{"id":"https://openalex.org/W7128506863","doi":"https://doi.org/10.48550/arxiv.2602.07021","title":"AI for Sustainable Data Protection and Fair Algorithmic Management in Environmental Regulation","display_name":"AI for Sustainable Data Protection and Fair Algorithmic Management in Environmental Regulation","publication_year":2026,"publication_date":"2026-02-02","ids":{"openalex":"https://openalex.org/W7128506863","doi":"https://doi.org/10.48550/arxiv.2602.07021"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.07021","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009455186","display_name":"Shruti Singh","orcid":"https://orcid.org/0000-0002-9751-8513"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Singh, Sahibpreet","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5005783599","display_name":"Saksham Kumar Sharma","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sharma, Saksham","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5009455186"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.10779999941587448,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.10779999941587448,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.09399999678134918,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14413","display_name":"Advanced Technologies in Various Fields","score":0.06469999998807907,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/environmental-security","display_name":"Environmental security","score":0.5266000032424927},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5152999758720398},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.46369999647140503},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4535999894142151},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.40529999136924744},{"id":"https://openalex.org/keywords/sustainable-development","display_name":"Sustainable development","score":0.4016999900341034},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.38909998536109924},{"id":"https://openalex.org/keywords/general-data-protection-regulation","display_name":"General Data Protection Regulation","score":0.38339999318122864},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.3824000060558319}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6449999809265137},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5896000266075134},{"id":"https://openalex.org/C2779455057","wikidata":"https://www.wikidata.org/wiki/Q1049876","display_name":"Environmental security","level":2,"score":0.5266000032424927},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5152999758720398},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5044000148773193},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.46369999647140503},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4535999894142151},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.40529999136924744},{"id":"https://openalex.org/C552854447","wikidata":"https://www.wikidata.org/wiki/Q131201","display_name":"Sustainable development","level":2,"score":0.4016999900341034},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.38909998536109924},{"id":"https://openalex.org/C3090818","wikidata":"https://www.wikidata.org/wiki/Q1172506","display_name":"General Data Protection Regulation","level":3,"score":0.38339999318122864},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.3824000060558319},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3749000132083893},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.3603000044822693},{"id":"https://openalex.org/C2780771206","wikidata":"https://www.wikidata.org/wiki/Q3271761","display_name":"Safeguard","level":2,"score":0.35679998993873596},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.34380000829696655},{"id":"https://openalex.org/C1668388","wikidata":"https://www.wikidata.org/wiki/Q1149776","display_name":"Data management","level":2,"score":0.31790000200271606},{"id":"https://openalex.org/C66204764","wikidata":"https://www.wikidata.org/wiki/Q219416","display_name":"Sustainability","level":2,"score":0.31700000166893005},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.3158999979496002},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3127000033855438},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.3100999891757965},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2921999990940094},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.28999999165534973},{"id":"https://openalex.org/C72634772","wikidata":"https://www.wikidata.org/wiki/Q386824","display_name":"Data integration","level":2,"score":0.28540000319480896},{"id":"https://openalex.org/C148609458","wikidata":"https://www.wikidata.org/wiki/Q7021281","display_name":"Nexus (standard)","level":2,"score":0.2851000130176544},{"id":"https://openalex.org/C2776356880","wikidata":"https://www.wikidata.org/wiki/Q5381206","display_name":"Environmental data","level":2,"score":0.2590000033378601},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.25110000371932983},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.2508000135421753}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.07021","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.07021","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.07021","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.07021","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Integration":[0],"of":[1,37,52,59,65,93,111,152,166,176,185,198],"AI":[2,72,212,246],"into":[3],"environmental":[4,53,119,153,171,204,242],"regulation":[5],"represents":[6],"a":[7,90,159,232],"significant":[8],"advancement":[9],"in":[10,17,34,47,96,137,146,163,174],"data":[11,19,32,80,120,154,243],"management.":[12,86],"It":[13,105],"offers":[14],"promising":[15],"results":[16],"both":[18],"protection":[20,33,81],"plus":[21],"algorithmic":[22,85,178],"fairness.":[23],"This":[24,55,229],"research":[25,161,187,236],"addresses":[26],"the":[27,35,49,57,150,164,189,196],"critical":[28],"need":[29,190],"for":[30,191,234],"sustainable":[31,241],"era":[36],"ever":[38],"evolving":[39],"cyber":[40,168,193],"threats.":[41],"Traditional":[42],"encryption":[43,99,131],"methods":[44],"face":[45],"limitations":[46],"handling":[48],"dynamic":[50,127],"nature":[51],"data.":[54,205],"necessitates":[56],"exploration":[58],"advanced":[60],"cryptographic":[61],"techniques.":[62],"The":[63,87,183],"objective":[64],"this":[66,186],"study":[67,230],"is":[68,106],"to":[69,77,118,201,214,226],"evaluate":[70],"how":[71,112],"can":[73,115,224],"enhance":[74],"these":[75,113],"techniques":[76,114],"ensure":[78],"robust":[79],"while":[82],"facilitating":[83],"fair":[84],"methodology":[88],"involves":[89],"comprehensive":[91,199],"review":[92],"current":[94],"advancements":[95],"AI-enhanced":[97,140],"homomorphic":[98],"(HE)":[100],"and":[101,133,143,170,181,219],"multi-party":[102],"computation":[103],"(MPC).":[104],"coupled":[107],"with":[108,217],"an":[109],"analysis":[110],"be":[116],"applied":[117],"regulation.":[121],"Key":[122],"findings":[123,157],"indicate":[124],"that":[125,221],"AI-driven":[126],"key":[128],"management,":[129],"adaptive":[130],"schemes,":[132],"optimized":[134],"computational":[135],"efficiency":[136],"HE,":[138],"alongside":[139],"protocol":[141],"optimization":[142],"fault":[144],"mitigation":[145],"MPC,":[147],"significantly":[148],"improve":[149],"security":[151,216],"processing.":[155],"These":[156],"highlight":[158],"crucial":[160],"gap":[162],"intersection":[165],"AI,":[167],"laws,":[169],"regulation,":[172],"particularly":[173],"terms":[175],"addressing":[177],"bias,":[179],"transparency,":[180],"accountability.":[182],"implications":[184],"underscore":[188],"stricter":[192],"laws.":[194],"Also,":[195],"development":[197],"regulations":[200],"safeguard":[202],"sensitive":[203],"Future":[206],"efforts":[207],"should":[208],"focus":[209],"on":[210],"refining":[211],"systems":[213],"balance":[215],"privacy":[218],"ensuring":[220],"regulatory":[222],"frameworks":[223],"adapt":[225],"technological":[227],"advancements.":[228],"provides":[231],"foundation":[233],"future":[235],"aimed":[237],"at":[238],"achieving":[239],"secure":[240],"management":[244],"through":[245],"innovations.":[247]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-11T00:00:00"}
