Copyright © 2022 World Wide Web Consortium. W3C® liability, trademark and permissive document license rules apply.
DPVS-TECH extends the Data Privacy Vocabulary (DPV) Specification (RDFS+SKOS) to provide additional concepts regarding Technologies.
The namespace for terms in dpvs-tech is https://www.w3id.org/dpv/dpv-skos/dpv-tech#
The suggested prefix for the namespace is dpvs-tech
The DPVS-TECH vocabulary and its documentation is available on GitHub.
WARNING This vocabulary will be undergoing major changes based on the necessity to specify cloud technology concepts and to ensure provided concepts are useful. There may be extensive removal/additions of concepts that changes the structure and semantics of this extension.
Newcomers to the DPV are strongly recommended to first read through the Primer to familiarise themselves with the semantics and concepts of DPV.
Related Links
The peer-reviewed article “Creating A Vocabulary for Data Privacy” presents a historical overview of the DPVCG, and describes the methodology and structure of the DPV along with describing its creation. An open-access version can be accessed here, here, and here.
This document is merely a W3C-internal document. It has no official standing of any kind and does not represent consensus of the W3C Membership.
This document is published by the Data Privacy Vocabularies and Controls Community Group (DPVCG) as a deliverable and report of its work in creating and maintaining the Data Privacy Vocabulary (DPV).
Contributing to the DPV and its extensions The DPVCG welcomes participation regarding the DPV, including expansion or refinement of its terms, addressing open issues, and welcomes suggestions on their resolution or mitigation. For further information, please see the contribution section.
This section provides an introduction and overview of the concepts within the DPV-TECH extension, with the Section on Taxonomy providing a formal listing of all concepts.
The central or focal concept is dpv:Technology
alongwith its use with the relation dpv:hasTechnology
- as defined within [DPV]. This extension extends these concepts - by way of additional subtypes or subclasses or specialisations, and adds more concepts which are relevant to provide a description of technologies as they are utilised towards privacy and data protection.
The concept concepts provided in DPV-TECH include subtypes of dpv:Technology
as DataTechnology, OperationalTechnology (as in relating to operations or processes), SecurityTechnology, IdentityTechnology, ManagementTechnology, and SurveillanceTechnology. These enable expression of the role of a particular technology within the context of personal data processing.
To indicate how technology was provided or is used, the concept TechnologyProvisionMethod and relation hasProvisionMethod are useful. It enables expression of where technology is used as a Product or Subscription (e.g. from a vendor), or as a System or a Component (e.g. standalone).
The concept CommunicationMechanism and relation hasCommunicationMechanism enables expressing how the technology communicates, such as by use of Internet, Cellular Networks, GPS, etc.
To indicate entities or actors associated with the Technology and their specific roles, the concept TechnologyActor and associated relations are useful.
To represent location of technology use, the existing DPV concepts related to location can be used, i.e. dpv:Location
and dpv:hasLocation
along with its various types and contextually relevant concepts. To explicitly refer to location as associated with use of technology, the concept TechnologyUsageLocation is provided. For example, to indicate that some technology (whose actual location is on a server) is used in an office. Some synonyms used to indicate usage location for similar information are: application, deployment, or operation.
To indicate the maturity of a technology, the concept TechnologyReadinessLevel and relation hasTRL are useful. This information can be based on standards, such as the ISO 16290:2013, or those provided by other bodies and domains.
Technologies that involve operating on data, such as to collect, store, use, share, and erase it - are defined as DataTechnology. Since their definition is based on interaction with data, their specific types and hierarchy mirror the dpv:Processing
taxonomy. The shared name, such as with dpv:Store
as processing operation and DataStorageTechnology as technology, indicates the correspondence between processing and the technology that performs it.
OperationalTechnology relates to the processes or operations that themselves do not relate directly to data, such as execution environments, devices, or other processes - that are necessary or relevant for processing data. This is differentiated from DataTechnology in that technology related to operations refers only to the implementation and execution whereas data technology would be focused on how it involves or processes data.
Specific types of operational technologies include OperationEnvironment, OperationDevice, and OperationManagement. The concept Application represents the program or application which is the operation, or contains or facilitates its execution.
SecurityTechnology refers to any technology whose purpose is to provide security whether directly (e.g. securing access) or indirectly (e.g. PETs, identifying vulnerabilities). Specific types of security technologies include PET (Privacy Enhancing Technologies), and the risk-based categorisation as DetectionSecurityTechnology that detects security issues and vulnerabilities, PreventionSecurityTechnology that provides prevention or avoidance of exploitation, MitigationSecurityTechnology that provides reduction or mitigation of effects, and MonitoringSecurityTechnology that provides oversight and observations for security issues such as attacks.
ManagementTechnology relates to managing or orchestrating or monitoring - such as the other technology types. It can also include purely managerial technologies such as dedicated control interfaces or dashboards or tools orchestrating processes. While there is some ambiguity regarding what management exactly means, this concept is provided for the benefit of use-cases where it needs to be explicitly shown that some management occurs or involves the use of technologies. For example, to include that access control (a security technology) is managed through use of a dedicated tool or algorithm (a management technology).
IdentityTechnology relates to technologies that are related to identity, identification, or identifiers. This includes their generation, verification, use in authentication, and management (e.g. by combining with ManagementTechnology).
In addition to these, a sixth additional broad concept of SurveillanceTechnology can also function as a category so as to explicitly acknowledge and represent technologies that have issues or warrant particular attention. Variants of surveillance include OvertSurveillanceTechnology and CovertSurveillanceTechnology.
The provision of technology can happen via the following methods:
Communication mediums or mechanism used by technology include:
To specify the specific actors and their roles in the context of technologies, TechnologyActor is provided along with the following specific roles as its subtypes:
Note, that the technology actor concepts are based on the EU's proposal for AI reguation (i.e. AI ACT) and its corresponding concepts (e.g. AI Provider, AI Developer). Rather than limiting such concepts for "AI", we have expanded upon their intended meaning to encompass any technology. The concepts from the AI ACT can thus be modelled as subtypes of these.
Communication Mechanism
|
Data Technology
|
Identity Technology
|
Management Technology
|
Operational Technology
|
Security Technology
|
Surveillance Technology
|
Technology Actor
|
Technology Provision Method
|
Technology Readiness Level
|
Technology Usage Location
|
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#CommunicationMechanism |
Term: | CommunicationMechanism |
Label: | Communication Mechanism |
Description: | Communication mechanism used or provided by Technologoy |
SuperType Of: | dpvs-tech:GPS, dpvs-tech:Networking |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#DataTechnology |
Term: | DataTechnology |
Label: | Data Technology |
Description: | Technology that uses or interacts with data |
SubClass of: | dpvs:Technology |
SuperType Of: | dpvs-tech:DataCopyingTechnology, dpvs-tech:DataDisclosureTechnology, dpvs-tech:DataManagementTechnology, dpvs-tech:DataObtainingTechnology, dpvs-tech:DataOrganisingTechnology, dpvs-tech:DataRemovalTechnology, dpvs-tech:DataSecurityTechnology, dpvs-tech:DataStorageTechnology, dpvs-tech:DataTransferTechnology, dpvs-tech:DataTransformationTechnology, dpvs-tech:DataUsageTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#IdentityTechnology |
Term: | IdentityTechnology |
Label: | Identity Technology |
Description: | Technology related to identity or identifiers |
SubClass of: | dpvs:Technology |
SuperType Of: | dpvs-tech:IdentityManagementTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#ManagementTechnology |
Term: | ManagementTechnology |
Label: | Management Technology |
Description: | Technology that enables or provides management |
SubClass of: | dpvs:Technology |
SuperType Of: | dpvs-tech:DataManagementTechnology, dpvs-tech:IdentityManagementTechnology, dpvs-tech:SecurityManagementTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#OperationalTechnology |
Term: | OperationalTechnology |
Label: | Operational Technology |
Description: | Technology that enables or performs or executes operations and processes |
SubClass of: | dpvs:Technology |
SuperType Of: | dpvs-tech:Application, dpvs-tech:OperationDevice, dpvs-tech:OperationEnvironment, dpvs-tech:OperationManagement |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#SecurityTechnology |
Term: | SecurityTechnology |
Label: | Security Technology |
Description: | Technology that enables or provides security |
SubClass of: | dpvs:Technology |
SuperType Of: | dpvs-tech:DataSecurityTechnology, dpvs-tech:DetectionSecurityTechnology, dpvs-tech:MitigationSecurityTechnology, dpvs-tech:MonitoringSecurityTechnology, dpvs-tech:PET, dpvs-tech:PreventionSecurityTechnology, dpvs-tech:SecurityManagementTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#SurveillanceTechnology |
Term: | SurveillanceTechnology |
Label: | Surveillance Technology |
Description: | Technology related to surveillance of individuals or people |
SubClass of: | dpvs:Technology |
SuperType Of: | dpvs-tech:CovertSurveillanceTechnology, dpvs-tech:OvertSurveillanceTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#TechnologyActor |
Term: | TechnologyActor |
Label: | Technology Actor |
Description: | Actors and Entities involved in provision, use, and management of Technology |
SubClass of: | dpvs:Entity |
SuperType Of: | dpvs-tech:TechnologyDeveloper, dpvs-tech:TechnologyProvider, dpvs-tech:TechnologySubject, dpvs-tech:TechnologyUser |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#TechnologyProvisionMethod |
Term: | TechnologyProvisionMethod |
Label: | Technology Provision Method |
Description: | Method associated with provision or use of technology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#TechnologyReadinessLevel |
Term: | TechnologyReadinessLevel |
Label: | Technology Readiness Level |
Description: | Indication of maturity of Technology (ISO 16290:2013) |
SubClass of: | dpvs:Technology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#TechnologyUsageLocation |
Term: | TechnologyUsageLocation |
Label: | Technology Usage Location |
Description: | Location for where technology is provided or used |
SubClass of: | dpvs:Location |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
has communication mechanism
|
has technology actor
|
has TRL
|
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#hasCommunicationMechanism |
Term: | hasCommunicationMechanism |
Label: | has communication mechanism |
Description: | Indicates communication mechanisms used or provided by technology |
Domain: | dpvs:Technology |
Range: | dpv-tech:CommunicationMechanism |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#hasTechnologyActor |
Term: | hasTechnologyActor |
Label: | has technology actor |
Description: | Indicates an actor associated with technology |
Domain: | dpvs:Technology |
Range: | dpv-tech:TechnologyActor |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#hasTRL |
Term: | hasTRL |
Label: | has TRL |
Description: | Indicates technology maturity level |
Domain: | dpvs:Technology |
Range: | dpv-tech:TechnologyReadinessLevel |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Data Copying Technology
|
Data Disclosure Technology
|
Data Management Technology
|
Data Obtaining Technology
|
Data Organising Technology
|
Data Removal Technology
|
Data Security Technology
|
Data Storage Technology
|
Data Transfer Technology
|
Data Transformation Technology
|
Data Usage Technology
|
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#DataCopyingTechnology |
Term: | DataCopyingTechnology |
Label: | Data Copying Technology |
Description: | Technology related to copying data |
SubClass of: | dpvs-tech:DataTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#DataDisclosureTechnology |
Term: | DataDisclosureTechnology |
Label: | Data Disclosure Technology |
Description: | Technology related to disclosing data |
SubClass of: | dpvs-tech:DataTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#DataManagementTechnology |
Term: | DataManagementTechnology |
Label: | Data Management Technology |
Description: | Technology related to management of data |
SubClass of: | dpvs-tech:DataTechnology, dpvs-tech:ManagementTechnology |
SuperType Of: | dpvs-tech:PersonalInformationManagementSystem |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#DataObtainingTechnology |
Term: | DataObtainingTechnology |
Label: | Data Obtaining Technology |
Description: | Technology related to obtain data |
SubClass of: | dpvs-tech:DataTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#DataOrganisingTechnology |
Term: | DataOrganisingTechnology |
Label: | Data Organising Technology |
Description: | Technology realted to organising data |
SubClass of: | dpvs-tech:DataTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#DataRemovalTechnology |
Term: | DataRemovalTechnology |
Label: | Data Removal Technology |
Description: | Technology related to removing data |
SubClass of: | dpvs-tech:DataTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#DataSecurityTechnology |
Term: | DataSecurityTechnology |
Label: | Data Security Technology |
Description: | Technology related to security of data |
SubClass of: | dpvs-tech:DataTechnology, dpvs-tech:SecurityTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#DataStorageTechnology |
Term: | DataStorageTechnology |
Label: | Data Storage Technology |
Description: | Technology related to storing data |
SubClass of: | dpvs-tech:DataTechnology |
SuperType Of: | dpvs-tech:Database, dpvs-tech:FileSystem, dpvs-tech:IdentityWallet |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#DataTransferTechnology |
Term: | DataTransferTechnology |
Label: | Data Transfer Technology |
Description: | Technology related to transfering data |
SubClass of: | dpvs-tech:DataTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#DataTransformationTechnology |
Term: | DataTransformationTechnology |
Label: | Data Transformation Technology |
Description: | Technology related to transforming data |
SubClass of: | dpvs-tech:DataTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#DataUsageTechnology |
Term: | DataUsageTechnology |
Label: | Data Usage Technology |
Description: | Technology related to using data |
SubClass of: | dpvs-tech:DataTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Application
|
Operation Device
|
Operation Environment
|
Operation Management
|
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#Application |
Term: | Application |
Label: | Application |
Description: | A computing or digital program |
SubClass of: | dpvs-tech:OperationalTechnology |
SuperType Of: | dpvs-tech:SmartphoneApplication |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#OperationDevice |
Term: | OperationDevice |
Label: | Operation Device |
Description: | Technology that acts as an equipment or mechanism for operations |
SubClass of: | dpvs-tech:OperationalTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#OperationEnvironment |
Term: | OperationEnvironment |
Label: | Operation Environment |
Description: | Technology that provides an environment for operations to be executed |
SubClass of: | dpvs-tech:OperationalTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#OperationManagement |
Term: | OperationManagement |
Label: | Operation Management |
Description: | Technology that manages operations |
SubClass of: | dpvs-tech:OperationalTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Detection Security Technology
|
Mitigation Security Technology
|
Monitoring Security Technology
|
PET (Privacy Enhancing Technology)
|
Prevention Security Technology
|
Security Management Technology
|
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#DetectionSecurityTechnology |
Term: | DetectionSecurityTechnology |
Label: | Detection Security Technology |
Description: | Technology related to detection of vulnerabilities, threats, and exploitations |
SubClass of: | dpvs-tech:SecurityTechnology |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit, Julian Flake, Paul Ryan |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#MitigationSecurityTechnology |
Term: | MitigationSecurityTechnology |
Label: | Mitigation Security Technology |
Description: | Technology related to mitigation of vulnerabilities, threats, exploitations |
SubClass of: | dpvs-tech:SecurityTechnology |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit, Julian Flake, Paul Ryan |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#MonitoringSecurityTechnology |
Term: | MonitoringSecurityTechnology |
Label: | Monitoring Security Technology |
Description: | Technology related to monitoring of vulnerabilities, threats, exploitations |
SubClass of: | dpvs-tech:SecurityTechnology |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit, Julian Flake, Paul Ryan |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#PET |
Term: | PET |
Label: | PET (Privacy Enhancing Technology) |
Description: | Privacy Enhancing Technologies (PETs) that provide minimisation or security related to data and privacy |
SubClass of: | dpvs-tech:SecurityTechnology |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit, Julian Flake, Paul Ryan |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#PreventionSecurityTechnology |
Term: | PreventionSecurityTechnology |
Label: | Prevention Security Technology |
Description: | Technology related to prevention of vulnerabilities, threats, exploitations |
SubClass of: | dpvs-tech:SecurityTechnology |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit, Julian Flake, Paul Ryan |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#SecurityManagementTechnology |
Term: | SecurityManagementTechnology |
Label: | Security Management Technology |
Description: | Technology related to management of security |
SubClass of: | dpvs-tech:ManagementTechnology, dpvs-tech:SecurityTechnology |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit, Julian Flake, Paul Ryan |
Covert SurveillanceTechnology
|
Overt Surveillance Technology
|
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#CovertSurveillanceTechnology |
Term: | CovertSurveillanceTechnology |
Label: | Covert SurveillanceTechnology |
Description: | Surveillance that is covert i.e. invisible or non-apparent or implicit |
SubClass of: | dpvs-tech:SurveillanceTechnology |
Note: | For example, a web resource that performs tracking in the background |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#OvertSurveillanceTechnology |
Term: | OvertSurveillanceTechnology |
Label: | Overt Surveillance Technology |
Description: | Surveillance that is overt i.e. visible or apparent or explicit |
SubClass of: | dpvs-tech:SurveillanceTechnology |
Note: | For example, a CCTV with a notice |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Algorithmic
|
Component
|
Fixed Use
|
Goods
|
Product
|
Service
|
Subscription
|
System
|
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#Algorithmic |
Term: | Algorithmic |
Label: | Algorithmic |
Description: | Technology provided as an algorithm or method |
Narrower than: | dpvs-tech:TechnologyProvisionMethod |
Instance of: | dpvs-tech:TechnologyProvisionMethod |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#Component |
Term: | Component |
Label: | Component |
Description: | Technology provided as a component |
Narrower than: | dpvs-tech:TechnologyProvisionMethod |
Instance of: | dpvs-tech:TechnologyProvisionMethod |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#FixedUse |
Term: | FixedUse |
Label: | Fixed Use |
Description: | Technology that can be used a fixed numner of times |
Narrower than: | dpvs-tech:TechnologyProvisionMethod |
Instance of: | dpvs-tech:TechnologyProvisionMethod |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#Goods |
Term: | Goods |
Label: | Goods |
Description: | Technology provided or used as goods |
Narrower than: | dpvs-tech:TechnologyProvisionMethod |
Instance of: | dpvs-tech:TechnologyProvisionMethod |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#Product |
Term: | Product |
Label: | Product |
Description: | Technology that is provided as a product |
Narrower than: | dpvs-tech:TechnologyProvisionMethod |
Instance of: | dpvs-tech:TechnologyProvisionMethod |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#Service |
Term: | Service |
Label: | Service |
Description: | Technology provided or used as service(s) |
Narrower than: | dpvs-tech:TechnologyProvisionMethod |
Instance of: | dpvs-tech:TechnologyProvisionMethod |
Note: | Removed plural suffix for consistency in terms |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#Subscription |
Term: | Subscription |
Label: | Subscription |
Description: | Technology that is provided or used as a periodic subscription |
Narrower than: | dpvs-tech:TechnologyProvisionMethod |
Instance of: | dpvs-tech:TechnologyProvisionMethod |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#System |
Term: | System |
Label: | System |
Description: | Technology provided as a system |
Narrower than: | dpvs-tech:TechnologyProvisionMethod |
Instance of: | dpvs-tech:TechnologyProvisionMethod |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#hasProvisionMethod |
Term: | hasProvisionMethod |
Label: | has provision method |
Description: | Specifies the provision or usage method of technology |
Domain: | dpvs:Technology |
Range: | dpv-tech:TechnologyProvisionMethod |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Technology Developer
|
Technology Provider
|
Technology Subject
|
Technology User
|
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#TechnologyDeveloper |
Term: | TechnologyDeveloper |
Label: | Technology Developer |
Description: | Actor that develops Technology |
SubClass of: | dpvs-tech:TechnologyActor |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#TechnologyProvider |
Term: | TechnologyProvider |
Label: | Technology Provider |
Description: | Actor that provides Technology |
SubClass of: | dpvs-tech:TechnologyActor |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#TechnologySubject |
Term: | TechnologySubject |
Label: | Technology Subject |
Description: | Actor that is subject of use of Technology |
SubClass of: | dpvs-tech:TechnologyActor |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#TechnologyUser |
Term: | TechnologyUser |
Label: | Technology User |
Description: | Actor that uses Technologoy |
SubClass of: | dpvs-tech:TechnologyActor |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
has developer
|
has provider
|
has subject
|
has user
|
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#hasDeveloper |
Term: | hasDeveloper |
Label: | has developer |
Description: | Indicates technology developer |
Sub-Property Of: | dpvs-tech:hasTechnologyActor |
Domain: | dpvs:Technology |
Range: | dpv-tech:TechnologyDeveloper |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#hasProvider |
Term: | hasProvider |
Label: | has provider |
Description: | Indicates technology provider |
Sub-Property Of: | dpvs-tech:hasTechnologyActor |
Domain: | dpvs:Technology |
Range: | dpv-tech:TechnologyProvider |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#hasSubject |
Term: | hasSubject |
Label: | has subject |
Description: | Indicates technology subject |
Sub-Property Of: | dpvs-tech:hasTechnologyActor |
Domain: | dpvs:Technology |
Range: | dpv-tech:TechnologySubject |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#hasUser |
Term: | hasUser |
Label: | has user |
Description: | Indicates technology user |
Sub-Property Of: | dpvs-tech:hasTechnologyActor |
Domain: | dpvs:Technology |
Range: | dpv-tech:TechnologyUser |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Bluetooth
|
Cellular Network
|
GPS
|
Internet
|
Local Network
|
Networking
|
WiFi
|
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#Bluetooth |
Term: | Bluetooth |
Label: | Bluetooth |
Description: | Technology utilising bluetooth communication |
SubClass of: | dpvs-tech:Networking |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#CellularNetwork |
Term: | CellularNetwork |
Label: | Cellular Network |
Description: | Technology utilising cellular networking communication |
SubClass of: | dpvs-tech:Networking |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#GPS |
Term: | GPS |
Label: | GPS |
Description: | Technology utilising GPS communication |
SubClass of: | dpvs-tech:CommunicationMechanism |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#Internet |
Term: | Internet |
Label: | Internet |
Description: | Technology utilising internet communication |
SubClass of: | dpvs-tech:Networking |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#LocalNetwork |
Term: | LocalNetwork |
Label: | Local Network |
Description: | Technology utilising local networking communication |
SubClass of: | dpvs-tech:Networking |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#Networking |
Term: | Networking |
Label: | Networking |
Description: | Technology utilising networking communication |
SubClass of: | dpvs-tech:CommunicationMechanism |
SuperType Of: | dpvs-tech:Bluetooth, dpvs-tech:CellularNetwork, dpvs-tech:Internet, dpvs-tech:LocalNetwork, dpvs-tech:WiFi |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#WiFi |
Term: | WiFi |
Label: | WiFi |
Description: | Technology utilising wifi wireless networking communication |
SubClass of: | dpvs-tech:Networking |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Cookie
|
Database
|
File System
|
Identity Management Technology
|
Identity Wallet
|
Personal Information Management System
|
Smartphone Application
|
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#Database |
Term: | Database |
Label: | Database |
Description: | A database, database management system (DBMS), or application database |
SubClass of: | dpvs-tech:DataStorageTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#FileSystem |
Term: | FileSystem |
Label: | File System |
Description: | A data storage and retrieval interface provided by an operating system |
SubClass of: | dpvs-tech:DataStorageTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#IdentityManagementTechnology |
Term: | IdentityManagementTechnology |
Label: | Identity Management Technology |
Description: | Technologies providing identity provision, verification, management, and governance |
SubClass of: | dpvs-tech:IdentityTechnology, dpvs-tech:ManagementTechnology |
SuperType Of: | dpvs-tech:IdentityWallet |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#IdentityWallet |
Term: | IdentityWallet |
Label: | Identity Wallet |
Description: | product and service that allows the user to store identity data, credentials and attributes linked to her/his identity, to provide them to relying parties on request and to use them for authentication, online and offline, and to create qualified electronic signatures and seals |
SubClass of: | dpvs-tech:DataStorageTechnology, dpvs-tech:IdentityManagementTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#PersonalInformationManagementSystem |
Term: | PersonalInformationManagementSystem |
Label: | Personal Information Management System |
Description: | A PIMS is a system that helps to give individuals more control over their personal data by managing their personal data in secure, on-premises or online storage systems and sharing it when and with whomever they choose |
SubClass of: | dpvs-tech:DataManagementTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-skos/dpv-tech#SmartphoneApplication |
Term: | SmartphoneApplication |
Label: | Smartphone Application |
Description: | A computing or digital program on a smartphone device |
SubClass of: | dpvs-tech:Application |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
The DPVCG and DPV were initiated as part of the SPECIAL H2020 Project, which received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 731601. The SPECIAL project ran over a 3-year period from 2017 to 2019.
Harshvardhan J. Pandit was funded by the Irish Research Council Government of Ireland Postdoctoral Fellowship Grant#GOIPD/2020/790 for working within the DPVCG and contributing to the DPV. The fellowship lasted from 2020 to 2022.
The contributions of Beatriz Esteves have received funding through the PROTECT ITN Project from the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement No 813497.
The contributions of Harshvardhan J. Pandit have received funding from the ADAPT SFI Centre for Digital Media Technology is funded by Science Foundation Ireland through the SFI Research Centres Programme and is co-funded under the European Regional Development Fund (ERDF) through Grant#13/RC/2106 (2018 to 2020) and Grant#13/RC/2106_P2 (2021 onwards)
Referenced in:
Referenced in: