Skip to main content

Digital Transformation Impact in Security and Privacy

  • Conference paper
  • First Online:
Developments and Advances in Defense and Security

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 255))

Abstract

Emerging technologies are changing the way people live and how businesses work. There is an exponential growth of data that is leading to the rise of new developments that allow companies to get actionable insights and improve their business model. This is what digital transformation is about. It refers to the process of involving new technologies to create new business processes or change existing ones. Digital transformation can be very beneficial for a company as one of its primary goals is to enhance customer engagement. Nowadays, consumers are expecting personalized experiences from companies. Therefore, it is essential for companies to use technology to innovate their processes and analyze the vast amount of data that is generated daily so they can meet customers’ expectations. However, as more data is generated and new technologies are evolved, risks and threads are becoming a concern for both businesses and consumers. Security and privacy are key factors companies need to consider when implementing technologies that could potentially affect the consumer. In order to succeed and avoid big cost implications, measures that ensure the security of data are necessary. This paper addresses the benefits and drawbacks of digital transformation in business, primarily focusing on the risks that come with it, such as privacy and security. It also explains how new technology is able to solve these problem and new trends that would be interesting to do research on in future.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Nadkarni, S., Prügl, R.: Digital transformation: a review, synthesis and opportunities for future research. Manage. Rev. Q. 1(1), 1–16 (2020). https://doi.org/10.1007/s11301-020-00185-7

    Article  Google Scholar 

  2. Lim, S., Henriksson, A., Zdravkovic, J.: Data-driven requirements elicitation: a systematic literature review. SN Comput. Sci. 2(16), 1–35 (2021). https://doi.org/10.1007/s42979-020-00416-4

    Article  Google Scholar 

  3. Bag, S., Gupta, S., Kumar, S.: Industry 4.0 adoption and 10R advance manufacturing capabilities for sustainable development. Int. J. Prod. Econ. 231(1), 1–12 (2021). https://www.sciencedirect.com/science/article/abs/pii/S0925527320302103

  4. Becker, W., Schmid, O.: The right digital strategy for your business: an empirical analysis of the design and implementation of digital strategies in SMEs and LSEs. Bus. Res. 13(1), 985–1005 (2020). https://doi.org/10.1007/s40685-020-00124-y

    Article  Google Scholar 

  5. Coquard, E.: How digital transformation can change your business in 2020. Medium. https://medium.com/@the.scalers/how-digital-transformation-can-change-your-business-in-2020-dec882d2cf36. Last accessed 2020, 03, 26

  6. Morgan, B.: 7 examples of how digital transformation impacted business performance. Forbes. https://www.forbes.com/sites/blakemorgan/2019/07/21/7-examples-of-how-digital-transformation-impacted-business-performance/#d82f89251bbe. Last accessed 2020, 12, 05

  7. Horak, T., Strelec, P., Huraj, L., Tanuska, P., Vaclavova, A., Kebisek, M.: The vulnerability of the production line using industrial IoT systems under ddos attack. Electronics (Switzerland) 10(4), 1–32 (2021). https://doi.org/10.3390/electronics10040381

    Article  Google Scholar 

  8. Li, Y., Ouyang, K., Li, N., Rahmani, R., Yang, H., Pei, Y.: A blockchain-assisted intelligent transportation system promoting data services with privacy protection. Sensors (Switzerland) 20(9), 1–22 (2020). https://doi.org/10.3390/s20092483

    Article  Google Scholar 

  9. Chanson, M., Bogner, A., Bilgeri, D., Fleisch, E., Wortmann, F.: Blockchain for the IoT: privacy-preserving protection of sensor data. J. Assoc. Inf. Syst. 20(9), 1271–1307 (2019). https://doi.org/10.17705/1jais.00567

    Article  Google Scholar 

  10. Clark, K., Duckham, M., Guillemin, M., Hunter, A., McVernon, J., O’Keefe, C., Pitkin, C., Prawer, S., Sinnott, R., Warr, D., Waycott, J.: Advancing the ethical use of digital data in human research: challenges and strategies to promote ethical practice. Ethics Inf. Technol. 21(1), 59–73 (2019). https://doi.org/10.1007/s10676-018-9490-4

  11. Ogbuke, N.J., Yusuf, Y.Y., Dharma, K., Mercangoz, B.A.: Big data supply chain analytics: ethical, privacy and security challenges posed to business, industries and society. Prod. Plan. Control 1(1), 1–15 (2020). https://doi.org/10.1080/09537287.2020.1810764

  12. Statista: Number of connected devices worldwide 2030. Statista. https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/. Last accessed 2020, 11, 05

  13. Yarovenko, H., Bilan, Y., Lyeonov, S., Mentel, G.: Methodology for assessing the risk associated with information and knowledge loss management. J. Bus. Econ. Manag. 22(2), 369–387 (2021). https://doi.org/10.3846/jbem.2021.13925

    Article  Google Scholar 

  14. Mcgruer, J.: Emerging privacy legislation in the international landscape: strategy and analysis for compliance strategy and analysis for compliance. Wash. J. Law Technol. Arts 15(2), 120–159 (2020). https://digitalcommons.law.uw.edu/cgi/viewcontent.cgi?article=1303&context=wjlta

  15. Ali, S., Husain, S., Sharma, M.: A study on emerging cyber technologies, threats, and prevention in information security. IOSR J. Comput. Eng. 19(2), 49–54 (2017). https://doi.org/10.9790/0661-1902044955

    Article  Google Scholar 

  16. Passeri, P.: January 2020, Cyber attacks statistics. HACKMAGEDDON. https://www.hackmageddon.com/2020/03/03/january-2020-cyber-attacks-statistics/. Last accessed 2020, 07, 27

  17. Larrucea, X., Moffie, M., Asaf, S., Santamaria, I.: Towards a GDPR compliant way to secure European cross border healthcare industry 4.0. Comput. Stand. Interfaces 69(1), 1–7 (2020). https://doi.org/10.1016/j.csi.2019.103408

  18. Newman, D.: What is privacy in the age of digital transformation? Forbes. https://www.forbes.com/sites/danielnewman/2019/05/02/what-is-privacy-in-the-age-of-digital-transformation/#1fda2aa3628e. Last accessed 2020, 12, 07

  19. Kieran, C.: Have your privacy policies kept up with your digital transformation? Harvard Business Review. https://hbr.org/2020/06/have-your-privacy-policies-kept-up-with-your-digital-transformation. Last accessed 2021, 01, 05

  20. Walker, A.: 2020 technology trends for cybersecurity. Research Hub. https://research.g2.com/insights/2020-trends/cybersecurity-technology-trends-2020. Last accessed 2020, 12, 10

  21. Nguyen-Duy, J.: How digital transformation has impacted security and how to minimize risk. CSO Online. https://www.csoonline.com/article/3292927/how-digital-transformation-has-impacted-security-and-how-to-minimize-risk.html. Last accessed 2020, 12, 12

  22. Deloitte. Managing risk in digital transformation. Risk advisory (2018). https://www2.deloitte.com/content/dam/Deloitte/in/Documents/risk/in-ra-managing-risk-in-digital-transformation-1-noexp.pdf

  23. Cisco Systems, Inc.: Ensuring security for digital transformation, ensuring security for digital transformation. (2019). https://www.cisco.com/c/dam/en/us/products/collateral/security/ntt-cisco-security-brochure-feb2020.pdf

  24. Pieters, W., Blaauw, M., Van den Hoven, J.: Privacy and information technology. In: M. Warnier (ed.) Stanford Encyclopedia of Philosophy; Metaphysics Research Lab, Stanford University (2019). https://plato.stanford.edu/entries/it-privacy/#HowInfTecItsSolPriCon

  25. Joyce, S.: The journey to digital trust. PricewaterhouseCoopers (2018). http://thoughtleadership.nam.org/system/files/2018-11/pwc_journey-to-digital-trust_fall2018.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Laura Guerra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Díaz, A., Guerra, L., Díaz, E. (2022). Digital Transformation Impact in Security and Privacy. In: Rocha, Á., Fajardo-Toro, C.H., Rodríguez, J.M.R. (eds) Developments and Advances in Defense and Security . Smart Innovation, Systems and Technologies, vol 255. Springer, Singapore. https://doi.org/10.1007/978-981-16-4884-7_6

Download citation

Publish with us

Policies and ethics