IDEAS home Printed from https://ideas.repec.org/a/bhx/ojtjts/v3y2021i1p14-21id533.html
   My bibliography  Save this article

Data Protection Techniques: A Cryptography Approach

Author

Listed:
  • Laszlo Reynolds
  • Johnson Winks

Abstract

Purpose: Digital world is a complex and a constantly evolving world alongside the modernization. This has been through the improvement of the technology from physical nature information to digitized data that is the information technology. Data is, therefore, becoming a basic element in today's world than they were anticipated some three decades ago, now being shared and stored electronically. This study, therefore, sought to establish the ways in protecting information privacy using cryptography. Methodology: The study adopted a desktop literature review method (desk study). This involved an in-depth review of studies related to data protection and cryptography. Three sorting stages were implemented on the subject under study that is data protection and cryptography in order to determine the viability of the subject for research. The first stage that comprised the initial identification of all articles that were based on data protection and cryptography from various data bases. A second search involved fully available publications on the subject of data protection and cryptography. the third step involved the selection of fully accessible publications. Reduction of the literature to only fully accessible publications yielded specificity and allowed the researcher to focus on the articles that related to data protection and cryptography which was split into top key words. After an in-depth search into the top key words (data protection and cryptography), the researcher arrived at 12 articles that were suitable for analysis. Analysis was done using Excel where the study presented the findings in form of themes. Findings: The research findings point towards several methods that can be used in cryptography which were concluded to include symmetric encryption, asymmetric encryption and hashing. Unique contribution to theory, policy, and practice: Previous studies were reviewed and some of them presented several knowledge gaps. The review of the literature presented knowledge gaps in the contextual, conceptual and methodological fronts. For instance, one of the gap that was presented was the contextual gap (geographical gap). This is because some of the studies were done in different geographical contexts such as the United States, China and Japan. The application of the findings will be challenged by the technological advancements in Kenya since Kenya is still a developing country in the process of up taking new technologies. Other studies in their research applied different methodologies such as the use of the FTK Imager and the use of Hashing. The studies did not entirely focus on the use of cryptography as a method of data security and thus they presented a methodological gap.

Suggested Citation

  • Laszlo Reynolds & Johnson Winks, 2021. "Data Protection Techniques: A Cryptography Approach," Journal of Technology and Systems, CARI Journals Limited, vol. 3(1), pages 14-21.
  • Handle: RePEc:bhx:ojtjts:v:3:y:2021:i:1:p:14-21:id:533
    as

    Download full text from publisher

    File URL: https://carijournals.org/journals/index.php/JTS/article/view/533/751
    Download Restriction: Access to full texts is restricted to Journal of Technology and Systems
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    More about this item

    Keywords

    Data Protection; Cryptography;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bhx:ojtjts:v:3:y:2021:i:1:p:14-21:id:533. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chief Editor (email available below). General contact details of provider: https://www.carijournals.org/journals/index.php/JTS/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.