{"id":"https://openalex.org/W7093312435","doi":"https://doi.org/10.1109/idsta66210.2025.11202812","title":"Cybersecurity and Criminal Protection of DNA Fingerprinting Data in UAE Law","display_name":"Cybersecurity and Criminal Protection of DNA Fingerprinting Data in UAE Law","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W7093312435","doi":"https://doi.org/10.1109/idsta66210.2025.11202812"},"language":null,"primary_location":{"id":"doi:10.1109/idsta66210.2025.11202812","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idsta66210.2025.11202812","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Sixth International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Sultan Abdullah Al-kutbi","orcid":null},"institutions":[{"id":"https://openalex.org/I161913731","display_name":"Al Ain University","ror":"https://ror.org/023abrt21","country_code":"AE","type":"education","lineage":["https://openalex.org/I161913731"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Sultan Abdullah Al-kutbi","raw_affiliation_strings":["College of Law, Al Ain University,Al Ain,UAE"],"affiliations":[{"raw_affiliation_string":"College of Law, Al Ain University,Al Ain,UAE","institution_ids":["https://openalex.org/I161913731"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Mohammad Amin Alkrisheh","orcid":null},"institutions":[{"id":"https://openalex.org/I161913731","display_name":"Al Ain University","ror":"https://ror.org/023abrt21","country_code":"AE","type":"education","lineage":["https://openalex.org/I161913731"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mohammad Amin Alkrisheh","raw_affiliation_strings":["College of Law, Al Ain University,Al Ain,UAE"],"affiliations":[{"raw_affiliation_string":"College of Law, Al Ain University,Al Ain,UAE","institution_ids":["https://openalex.org/I161913731"]}]},{"author_position":"last","author":{"id":null,"display_name":"Khawlah M. Al-tkhayneh","orcid":null},"institutions":[{"id":"https://openalex.org/I161913731","display_name":"Al Ain University","ror":"https://ror.org/023abrt21","country_code":"AE","type":"education","lineage":["https://openalex.org/I161913731"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Khawlah M. Al-tkhayneh","raw_affiliation_strings":["College of Education, Humanities and Social Sciences, Al Ain University,Al Ain,UAE"],"affiliations":[{"raw_affiliation_string":"College of Education, Humanities and Social Sciences, Al Ain University,Al Ain,UAE","institution_ids":["https://openalex.org/I161913731"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I161913731"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.67878462,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"96","last_page":"102"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T13475","display_name":"Digital Transformation in Law","score":0.20569999516010284,"subfield":{"id":"https://openalex.org/subfields/2000","display_name":"General Economics, Econometrics and Finance"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T13475","display_name":"Digital Transformation in Law","score":0.20569999516010284,"subfield":{"id":"https://openalex.org/subfields/2000","display_name":"General Economics, Econometrics and Finance"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13851","display_name":"Law, AI, and Intellectual Property","score":0.05339999869465828,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13945","display_name":"Legal, Health, Environmental and COVID-19 Challenges","score":0.02500000037252903,"subfield":{"id":"https://openalex.org/subfields/2739","display_name":"Public Health, Environmental and Occupational Health"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/legislator","display_name":"Legislator","score":0.6794000267982483},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.5752000212669373},{"id":"https://openalex.org/keywords/legislation","display_name":"Legislation","score":0.5641000270843506},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.5458999872207642},{"id":"https://openalex.org/keywords/decree","display_name":"Decree","score":0.520799994468689},{"id":"https://openalex.org/keywords/accountability","display_name":"Accountability","score":0.5149000287055969},{"id":"https://openalex.org/keywords/corporate-governance","display_name":"Corporate governance","score":0.46070000529289246},{"id":"https://openalex.org/keywords/balance","display_name":"Balance (ability)","score":0.4255000054836273}],"concepts":[{"id":"https://openalex.org/C2781287902","wikidata":"https://www.wikidata.org/wiki/Q4175034","display_name":"Legislator","level":3,"score":0.6794000267982483},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.5752000212669373},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5705000162124634},{"id":"https://openalex.org/C2777351106","wikidata":"https://www.wikidata.org/wiki/Q49371","display_name":"Legislation","level":2,"score":0.5641000270843506},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.5458999872207642},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5239999890327454},{"id":"https://openalex.org/C2778958867","wikidata":"https://www.wikidata.org/wiki/Q2571972","display_name":"Decree","level":2,"score":0.520799994468689},{"id":"https://openalex.org/C2776007630","wikidata":"https://www.wikidata.org/wiki/Q2798912","display_name":"Accountability","level":2,"score":0.5149000287055969},{"id":"https://openalex.org/C39389867","wikidata":"https://www.wikidata.org/wiki/Q380767","display_name":"Corporate governance","level":2,"score":0.46070000529289246},{"id":"https://openalex.org/C168031717","wikidata":"https://www.wikidata.org/wiki/Q1530280","display_name":"Balance (ability)","level":2,"score":0.4255000054836273},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3935999870300293},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.38850000500679016},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3855000138282776},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.36820000410079956},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.3244999945163727},{"id":"https://openalex.org/C2777483011","wikidata":"https://www.wikidata.org/wiki/Q3042652","display_name":"Grievance","level":2,"score":0.3027999997138977},{"id":"https://openalex.org/C202565627","wikidata":"https://www.wikidata.org/wiki/Q146491","display_name":"Criminal law","level":2,"score":0.2930999994277954},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2847000062465668},{"id":"https://openalex.org/C2777006572","wikidata":"https://www.wikidata.org/wiki/Q1006612","display_name":"Federal law","level":3,"score":0.27649998664855957},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.26910001039505005},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2623000144958496},{"id":"https://openalex.org/C522695570","wikidata":"https://www.wikidata.org/wiki/Q6517578","display_name":"Legal research","level":2,"score":0.25760000944137573},{"id":"https://openalex.org/C117660856","wikidata":"https://www.wikidata.org/wiki/Q1964968","display_name":"Criminal investigation","level":2,"score":0.25609999895095825}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/idsta66210.2025.11202812","is_oa":false,"landing_page_url":"https://doi.org/10.1109/idsta66210.2025.11202812","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 Sixth International Conference on Intelligent Data Science Technologies and Applications (IDSTA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2131966699","https://openalex.org/W4313495989","https://openalex.org/W4390493556","https://openalex.org/W4394618639","https://openalex.org/W4396934096","https://openalex.org/W4410410592"],"related_works":[],"abstract_inverted_index":{"The":[0,46,95,117],"UAE":[1,52],"legislator":[2],"faces":[3,133],"a":[4,124,173],"critical":[5],"challenge":[6],"in":[7,27,113,135],"balancing":[8],"the":[9,18,33,86,98,121,144,165],"protection":[10],"of":[11,20,36,66,82,91],"individuals'":[12],"genetic":[13,37,92,129],"fingerprint":[14,93],"data":[15,22,130],"privacy":[16,102,176],"with":[17],"use":[19,90],"this":[21,57],"as":[23],"an":[24,72],"essential":[25],"tool":[26],"criminal":[28],"investigations.":[29],"This":[30,69],"balance":[31,58,174],"ensures":[32],"practical":[34],"application":[35],"technologies":[38],"without":[39],"infringing":[40],"on":[41],"fundamental":[42],"rights":[43,177],"to":[44,49,76,171],"privacy.":[45],"study":[47,96,145],"aims":[48],"determine":[50],"whether":[51],"legislation":[53],"has":[54],"successfully":[55],"struck":[56],"and":[59,89,106,139,154,159,178],"what":[60],"legal":[61,74,104,126,169],"mechanisms":[62,156],"can":[63],"prevent":[64],"violations":[65],"individual":[67],"rights.":[68],"research":[70],"adopts":[71],"analytical":[73],"methodology":[75],"examine":[77],"Federal":[78],"Decree-Law":[79],"No.":[80],"(39)":[81],"2023,":[83],"which":[84],"regulates":[85],"collection,":[87],"storage,":[88],"data.":[94],"analyses":[97],"decree's":[99],"provisions":[100],"for":[101,108,128,157,167],"protection,":[103],"safeguards,":[105],"penalties":[107],"misuse,":[109],"while":[110],"identifying":[111],"gaps":[112],"technical":[114],"security":[115],"measures.":[116],"findings":[118],"reveal":[119],"that":[120],"decree":[122],"provides":[123],"robust":[125],"framework":[127],"governance":[131],"but":[132],"challenges":[134],"implementing":[136],"cybersecurity":[137,152],"measures":[138],"ensuring":[140],"oversight":[141],"mechanisms.":[142],"Accordingly,":[143],"recommends":[146],"enhancing":[147],"technological":[148],"infrastructure,":[149],"adopting":[150],"international":[151],"standards,":[153],"strengthening":[155],"accountability":[158],"grievance":[160],"handling.":[161],"It":[162],"further":[163],"underscores":[164],"need":[166],"ongoing":[168],"development":[170],"maintain":[172],"between":[175],"law":[179],"enforcement":[180],"objectives.":[181]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-24T00:00:00"}
