2017;Wang et al. 2023), translating the real world ubiquitously and holographically into a digital world. In particular, Everything to Person (E2P) service providers based on various scenarios such as personal work, travel, medical treatment, and entertainment scenes allow for ubiquitous data gathering and combination (Harari et al. 2016;Ioannou et al. 2020). ...
... These E2P service providers commit to analysing "who you are, what you are doing, what you think, and what you need" and creating more personalised and targeted user profiles or "digital identities" (Mathews-Hunt 2016), which can provide more customised and tailored services to expand their user base.types of personal data are expanding and transforming in unprecedented ways. The essence of IoE is "connecting While the convenience of various services provided by IoE is built on the wide collection and utilisation of users' personal data (Li et al. 2017), privacy and security risks become accordingly apparent once data breaches and abuse occur (Wang et al. 2023). Gradually, individuals value the importance of privacy due to mounting, serious privacy concerns and have become more prudent in their online adoption and data provision behaviour (Lyu et al. 2024;Ayaburi and Treku 2020;Hajli and Lin 2016). ...
... Very few studies have focused on the IoE context. The intelligence of IoE technology is changing our lives; in particular, IoE technologies such as deep learning, artificial intelligence, and big data require the sharing of multiple new types of personal data (Wang et al. 2023), such as facial data, online behavioural data, or spiritual data. Research has shown that these new types of personal data pose greater and more insidious risks of privacy breaches, and users are more cautious about them (Wang et al. 2023;Farayola et al. 2024). ...
Article
Full-text available
The ubiquitous monitoring and collection capabilities of the IoE, as well as its innovative scenarios, have led to changes in the content and type of personal data. Personal data sensitivity, as a standard for measuring privacy attitudes, can provide a reference for the design and improvement of privacy systems. This study aims to evaluate individuals’ personal data sensitivity in the IoE context, to better understand individuals’ current privacy attitudes. This study uses a questionnaire survey to study personal data sensitivity and the antecedents affecting personal data sensitivity among 1921 Chinese citizens. Research suggests that, within the spectrum of 41 personal data categories, identifiers such as ID numbers and home addresses are deemed highly sensitive. Furthermore, within the IoE context, emerging types of personal data, including behavioural and facial recognition data, also demonstrate significant sensitivity. With respect to sensitivity levels, personal data can be categorized into four tiers: very highly sensitive data, highly sensitive data, medium sensitive data, and low sensitive data. The study also finds that perceived privacy risks, privacy concerns, and social influences have a significant impact on personal data sensitivity, and there are differences in public perception of personal data sensitivity among different genders, ages, and educational levels.
... However, the attack methods of some criminals and hackers are also constantly improving, and they try their best to find vulnerabilities and carry out malicious attacks. In recent years, a large number of serious personal data leaks have occurred around the world: for example, the 2019 Facebook data breach in the United States affected 540 million people [1]; China Deep Web Vision's non-compliant and illegal data processing practices have exposed billions of facial data [1]; The Finnish National Police informed the Office of the Data Protection Ombudsman in April 2021 of a personal data breach [21] involving the trial of facial recognition software by the National Bureau of Investigation in early 2020, which was caused by a failure to comply with the responsibility of the controller in the operation. Nor do the measures taken by the controller prevent the illegal processing of personal data [21]; Suprema, a security firm used by British police, banks and military contractors, reported that a security breach at a British biometrics company called Suprema compromised 28 million records and 23GB of data, including fingerprints, facial recognition data, passwords and security clearance information. ...
... However, the attack methods of some criminals and hackers are also constantly improving, and they try their best to find vulnerabilities and carry out malicious attacks. In recent years, a large number of serious personal data leaks have occurred around the world: for example, the 2019 Facebook data breach in the United States affected 540 million people [1]; China Deep Web Vision's non-compliant and illegal data processing practices have exposed billions of facial data [1]; The Finnish National Police informed the Office of the Data Protection Ombudsman in April 2021 of a personal data breach [21] involving the trial of facial recognition software by the National Bureau of Investigation in early 2020, which was caused by a failure to comply with the responsibility of the controller in the operation. Nor do the measures taken by the controller prevent the illegal processing of personal data [21]; Suprema, a security firm used by British police, banks and military contractors, reported that a security breach at a British biometrics company called Suprema compromised 28 million records and 23GB of data, including fingerprints, facial recognition data, passwords and security clearance information. ...
... This risk puts 5,700 organizations in 83 countries (including the UK's Metropolitan Police) at high risk. [22] At the national level, the impact of physiological data breaches can be far-reaching, for example, the Equifax hack, which exposed the data of 143 million US citizens [1], posing a serious threat to US national security. The frequency and scale of these data leaks are shocking, touching people's great concerns about the increasingly widespread use of face recognition technology, and even the use of facial recognition by federal agencies has aroused the anger of lawmakers, which has a negative impact on the further development of face recognition technology applications, so how to ensure the security of personal information privacy while developing face recognition technology applications? ...
... However, effectively leveraging these rich data sources requires addressing two interrelated challenges. The first challenge is ensuring patient privacy while sharing sensitive medical data across institutions (Wang et al., 2023;Jwa and Poldrack, 2022). The second challenge involves managing the heterogeneity of biomedical datasets, particularly in mitigating distribution shifts that arise when integrating populations from diverse clinical settings. ...
Preprint
Full-text available
Motivation Advancing data sharing in biomedical research, particularly for sensitive genomic and clinical datasets, is crucial for improving model performance across diverse patient populations. However, stringent privacy concerns hinder collaboration and limit insights derived from multi-institutional datasets. Current approaches to privacy-preserving data sharing fail to address gaps between data distributions. Results We introduce NoisyFlow, a differentially private neural network-based optimal transport framework designed to enable secure and unbiased biomedical data sharing. By integrating optimal transport theory with neural networks and differential privacy mechanisms, our framework aligns data distributions across institutions while preserving individual privacy. NoisyFlow eliminates the need for direct data sharing and reduces distribution shifts caused by covariate and batch effects. Empirical evaluations demonstrate the framework’s effectiveness in handling high-dimensional single-cell genomic data and histopathology images, achieving superior privacy guarantees while maintaining high utility in downstream tasks such as disease classification. Availability and implementation The implementation of NoisyFlow is available at https://github.com/liyy2/NoisyFlow . Contact mark@gersteinlab.org . Supplementary information Supplementary data are available online.
... To examine the effect of client participation within the MFL model, we tested different numbers of clients, that is, K=5, K=10, and K=20. As reported by Wang et al [34] and confirmed in Figure 2, an increasing number of clients and more client participation provide better performance for MFL training. The client distribution is different in assessing the MFL model in real-world conditions. ...
Article
Background The rise of wearable sensors marks a significant development in the era of affective computing. Their popularity is continuously increasing, and they have the potential to improve our understanding of human stress. A fundamental aspect within this domain is the ability to recognize perceived stress through these unobtrusive devices. Objective This study aims to enhance the performance of emotion recognition using multitask learning (MTL), a technique extensively explored across various machine learning tasks, including affective computing. By leveraging the shared information among related tasks, we seek to augment the accuracy of emotion recognition while confronting the privacy threats inherent in the physiological data captured by these sensors. Methods To address the privacy concerns associated with the sensitive data collected by wearable sensors, we proposed a novel framework that integrates differential privacy and federated learning approaches with MTL. This framework was designed to efficiently identify mental stress while preserving private identity information. Through this approach, we aimed to enhance the performance of emotion recognition tasks while preserving user privacy. Results Comprehensive evaluations of our framework were conducted using 2 prominent public datasets. The results demonstrate a significant improvement in emotion recognition accuracy, achieving a rate of 90%. Furthermore, our approach effectively mitigates privacy risks, as evidenced by limiting reidentification accuracies to 47%. Conclusions This study presents a promising approach to advancing emotion recognition capabilities while addressing privacy concerns in the context of empathetic sensors. By integrating MTL with differential privacy and federated learning, we have demonstrated the potential to achieve high levels of accuracy in emotion recognition while ensuring the protection of user privacy. This research contributes to the ongoing efforts to use affective computing in a privacy-aware and ethical manner.
... Laws that govern the collection, use and disclosure of personal information by organisations, governments and other entities. With the growing importance of data itself, threats of possible maltreatment and improper use of personal information come to light (Wang et al., 2023). Such rights and freedom are being implemented by laws, for instance, GDPR in the European Union, by different governments worldwide (Ducato, 2020). ...
Article
Full-text available
In today’s digital interconnectedness, data regulation in South Asia, particularly in India and Pakistan, is transforming into a state where profound changes are occurring. This article deals with the contrastive analysis of personal data-protection laws in the two countries, with the aim of revealing the points of convergence and divergence and the reasons that either support or reject unification. Different approaches led to the development of these standards, which encompass varying levels of scope, complexity and risk. The methodology prescribes reviewing and assessing the existing laws and proposing their legislative development. The research exposes the inefficiency in the legislative aspect of dealing with the rising demand for an adequate regulatory framework for data-protection measures. The wisdom drawn from this examination bestows priceless advice on Politian’s, legal experts and all involved parties who are concerned about data protection in the context of digital connections. International best practices can be adapted to inform reforms of the Digital Personal Data Protection (DPDP) Act, 2023, in India and the proposed Personal Data Protection Bill, 2023, in Pakistan to bring enhanced regimes for comprehensive and effective personal data protection in both nations. Keywords: data-protection laws; India; legislation; Pakistan.
... Devices produced by different manufacturers may use different communication protocols and data formats, leading to ineffective interaction and integration between devices. Additionally, IoT devices typically have lower computing and storage capabilities, making them vulnerable to security attacks [10], which could result in issues such as data breaches [11] and device tampering [12]. Furthermore, privacy protection and data security are also significant challenges faced by the IoT. ...
Article
Full-text available
With the rapid development and widespread application of Internet of Things (IoT) technology, we are in an era of digital transformation, where the integration between the physical and digital worlds continues to deepen [...]
Article
Full-text available
Facial recognition technologies exist in society. When they were implemented, it was not considered that the use of this technology could lead to a breach of privacy of the individual. Not all countries have specific regulations and there is no standard to determine its international feasibility. This study presents the bibliometric and content analysis of scientific production in Scopus and Web of Science. A total of 169 documents published between 2000 and 2023 were identified. It was found that the most frequently used terms are privacy, facial recognition, surveillance, and security. It was concluded that there is legal and ethical debate because there is no clear protection of human rights for the misuse of this technology.
Chapter
Reinforcement learning (RL) allows defense mechanisms to adapt to changing threats and has shown promise in tackling cyber security issues. This study presents a thorough introduction which includes foundations, uses, and difficulties to RL in cyber security. The efficacy of RL in making decisions is also emphasized in the introduction. Then the foundation for comprehending RL's use in cyber security, the fundamentals of the technology, and algorithm classifications is clarified. The study then delves into a number of RL applications in cyber security. Then a number of RL applications in cyber security and issues in RL is discussed. Along with prospects for improving cyber security safeguards through the application of RL methodologies, to successfully manage increasing cyber threats, future research directions are proposed with the integration of blockchain technology and generative adversarial networks (GANs). This work emphasizes the importance of RL in supporting cyber security and research to improve cyber defenses.
Article
This paper presents a comprehensive survey of the challenges faced by economic empowerment digital platforms. As these online platforms revolutionize the economic landscape, they encounter various hurdles that hinder their potential for fostering financial inclusion and empowerment. Through an extensive analysis of existing literature and empirical studies, this survey identifies and categorizes the key challenges faced by these platforms. The survey reveals that regulatory frameworks pose significant obstacles to economic empowerment digital platforms. Issues such as unclear or outdated regulations, varying legal requirements across jurisdictions, and the need for compliance with consumer protection and data privacy laws hinder platform operations and expansion. Moreover, the absence of standardized regulations often leads to legal uncertainties and challenges in ensuring fair competition. Furthermore, the survey highlights the persistent challenge of trust and reputation management within economic empowerment digital platforms. As these platforms rely heavily on user-generated content and interactions, establishing trust among users becomes critical. Issues such as fraudulent activities, identity verification, and dispute resolution mechanisms emerge as key challenges that platforms must address to maintain user trust and credibility. The survey also addresses the technological challenges faced by economic empowerment digital platforms. Issues such as cybersecurity threats, data breaches, and privacy concerns pose significant risks to both platform operators and users. Platforms must invest in robust security measures and adopt innovative technologies to mitigate these challenges and safeguard user information and transactions. Additionally, the survey examines challenges related to financial inclusion and accessibility. Despite the potential for economic empowerment, certain groups, such as individuals from low-income communities or those lacking digital literacy, may face barriers in accessing and utilizing these platforms. Bridging the digital divide and ensuring equal opportunities for all individuals to participate and benefit from these platforms remains an ongoing challenge. Finally, the survey highlights the need for collaboration and cooperation among stakeholders. Platform operators, policymakers, regulatory bodies, and user communities must engage in constructive dialogue to address the challenges faced by economic empowerment digital platforms effectively. Collaborative efforts can lead to the development of regulatory frameworks, industry standards, and best practices that foster a conducive environment for these platforms to thrive.
Article
Full-text available
According to the statistics of 160 typical fire and explosion accidents in oil storage areas at home and abroad nearly 50 years, 122 of them occurred the secondary accidents in the emergency responses. Based on 122 accident cases, 21 causal factors leading to secondary accidents are summarized. In order to quantify the influencing degree of these causal factors on the accident consequences, a multiple linear regression model was established between them. In the modeling process, these factors are decomposed into the criterion layer, variable layer, and bottom layer. The improved analytic hierarchy process (IAHP) was used to establish the relationship between the bottom factors and variable factors, and the regression analysis method was used to establish the relational model between variable layer and criterion layer. For 122 cases of the secondary accidents, this study took the year as a statistical dimension, and obtained 40 groups of sample data. The first 34 groups of sample data were used to build the causal factors model, and the last 6 groups of sample data were tested the generalization ability of the model by using the established regression model combined with grey prediction model. The results show that the prediction ability of the established model was better than that of the grey prediction model alone. Moreover, the relative contribution and change trend of the causal factors were evaluated using the mutation progression method, and corresponding preventive countermeasures were proposed. It was found that human professional skills, knowledge and literacy, environmental issues, and firefighting facilities are the main influencing factors that lead to the secondary accidents. These three kinds of factors show a gradual improvement trend, and the existing prevention measures should be maintained and further improved. The problem of inherent objects or equipment factors has not been effectively improved and has a worsening trend, which is the focus of prevention in the future, and the prevention and control efforts need to be moderately increased. The research results have important guiding significance for understanding the quantitative influences of causal factors on the accident consequences, improving emergency response capabilities, reducing accident losses, and avoiding secondary accidents.
Article
Full-text available
The rapid development of facial recognition technologies (FRT) has led to complex ethical choices in terms of balancing individual privacy rights versus delivering societal safety. Within this space, increasingly commonplace use of these technologies by law enforcement agencies has presented a particular lens for probing this complex landscape, its application, and the acceptable extent of citizen surveillance. This analysis focuses on the regulatory contexts and recent case law in the United States (USA), United Kingdom (UK), and European Union (EU) in terms of the use and misuse of FRT by law enforcement agencies. In the case of the USA, it is one of the main global regions in which the technology is being rapidly evolved, and yet, it has a patchwork of legislation with less emphasis on data protection and privacy. Within the context of the EU and the UK, there has been a critical focus on the development of accountability requirements particularly when considered in the context of the EU’s General Data Protection Regulation (GDPR) and the legal focus on Privacy by Design (PbD). However, globally, there is no standardised human rights framework and regulatory requirements that can be easily applied to FRT rollout. This article contains a discursive discussion considering the complexity of the ethical and regulatory dimensions at play in these spaces including considering data protection and human rights frameworks. It concludes that data protection impact assessments (DPIA) and human rights impact assessments together with greater transparency, regulation, audit and explanation of FRT use, and application in individual contexts would improve FRT deployments. In addition, it sets out ten critical questions which it suggests need to be answered for the successful development and deployment of FRT and AI more broadly. It is suggested that these should be answered by lawmakers, policy makers, AI developers, and adopters.
Article
Full-text available
Joint estimation of the human body is suitable for many fields such as human–computer interaction, autonomous driving, video analysis and virtual reality. Although many depth-based researches have been classified and generalized in previous review or survey papers, the point cloud-based pose estimation of human body is still difficult due to the disorder and rotation invariance of the point cloud. In this review, we summarize the recent development on the point cloud-based pose estimation of the human body. The existing works are divided into three categories based on their working principles, including template-based method, feature-based method and machine learning-based method. Especially, the significant works are highlighted with a detailed introduction to analyze their characteristics and limitations. The widely used datasets in the field are summarized, and quantitative comparisons are provided for the representative methods. Moreover, this review helps further understand the pertinent applications in many frontier research directions. Finally, we conclude the challenges involved and problems to be solved in future researches.
Article
Full-text available
Misinformation in social media is an actual and contested policy problem given its outreach and the variety of stakeholders involved. In particular, increased social media use makes the spread of misinformation almost universal. Here we demonstrate a framework for evaluating tools for detecting misinformation using a preference elicitation approach, as well as an integrated decision analytic process for evaluating desirable features of systems for combatting misinformation. The framework was tested in three countries (Austria, Greece, and Sweden) with three groups of stakeholders (policymakers, journalists, and citizens). Multi-criteria decision analysis was the methodological basis for the research. The results showed that participants prioritised information regarding the actors behind the distribution of misinformation and tracing the life cycle of misinformative posts. Another important criterion was whether someone intended to delude others, which shows a preference for trust, accountability, and quality in, for instance, journalism. Also, how misinformation travels is important. However, all criteria that involved active contributions to dealing with misinformation were ranked low in importance, which shows that participants may not have felt personally involved enough in the subject or situation. The results also show differences in preferences for tools that are influenced by cultural background and that might be considered in the further development of tools.
Article
Full-text available
There is ample evidence that morphological and social cues in a human face provide signals of human personality and behaviour. Previous studies have discovered associations between the features of artificial composite facial images and attributions of personality traits by human experts. We present new findings demonstrating the statistically significant prediction of a wider set of personality features (all the Big Five personality traits) for both men and women using real-life static facial images. Volunteer participants (N = 12,447) provided their face photographs (31,367 images) and completed a self-report measure of the Big Five traits. We trained a cascade of artificial neural networks (ANNs) on a large labelled dataset to predict self-reported Big Five scores. The highest correlations between observed and predicted personality scores were found for conscientiousness (0.360 for men and 0.335 for women) and the mean effect size was 0.243, exceeding the results obtained in prior studies using ‘selfies’. The findings strongly support the possibility of predicting multidimensional personality profiles from static facial images using ANNs trained on large labelled datasets. Future research could investigate the relative contribution of morphological features of the face and other characteristics of facial images to predicting personality.
Article
Facial recognition technology is a state-of-the-art digital tool widely used by private and public entities. Its benefits are notable, but the challenges that it presents cannot be overlooked, as this paper will expose. In Europe, a major challenge is ensuring compliance with the General Data Protection Regulation, starting with the search of a proper legal ground for data processing and the identification of an adequate exception to allow the processing of biometric data. The implementation of security measures and the risks associated with data transfer to third countries must also be considered. A further issue is the reliability of facial recognition technology, which relates to data accuracy. These challenges are substantial, but they are not insurmountable. More comprehensive and in-depth knowledge of the legal intricacies of the General Data Protection Regulation, more secure and transparent data-processing procedures, and full acknowledgement of the technology’s limitations might provide a liability shield.
Article
Purpose One of the contributions of artificial intelligent (AI) in modern technology is emotion recognition which is mostly based on facial expression and modification of its inference engine. The facial recognition scheme is mostly built to understand user expression in an online business webpage on a marketing site but has limited abilities to recognise elusive expressions. The basic emotions are expressed when interrelating and socialising with other personnel online. At most times, studying how to understand user expression is often a most tedious task, especially the subtle expressions. An emotion recognition system can be used to optimise and reduce complexity in understanding users' subconscious thoughts and reasoning through their pupil changes. Design/methodology/approach This paper demonstrates the use of personal computer (PC) webcam to read in eye movement data that includes pupil changes as part of distinct user attributes. A custom eye movement algorithm (CEMA) is used to capture users' activity and record the data which is served as an input model to an inference engine (artificial neural network (ANN)) that helps to predict user emotional response conveyed as emoticons on the webpage. Findings The result from the error in performance shows that ANN is most adaptable to user behaviour prediction and can be used for the system's modification paradigm. Research limitations/implications One of the drawbacks of the analytical tool is its inability in some cases to set some of the emoticons within the boundaries of the visual field, this is a limitation to be tackled within subsequent runs with standard techniques. Originality/value The originality of the proposed model is its ability to predict basic user emotional response based on changes in pupil size between average recorded baseline boundaries and convey the emoticons chronologically with the gaze points.
Article
Bu çalışmada ülkemizde Arama Kurtarma (A/K) amacıyla kullanılan gemilerdeki hassas faaliyetler içerisindeki; harici yangın söndürme, tıbbi tahliye, düzensiz göçmen olaylarına müdahale, kaybolan/sürüklenen tekneye müdahale ve denizden insan kurtarma faaliyetlerindeki tehlikeler çeklist yöntemi ile belirlenerek alınması gereken temel iş güvenliği önlemleri ortaya çıkarılmıştır. Hassas faaliyetlerdeki ortak iş güvenliği önlemleri olarak; faaliyete uygun kişisel koruyucu donanımların personel tarafından kullanılması, A/K gemisinde operasyon esnasında batma ve su almayı önlemek maksadıyla dışa açılan kaporta ve lombozların kapalı tutulması, dış güvertede kaygan/ıslak zeminde çalışılması sebebiyle emniyet halatı, kaydırmaz tabanlı ayakkabı, can yeleği gibi kişisel koruyucu donanımların giyilmesi ve kullanılan matafora, yedekleme donanımı, kurtarma ağı gibi ekipmanların periyodik bakımlarının zamanında yaptırılması ve çalışır durumda tutulması olarak öngörülmüştür. Çalışmada risk analizi belirlenmesinde L tipi matris yöntemi tercih edilmiştir. Kaybolan/sürüklenen tekneye müdahale faaliyeti ile ilgili kullanılan risk analizi uygulaması sonucunda; en yüksek risk skoru değerinin 25 ile halat kopması tehlikesinde olduğu, en düşük risk skoru değerinin ise 3 ile üşüme tehlikesinde olduğu sonucuna varılmıştır. Sonuç olarak tehlikeli meslek gruplarını bünyesinde barındıran denizcilik sektörü içindeki tüm gemiler için risk analizleri yapılarak sonrasında alınacak tedbirler belirlenmelidir. Böylece çalışanları tehlikelerden korurken verimliliğin de artmasına katkı sağlanmış olunacaktır.
Article
Advances in personalization algorithms and other applications of machine learning have vastly enhanced the ease and convenience of our media and communication experiences, but they have also raised significant concerns about privacy, transparency of technologies and human control over their operations. Going forth, reconciling such tensions between machine agency and human agency will be important in the era of artificial intelligence (AI), as machines get more agentic and media experiences become increasingly determined by algorithms. Theory and research should be geared toward a deeper understanding of the human experience of algorithms in general and the psychology of Human–AI interaction (HAII) in particular. This article proposes some directions by applying the dual-process framework of the Theory of Interactive Media Effects (TIME) for studying the symbolic and enabling effects of the affordances of AI-driven media on user perceptions and experiences.