@article{Drosatos_ApplSci_2022, author = {Drosatos, George and Rantos, Konstantinos and Demertzis, Konstantinos}, title = {Advanced Technologies in Data and Information Security}, journal = {Applied Sciences}, volume = {12}, year = {2022}, number = {12}, article-number = {5925}, url = {https://www.mdpi.com/2076-3417/12/12/5925}, issn = {2076-3417}, pages = {1-4}, abstract = {The protection of personal data and privacy is a timeless challenge which has intensified in the modern era. The digitisation that has been achieved in recent decades has radically changed the way we live, communicate and work, revealing various security and privacy issues. Specifically, the explosion of new technologies and the continuous developments of technologies, such as the Internet of Things (IoT) and Artificial Intelligence (AI), have led to the increased value of data, while it has raised demand and introduced new ways to obtain it. Techniques such as data analysis and processing provide a set of powerful tools that can be used by both governments and businesses for specific purposes. However, as with any valuable resource, as in the case of data, the phenomena of abuse, unfair practices and even criminal acts are not absent. In particular, in recent years, there have been more and more cases of sophisticated cyberattacks, data theft and leaks or even data trade, which violate the rights of individuals, but also harm competition and seriously damage the reputation of businesses. With this in mind, the present Special Issue of Applied Sciences on "Advanced Technologies in Data and Information Security" provides an overview of the latest developments in this field. Nineteen papers were submitted to this Special Issue, and nine papers [1 - 9] were accepted (i.e., an 47.4\% acceptance rate). The presented papers explore innovative trends of data privacy and information security that enable technological breakthroughs in high-impact areas and cover several topics, mainly regarding blockchain technology, secure multi-party computation, threat detection, trusted execution environment, as well as cyberawareness, security level estimation and security policy compliance.}, doi = {10.3390/app12125925}, publisher = {MDPI} }