scispace - formally typeset
Search or ask a question
Author

Marius Laurinaitis

Bio: Marius Laurinaitis is an academic researcher from Mykolas Romeris University. The author has contributed to research in topics: Data Protection Act 1998 & Payment. The author has an hindex of 4, co-authored 15 publications receiving 45 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The article presents the authors' position on the legal regulation and assessment of dashcams use, i.e. that, according to the authors, dashcam use and/or publication of their recordings should not be forbidden in the EU.

18 citations

Journal ArticleDOI
TL;DR: Which elements of the model of the national cyber security strategy should most of all reflect the national situation and which elements may be unified and possibly also adapted in the cyber security strategies of other countries are revealed.
Abstract: Given the global nature of cyber threats, assurance of a cyber security policy is very important not only at the local organisation level, but also at national and international level. Currently, cyber security as such is not suitably regulated internationally; therefore, the role of national cyber security strategies has become particularly significant. Lithuania is among the leaders in the EU and globally in the development of the optical fibre network. FTTP coverage has already reached 95%, the highest in the EU. Regardless of that, the cyber security programme effective in Lithuania does not provide conditions to ensure an appropriate level of cyber security and may not be regarded as a high-level contemporary strategic document in the area of cyber security. This article presents a study the main outcome of which are guidelines for a contemporary model of the Lithuanian national cyber security strategy. Based on comparative and historical studies as well as expert interviews conducted by authors and on the best practice of other countries, the article presents the elements of a model of the Lithuanian national cyber security strategy as well as guidelines on the content of these elements of the model. The article also reveals which elements of the model of the national cyber security strategy should most of all reflect the national situation and which elements may be unified and possibly also adapted in the cyber security strategies of other countries.

9 citations

Journal ArticleDOI
TL;DR: The key conclusion made by the authors is that in certain cases where the risk to privacy is minor, the use of biometric technologies to process personal data should not be prohibited.

6 citations

05 Mar 2014
TL;DR: In this paper, Mokslinį straipsnį sudaro keturi pagrindinių isvadų, jog identifikavimo priemonės bei būdai fizinė, ir daromos prielaidos dėl jų patikimumo bei teisinio reguliavimo privalomumo.
Abstract: Straipsnyje nagrinėjamos asmens identifikavimo fizinėje ir elektroninėje erdvėje teisinės prielaidos. Analizuojamas teisinis identifikavimo fizinėje ir elektroninėje erdvėje reglamentavimas. Pateikiami privalomi identifikavimo fizinėje erdvėje elementai bei privalomi ir neprivalomi identifikavimo elektroninėje erdvėje elementai ir daromos isvados dėl asmens identifikavimo elektroninėje erdvėje probleminių aspektų ir su jais susijusio teisinio reguliavimo. Mokslinį straipsnį sudaro keturi pagrindiniai skyriai. Pirmame skyriuje „Tapatybė ir asmens identifikavimas“ nagrinėjama tapatybė, jos turinys ir elementai bei asmens identifikavimas. Antrame skyriuje „Asmens identifikavimas fizinėje erdvėje“ issamiai analizuojamos identifikavimo fizinėje erdvėje teisinės prielaidos Lietuvoje. Treciajame skyriuje „Asmens identifikavimas elektroninėje erdvėje“ analizuojami teisiskai sureguliuoto ir nesureguliuoto asmens identifikavimo elektroninėje erdvėje elementai, aptariama asmens tapatybė elektroninėje erdvėje. Ketvirtame skyriuje „Elektroninė asmens tapatybė ir teisinis reguliavimas“ analizuojami ir sisteminami elektroninės asmens tapatybės elementai, ir daromos prielaidos dėl jų patikimumo bei teisinio reguliavimo privalomumo. Atlikus analize ir atitinkamus tyrimus, prieita prie pagrindinių isvadų, jog identifikavimo priemonės bei būdai fizinėje ir elektroninėje erdvėje nėra tie patys. Asmenis identifikuojanti informacija fizinėje ir elektroninėje erdvėje gali skirtis pagal jai keliamus reikalavimus. Elektroninėje erdvėje naudojamos papildomos identifikavimo priemonės ir taikomi būdai, kurie teisiskai yra nereguliuojami ir dėl to mažiau saugūs, sudaro didesnes galimybes padaryti tapatybės vagyste. Dėl sių priežascių valstybė turėtų nustatyti minimalius identifikavimo elektroninėje erdvėje reikalavimus.

3 citations


Cited by
More filters
Proceedings Article
01 Jan 2017
TL;DR: It is found that 54% of participants would spend more than five minutes using an online system to opt out of identifiable data collection, and secondary use scenarios such as recognition, identification, and tracking of individuals and their vehicles were associated with low likelihood ratings and high discomfort.
Abstract: Self-driving vehicles and other networked autonomous robots use sophisticated sensors to capture continuous data about the surrounding environment. In the public spaces where autonomous vehicles operate there is little reasonable expectation of privacy and no notice or choice given, raising privacy questions. To improve the acceptance of networked autonomous vehicles and to facilitate the development of technological and policy mechanisms to protect privacy, public expectations and concerns must first be investigated. In a study (n=302) of residents in cities with and without Uber autonomous vehicle fleets, we explore people’s conceptions of the sensing and analysis capabilities of self-driving vehicles; their comfort with the different capabilities; and the effort, if any, to which they would be willing to go to opt out of data collection. We find that 54% of participants would spend more than five minutes using an online system to opt out of identifiable data collection. In addition, secondary use scenarios such as recognition, identification, and tracking of individuals and their vehicles were associated with low likelihood ratings and high discomfort. Surprisingly, those who thought secondary use scenarios were more likely were more comfortable with those scenarios. We discuss the implications of our results for understanding the unique challenges of this new technology and recommend industry guidelines to protect privacy.

57 citations

Journal ArticleDOI
TL;DR: The results of the work have been obtained within the framework of the research-and-development work "Development of advanced technologies for the complete mining of steam coal with the accumulation of waste rocks in the underground space".
Abstract: The results of the work have been obtained within the framework of the research-and-development work “Development of advanced technologies for the complete mining of steam coal with the accumulation of waste rocks in the underground space” (No. 0120U101099). The authors are grateful to the specialists of PJSC “DTEK Pavlohradvuhillia” for the information on the mine provided for research-and-technology analysis.

19 citations

Proceedings ArticleDOI
26 Aug 2019
TL;DR: Although qualitative methods are used when studying all key cybersecurity areas, they often lack the necessary rigor and detail observed in other research areas where quantitative methods are well-established.
Abstract: Cybersecurity is a hot topic and researchers have published extensively on studies conducted using a variety of different research methods. This paper aims to determine which qualitative research methods were most used and for studying which topics. A systematic literature review on Web of Science, Scopus and ACM DL has been conducted to achieve an overview of quantitative methods used in cybersecurity. The review covered the most recent research in different areas of cybersecurity (i.e., personal, organizational and state cybersecurity) in the period of 2017 to 2019. After careful inspection of papers, we identified 160 papers reporting on the use of qualitative methods. The most common qualitative methods are interviews, followed by case studies and observation. Other studied qualitative methods (i.e., focus groups, grounded theory, action research and Delphi method) seem to be much less frequent. Although qualitative methods are used when studying all key cybersecurity areas, they often lack the necessary rigor and detail observed in other research areas where qualitative methods are well-established.

17 citations