منابع
کتاب
- انصاری، باقر، اصول پردازش دادههای شخصی، چ 1، تهران: شرکت سهامی انتشار، 1402.
- انصاری، باقر و عطار، شیما، حقوق کاربران فضای مجازی، چ 1، تهران: شرکت سهامی انتشار، 1402.
- زند، حسین، حمایت از دادهها در حقوق موضوعه ایران، چ 2، تهران: شرکت سهامی انتشار، 1403.
مقاله
- اسماعیلی، محسن و مهدی نریمانپور، «مبانی حقوقی تبادل دادههای شخصی (مطالعه تطبیقی در مقررات عمومی حفاظت از داده اتحادیه اروپا و حقوق ایران)»، حقوق اسلامی، د. ۲۱، ش. ۸۲، 1403، صص ۱۲۳-۱۶۵،
https://doi.org/10.22034/ilaw.2023.708599.
- پور یوسف، زهرا، مهری رجایی و نیکمحمد بلوچزهی، «حفظ حریم خصوصی خودروها در شبکههای ارتباطات خودرویی»، همایش ملی پژوهشهای نوین در علوم و فناوری، 1397، تهران، ایران.
- حسینی، علی، «حقوق حفاظت از دادههای شخصی در پردازش الگوریتمی، چالشها و راهکارها»، دولت و حقوق، د. 5، ش. ۱، 1403، صص ۹۹-۱۲۲.
- صادقی، حسین و مهدی ناصر، «جستاری در ماهیتشناسی دادههای خصوصی در سازوکار عملکرد ابزارهای فناوری اینترنت اشیا»، فصلنامه رشد فناوری، د. 19، ش. ۲، 1402، صص ۳۳-۴۱.
- عرب سرخی، ابوذر و طلا تفضلی، «تحلیل موضوعات راهبردی در قلمرو مقررات حفاظت از دادههای عمومی»، دوفصلنامه علمی منادی امنیت فضای تولید و تبادل اطلاعات، د. ۱۳، ش. ۲، 1403، صص ۱۲-۲۳.
- فرحزادی، علیاکبر، حسین صادقی، و مهدی ناصر، «وظایف کنترلکنندگان و پردازندگان در پیشگیری از نقض امنیت شبکههای تبادل اطلاعات»، قضاوت، د. ۲۲، ش. ۱۱۲، 1401، صص ۷۱-۹۹.
- لطیف زاده، مهدیه، سید محمدمهدی قبولی درافشان، سعید محسنی و محمد عابدی، «تحلیل بستر قانونی حمایت از داده شخصی در اتحادیه اروپا»، پژوهشنامه پردازش و مدیریت اطلاعات، د. ۳۷، ش. ۲، 1400، صص ۴۳۹-۴۷۲.
https://doi.org/10.52547/jipm.37.2.439.
- مزینانیان، سعیده، «تنظیمگری حریم خصوصی در فضای مجازی (مطالعه تطبیقی در حقوق ایالات متحده آمریکا، اتحادیه اروپا و ایران)»، پژوهشهای حقوق اقتصادی و تجاری، د. 1، ش. 2، 1403، صص 207-239.
https://doi.org/10.48308/eclr.2023.232727.1030.
منابع برخط
- طرح حفاظت از دادههای شخصی مورخ 15/07/1403 مجلس شورای اسلامی، قابل دسترسی در: (https://rc.majlis.ir/fa/legal_draft/show/181672)، تاریخ آخرین بازدید: 20/05/1404.
- طرح حمایت و حفاظت از داده و اطلاعات شخصی مورخ 26/۰۶/1400 مجلس شورای اسلامی، قابل دسترسی در:
https://media.dotic.ir/uploads/org/2021/10/09/163377045160152200.pdf)
تاریخ آخرین بازدید: 20/05/1404.
References
Books
- Ansari, Bagher, Principles of Personal Data Processing, 1st edition, Tehran: Sherkat Sahami Enteshar, 2023. (in Persian)
- Ansari, Bagher and Attar, Shima, Rights of Cyberspace Users, 1st edition, Tehran: Sherkat Sahami Enteshar, 2023. (in Persian)
- Zand, Hossein, Data Protection in Iranian Positive Law, 2nd edition, Tehran: Sherkat Sahami Enteshar, 2024. (in Persian)
Articles
- Al-Zubaidie, M. and Zhang, Z. and Zhang, J, "PAX: Using Pseudonymization and Anonymization to Protect Patients’ Identities and Data in the Healthcare System", International Journal of Environmental Research and Public Health, Vol. 16, No. 9, 2019, pp 1-36, https://doi.org/10.3390/ijerph16091490.
- Arab Sorkhi, Abouzar and Tafazoli, Tala, "Analysis of Strategic Issues in the Realm of General Data Protection Regulations", Monadi AFTA, Vol. 13, No. 2, 2024, pp 12-23. (in Persian)
- Bolognini, Luca and Bistolfi, Camilla, "Pseudonymization and Impacts of Big (Personal/Anonymous) Data Processing in the Transition from the Directive 95/46/EC to the New EU General Data Protection Regulation", Computer Law & Security Review, Vol. 33, No. 2, 2017, pp 171-181, https://doi.org/10.1016/j.clsr.2016.11.002.
- Bourdillon, Stalla and Alison, Sophie, "Anonymous Data v. Personal Data, A False Debate: An EU Perspective on Anonymization, Pseudonymization and Personal Data", Wisconsin International Law Journal, 2017, pp 1-38.
- El Emam, K and Jonker, E and Arbuckle, L and Malin, B. "A Systematic Review of Re-Identification Attacks on Health Data", PLoS One, Vol. 6, No. 12, 2015, pp 1-12, https://doi.org/10.1371/journal.pone.0126772.
- Esmaeili, Mohsen and Narimanpour, Mehdi, "Legal Foundations of Personal Data Exchange (A Comparative Study of the EU General Data Protection Regulation and Iranian Law) ", Islamic Law, Vol. 21, No. 82, 2024, pp 123-165, doi: 10.22034/ilaw.2023.708599. (in Persian).
- Farahzadi, Ali Akbar and Sadeghi, Hossein and Naser, Mehdi, "Duties of Controllers and Processors in Preventing Security Breaches in Information Exchange Networks", Ghezavat, Vol. 22, No. 112, 2022, pp 71-99. (in Persian)
- Gazizov, Andrey and Gazizov, Evgeny and Gazizova, Svetlana, "Theoretical Aspects of the Protection of Personal Data of Employees of the Enterprise by the Method of Pseudonymization", E3S Web Conf, 2020, pp 1-8, https://doi.org/10.1051/e3sconf/202021011001.
- Heurix, Johannes and Karlinger, Michael and Neubauer, Thomas, "Pseudonymization with Metadata Encryption for Privacy-Preserving Searchable Documents", 45th Hawaii International Conference on System Sciences, Maui, HI, USA, 2012, pp 3011-3020.
https://doi.org/10.1109/HICSS.2012.491.
- Heurix, Johannes and Karlinger, Michael and Schrefl, Michael & Neubauer, Thomas, "A Hybrid Approach Integrating Encryption and Pseudonymization for Protecting Electronic Health Records", Proceedings of the 8th IASTED International Conference on Biomedical Engineering, Innsbruck, Austria, 2011, pp 1-8.
https://doi.org/10.2316/P.2011.723-117.
- Heurix, Johannes and Neubauer, Thomas, "Privacy-Preserving Storage and Access of Medical Data through Pseudonymization and Encryption", Lecture Notes in Computer Science, 6863, Berlin, Heidelberg, 2011, pp 1-12, https://doi.org/10.1007/978-3-642-22890-2_16.
- Hosseini, Ali, "Data Protection Law in Algorithmic Processing: Challenges and Solutions", Government and Law, Vol. 5, No. 1, 2024, pp 99-122. (in Persian)
- Latifzadeh, Mahdieh and Ghobouli Dorafshan, Seyed Mohammad Mehdi and Mohseni, Saeed and Abedi, Mohammad, "Analysis of the Legal Framework for Personal Data Protection in the European Union", Information Processing and Management Research Journal, Vol. 37, No. 2, 2021, pp 439-472, https://doi.org/10.52547/jipm.37.2.439, (in Persian).
- Lehmann, Anja, "ScrambleDB: Oblivious (Chameleon) Pseudonymization- as-a-Service", Privacy enhancing technologies, No 3, 2019, pp 289–309, https://doi.org/10.2478/popets-2019-0048.
- Lubarsky, Boris, "Re-Identification of “Anonymized” Data", L. TECH. REV, 202, 2017, pp 202-213.
- Machanavajjhala, A. and Gehrke, A. and Kifer D. and Venkitasubramaniam, M. "L-Diversity: Privacy Beyond k-Anonymity", 22nd International Conference on Data Engineering (ICDE'06), Atlanta, GA, USA, 2006, pp 24-24, https://doi.org/10.1145/1217299.1217302.
- Mazinanian, Saeedeh, "Regulating Privacy in Cyberspace (A Comparative Study in the Laws of the United States, European Union, and Iran) ", Economic and Commercial Law Research, Vol. 1, No. 2, 2023, pp 207-239, doi: 10.48308/eclr.2023.232727.1030, (in Persian)
- Neubauer, Thomas and Heurix, Johannes, "A Methodology for the Pseudonymization of Medical Data", International Journal of Medical Informatics, Vol. 80, No. 3, 2011, pp 190-204.
https://doi.org/10.1016/j.ijmedinf.2010.10.016.
- Neumann, G.K. and Grace, P. and Burns, D. et al, "Pseudonymization Risk Analysis in Distributed Systems", Journal of Internet Services and Applications, Vol. 10, No. 1, 2019, pp 1-16.
https://doi.org/10.1186/s13174-018-0098-z.
- Ninghui, Li and Tiancheng, Li and Venkatasubramanian, Suresh, "T-Closeness: Privacy Beyond k-Anonymity and l-Diversity", IEEE 23rd International Conference on Data Engineering (ICDE), No 2, 2007, pp 106-115.
- Pinnamaneni, Nikhil and Dodda, Sumanth and Muvva, Sai Charan, "Survey Paper on Anonymization and Pseudo-Anonymization for E-healthcare", International Research Journal of Modernization in Engineering, Technology and Science, Vol. 3, No. 7, 2021, pp 769-775.
- Pouryousef, Zahra and Rajaei, Mehri and Balochzehi, Nik Mohammad, "Preserving Vehicle Privacy in Vehicular Communication Networks", National Conference on New Researches in Science and Technology, 2018, Tehran, Iran. (in Persian)
- Ribeiro, S. L. and Nakamura, E. T, "Privacy Protection with Pseudonymization and Anonymization in a Health IoT System: Results from OCARIoT", IEEE 19th International Conference on Bioinformatics and Bioengineering (BIBE), Athens, Greece, 2019, pp 904-908, https://doi.org/10.1109/BIBE.2019.00169.
- Sadeghi, Hossein and Naser, Mehdi, "An Inquiry into the Nature of Private Data in the Functioning Mechanism of Internet of Things Technologies", Technology Growth, Vol. 19, No. 2, 2023, pp 33-41. (in Persian)
- Shin, Soo Yong and kim, Hun Sung, "Data Pseudonymization in a Range That Does Not Affect Data Quality: Correlation with the Degree of Participation of Clinicians", Journal of Korean Medical Science, Vol. 36, No. 44, 2021, pp 1-11, https://doi.org/10.3346/jkms.2021.36. e299.
- Starchon, Peter and Pikulik, Tomas, "GDPR Principles in Data Protection Encourage Pseudonymization through Most Popular and Full-Personalized Devices - Mobile Phones", Procedia Computer Science, No 151, 2019, pp 303-312, https://doi.org/10.1016/j.procs.2019.04.043.
- Sweeney, L, "K-Anonymity: A Model for Protecting Privacy, International Journal on Uncertainty", Fuzziness and Knowledge-Based Systems, Vol. 10, No. 5, 2002, pp 557-570.
https://doi.org/10.1142/S0218488502001648.
Websites
- Data Protection Commission IE, "Guidance on Anonymisation and Pseudonymisation", Available at:
20 Anonymisation%20and%20Pseudonymisation.pdf) Visited 2025/02/08.
- Dotic "Personal Data and Information Protection Bill, dated 26/06/1400 (September 17, 2021), Available at:
- https://media.dotic.ir/uploads/org/2021/10/09/163377045160152200.pdf, Visited: 2025/08/11, [In Persian].
- ISO/IEC, "Privacy Enhancing Data De-Identification Terminology and Classification of Techniques", Available at:
(https://www.iso.org/obp/ui/#iso:std:iso-iec:20889:ed-1:v1:en) Visited 2025/01/25.
- uk, "google-v-vidal-hall-judgment", Available at:
(https://www.judiciary.uk/wp-content/uploads/2015/03/google-v-vidal-hall-judgment.pdf) Visited 2025/08/11.
- ir "Personal Data Protection Bill, dated 15/07/1403 (July 6, 2024)", Available at: (https://rc.majlis.ir/fa/legal_draft/show/181672), Visited visited: 2025/08/11, [In Persian]
- Robin data, "What is Pseudonymised Data? " Available at: (https://www.robin-data.io/en/data-protection-and-data-security-academy/wiki/pseudonymised-data) Visited 2025/01/25.
European Data Protection Board, "Guidelines 01/2025 on Pseudonymisation", Available at: (https://www.edpb.europa.eu/our-work-tools/documents/public-consultations/2025/guidelines-012025-pseudonymisation_en) Visited 2025/02/08
|