Copyright © 2022 the Contributors to the DPV-TECH: Extension providing Technology concepts for DPV Specification, published by the Data Privacy Vocabularies and Controls Community Group under the W3C Community Contributor License Agreement (CLA). A human-readable summary is available.
The Data Privacy Vocabulary (DPV) Specification provides a rich taxonomy of concepts which includes Technology. While it enables expression of how some technology is applied within the context of personal data and its processing, there is a need for further specific details regarding technologies, their management, and relevance to actual real-world tools and systems. DPV-TECH provides such concepts associated with Technologies as an extension to DPV concepts.
The namespace for terms in dpv-tech is https://www.w3id.org/dpv/dpv-tech#
The suggested prefix for the namespace is dpv-tech
The DPV-TECH vocabulary and its documentation is available on GitHub.
WARNING This vocabulary will be undergoing major changes based on the necessity to specify cloud technology concepts and to ensure provided concepts are useful. There may be extensive removal/additions of concepts that changes the structure and semantics of this extension.
Newcomers to the DPV are strongly recommended to first read through the Primer to familiarise themselves with the semantics and concepts of DPV.
Related Links
The peer-reviewed article “Creating A Vocabulary for Data Privacy” presents a historical overview of the DPVCG, and describes the methodology and structure of the DPV along with describing its creation. An open-access version can be accessed here, here, and here.
This specification was published by the Data Privacy Vocabularies and Controls Community Group. It is not a W3C Standard nor is it on the W3C Standards Track. Please note that under the W3C Community Contributor License Agreement (CLA) there is a limited opt-out and other conditions apply. Learn more about W3C Community and Business Groups.
This document is published by the Data Privacy Vocabularies and Controls Community Group (DPVCG) as a deliverable and report of its work in creating and maintaining the Data Privacy Vocabulary (DPV).
Contributing to the DPV and its extensions The DPVCG welcomes participation regarding the DPV, including expansion or refinement of its terms, addressing open issues, and welcomes suggestions on their resolution or mitigation. For further information, please see the contribution section.
GitHub Issues are preferred for discussion of this specification.
This section provides an introduction and overview of the concepts within the DPV-TECH extension, with the Section on Taxonomy providing a formal listing of all concepts.
The central or focal concept is dpv:Technology
alongwith its use with the relation dpv:hasTechnology
- as defined within [DPV]. This extension extends these concepts - by way of additional subtypes or subclasses or specialisations, and adds more concepts which are relevant to provide a description of technologies as they are utilised towards privacy and data protection.
The concept concepts provided in DPV-TECH include subtypes of dpv:Technology
as DataTechnology, OperationalTechnology (as in relating to operations or processes), SecurityTechnology, IdentityTechnology, ManagementTechnology, and SurveillanceTechnology. These enable expression of the role of a particular technology within the context of personal data processing.
To indicate how technology was provided or is used, the concept TechnologyProvisionMethod and relation hasProvisionMethod are useful. It enables expression of where technology is used as a Product or Subscription (e.g. from a vendor), or as a System or a Component (e.g. standalone).
The concept CommunicationMechanism and relation hasCommunicationMechanism enables expressing how the technology communicates, such as by use of Internet, Cellular Networks, GPS, etc.
To indicate entities or actors associated with the Technology and their specific roles, the concept TechnologyActor and associated relations are useful.
To represent location of technology use, the existing DPV concepts related to location can be used, i.e. dpv:Location
and dpv:hasLocation
along with its various types and contextually relevant concepts. To explicitly refer to location as associated with use of technology, the concept TechnologyUsageLocation is provided. For example, to indicate that some technology (whose actual location is on a server) is used in an office. Some synonyms used to indicate usage location for similar information are: application, deployment, or operation.
To indicate the maturity of a technology, the concept TechnologyReadinessLevel and relation hasTRL are useful. This information can be based on standards, such as the ISO 16290:2013, or those provided by other bodies and domains.
Technologies that involve operating on data, such as to collect, store, use, share, and erase it - are defined as DataTechnology. Since their definition is based on interaction with data, their specific types and hierarchy mirror the dpv:Processing
taxonomy. The shared name, such as with dpv:Store
as processing operation and DataStorageTechnology as technology, indicates the correspondence between processing and the technology that performs it.
OperationalTechnology relates to the processes or operations that themselves do not relate directly to data, such as execution environments, devices, or other processes - that are necessary or relevant for processing data. This is differentiated from DataTechnology in that technology related to operations refers only to the implementation and execution whereas data technology would be focused on how it involves or processes data.
Specific types of operational technologies include OperationEnvironment, OperationDevice, and OperationManagement. The concept Application represents the program or application which is the operation, or contains or facilitates its execution.
SecurityTechnology refers to any technology whose purpose is to provide security whether directly (e.g. securing access) or indirectly (e.g. PETs, identifying vulnerabilities). Specific types of security technologies include PET (Privacy Enhancing Technologies), and the risk-based categorisation as DetectionSecurityTechnology that detects security issues and vulnerabilities, PreventionSecurityTechnology that provides prevention or avoidance of exploitation, MitigationSecurityTechnology that provides reduction or mitigation of effects, and MonitoringSecurityTechnology that provides oversight and observations for security issues such as attacks.
ManagementTechnology relates to managing or orchestrating or monitoring - such as the other technology types. It can also include purely managerial technologies such as dedicated control interfaces or dashboards or tools orchestrating processes. While there is some ambiguity regarding what management exactly means, this concept is provided for the benefit of use-cases where it needs to be explicitly shown that some management occurs or involves the use of technologies. For example, to include that access control (a security technology) is managed through use of a dedicated tool or algorithm (a management technology).
IdentityTechnology relates to technologies that are related to identity, identification, or identifiers. This includes their generation, verification, use in authentication, and management (e.g. by combining with ManagementTechnology).
In addition to these, a sixth additional broad concept of SurveillanceTechnology can also function as a category so as to explicitly acknowledge and represent technologies that have issues or warrant particular attention. Variants of surveillance include OvertSurveillanceTechnology and CovertSurveillanceTechnology.
The provision of technology can happen via the following methods:
Communication mediums or mechanism used by technology include:
To specify the specific actors and their roles in the context of technologies, TechnologyActor is provided along with the following specific roles as its subtypes:
Note, that the technology actor concepts are based on the EU's proposal for AI reguation (i.e. AI ACT) and its corresponding concepts (e.g. AI Provider, AI Developer). Rather than limiting such concepts for "AI", we have expanded upon their intended meaning to encompass any technology. The concepts from the AI ACT can thus be modelled as subtypes of these.
Communication Mechanism
|
Data Technology
|
Identity Technology
|
Management Technology
|
Operational Technology
|
Security Technology
|
Surveillance Technology
|
Technology Actor
|
Technology Provision Method
|
Technology Readiness Level
|
Technology Usage Location
|
IRI | https://w3id.org/dpv/dpv-tech#CommunicationMechanism |
Term: | CommunicationMechanism |
Label: | Communication Mechanism |
Description: | Communication mechanism used or provided by Technologoy |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#DataTechnology |
Term: | DataTechnology |
Label: | Data Technology |
Description: | Technology that uses or interacts with data |
SubType of: | dpv:Technology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#IdentityTechnology |
Term: | IdentityTechnology |
Label: | Identity Technology |
Description: | Technology related to identity or identifiers |
SubType of: | dpv:Technology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#ManagementTechnology |
Term: | ManagementTechnology |
Label: | Management Technology |
Description: | Technology that enables or provides management |
SubType of: | dpv:Technology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#OperationalTechnology |
Term: | OperationalTechnology |
Label: | Operational Technology |
Description: | Technology that enables or performs or executes operations and processes |
SubType of: | dpv:Technology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#SecurityTechnology |
Term: | SecurityTechnology |
Label: | Security Technology |
Description: | Technology that enables or provides security |
SubType of: | dpv:Technology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#SurveillanceTechnology |
Term: | SurveillanceTechnology |
Label: | Surveillance Technology |
Description: | Technology related to surveillance of individuals or people |
SubType of: | dpv:Technology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#TechnologyActor |
Term: | TechnologyActor |
Label: | Technology Actor |
Description: | Actors and Entities involved in provision, use, and management of Technology |
SubType of: | dpv:Entity |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#TechnologyProvisionMethod |
Term: | TechnologyProvisionMethod |
Label: | Technology Provision Method |
Description: | Method associated with provision or use of technology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#TechnologyReadinessLevel |
Term: | TechnologyReadinessLevel |
Label: | Technology Readiness Level |
Description: | Indication of maturity of Technology (ISO 16290:2013) |
SubType of: | dpv:Technology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#TechnologyUsageLocation |
Term: | TechnologyUsageLocation |
Label: | Technology Usage Location |
Description: | Location for where technology is provided or used |
SubType of: | dpv:Location |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
has communication mechanism
|
has technology actor
|
has TRL
|
IRI | https://w3id.org/dpv/dpv-tech#hasCommunicationMechanism |
Term: | hasCommunicationMechanism |
Label: | has communication mechanism |
Description: | Indicates communication mechanisms used or provided by technology |
Domain: | dpv:Technology |
Range: | dpv-tech:CommunicationMechanism |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#hasTechnologyActor |
Term: | hasTechnologyActor |
Label: | has technology actor |
Description: | Indicates an actor associated with technology |
Domain: | dpv:Technology |
Range: | dpv-tech:TechnologyActor |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#hasTRL |
Term: | hasTRL |
Label: | has TRL |
Description: | Indicates technology maturity level |
Domain: | dpv:Technology |
Range: | dpv-tech:TechnologyReadinessLevel |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Data Copying Technology
|
Data Disclosure Technology
|
Data Management Technology
|
Data Obtaining Technology
|
Data Organising Technology
|
Data Removal Technology
|
Data Security Technology
|
Data Storage Technology
|
Data Transfer Technology
|
Data Transformation Technology
|
Data Usage Technology
|
IRI | https://w3id.org/dpv/dpv-tech#DataCopyingTechnology |
Term: | DataCopyingTechnology |
Label: | Data Copying Technology |
Description: | Technology related to copying data |
SubType of: | dpv-tech:DataTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#DataDisclosureTechnology |
Term: | DataDisclosureTechnology |
Label: | Data Disclosure Technology |
Description: | Technology related to disclosing data |
SubType of: | dpv-tech:DataTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#DataManagementTechnology |
Term: | DataManagementTechnology |
Label: | Data Management Technology |
Description: | Technology related to management of data |
SubType of: | dpv-tech:DataTechnology, dpv-tech:ManagementTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#DataObtainingTechnology |
Term: | DataObtainingTechnology |
Label: | Data Obtaining Technology |
Description: | Technology related to obtain data |
SubType of: | dpv-tech:DataTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#DataOrganisingTechnology |
Term: | DataOrganisingTechnology |
Label: | Data Organising Technology |
Description: | Technology realted to organising data |
SubType of: | dpv-tech:DataTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#DataRemovalTechnology |
Term: | DataRemovalTechnology |
Label: | Data Removal Technology |
Description: | Technology related to removing data |
SubType of: | dpv-tech:DataTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#DataSecurityTechnology |
Term: | DataSecurityTechnology |
Label: | Data Security Technology |
Description: | Technology related to security of data |
SubType of: | dpv-tech:DataTechnology, dpv-tech:SecurityTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#DataStorageTechnology |
Term: | DataStorageTechnology |
Label: | Data Storage Technology |
Description: | Technology related to storing data |
SubType of: | dpv-tech:DataTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#DataTransferTechnology |
Term: | DataTransferTechnology |
Label: | Data Transfer Technology |
Description: | Technology related to transfering data |
SubType of: | dpv-tech:DataTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#DataTransformationTechnology |
Term: | DataTransformationTechnology |
Label: | Data Transformation Technology |
Description: | Technology related to transforming data |
SubType of: | dpv-tech:DataTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#DataUsageTechnology |
Term: | DataUsageTechnology |
Label: | Data Usage Technology |
Description: | Technology related to using data |
SubType of: | dpv-tech:DataTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Application
|
Operation Device
|
Operation Environment
|
Operation Management
|
IRI | https://w3id.org/dpv/dpv-tech#Application |
Term: | Application |
Label: | Application |
Description: | A computing or digital program |
SubType of: | dpv-tech:OperationalTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#OperationDevice |
Term: | OperationDevice |
Label: | Operation Device |
Description: | Technology that acts as an equipment or mechanism for operations |
SubType of: | dpv-tech:OperationalTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#OperationEnvironment |
Term: | OperationEnvironment |
Label: | Operation Environment |
Description: | Technology that provides an environment for operations to be executed |
SubType of: | dpv-tech:OperationalTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#OperationManagement |
Term: | OperationManagement |
Label: | Operation Management |
Description: | Technology that manages operations |
SubType of: | dpv-tech:OperationalTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Detection Security Technology
|
Mitigation Security Technology
|
Monitoring Security Technology
|
PET (Privacy Enhancing Technology)
|
Prevention Security Technology
|
Security Management Technology
|
IRI | https://w3id.org/dpv/dpv-tech#DetectionSecurityTechnology |
Term: | DetectionSecurityTechnology |
Label: | Detection Security Technology |
Description: | Technology related to detection of vulnerabilities, threats, and exploitations |
SubType of: | dpv-tech:SecurityTechnology |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit, Julian Flake, Paul Ryan |
IRI | https://w3id.org/dpv/dpv-tech#MitigationSecurityTechnology |
Term: | MitigationSecurityTechnology |
Label: | Mitigation Security Technology |
Description: | Technology related to mitigation of vulnerabilities, threats, exploitations |
SubType of: | dpv-tech:SecurityTechnology |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit, Julian Flake, Paul Ryan |
IRI | https://w3id.org/dpv/dpv-tech#MonitoringSecurityTechnology |
Term: | MonitoringSecurityTechnology |
Label: | Monitoring Security Technology |
Description: | Technology related to monitoring of vulnerabilities, threats, exploitations |
SubType of: | dpv-tech:SecurityTechnology |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit, Julian Flake, Paul Ryan |
IRI | https://w3id.org/dpv/dpv-tech#PET |
Term: | PET |
Label: | PET (Privacy Enhancing Technology) |
Description: | Privacy Enhancing Technologies (PETs) that provide minimisation or security related to data and privacy |
SubType of: | dpv-tech:SecurityTechnology |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit, Julian Flake, Paul Ryan |
IRI | https://w3id.org/dpv/dpv-tech#PreventionSecurityTechnology |
Term: | PreventionSecurityTechnology |
Label: | Prevention Security Technology |
Description: | Technology related to prevention of vulnerabilities, threats, exploitations |
SubType of: | dpv-tech:SecurityTechnology |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit, Julian Flake, Paul Ryan |
IRI | https://w3id.org/dpv/dpv-tech#SecurityManagementTechnology |
Term: | SecurityManagementTechnology |
Label: | Security Management Technology |
Description: | Technology related to management of security |
SubType of: | dpv-tech:ManagementTechnology, dpv-tech:SecurityTechnology |
Created: | |
Contributor(s): | Georg P Krog, Harshvardhan J. Pandit, Julian Flake, Paul Ryan |
Covert SurveillanceTechnology
|
Overt Surveillance Technology
|
IRI | https://w3id.org/dpv/dpv-tech#CovertSurveillanceTechnology |
Term: | CovertSurveillanceTechnology |
Label: | Covert SurveillanceTechnology |
Description: | Surveillance that is covert i.e. invisible or non-apparent or implicit |
SubType of: | dpv-tech:SurveillanceTechnology |
Note: | For example, a web resource that performs tracking in the background |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#OvertSurveillanceTechnology |
Term: | OvertSurveillanceTechnology |
Label: | Overt Surveillance Technology |
Description: | Surveillance that is overt i.e. visible or apparent or explicit |
SubType of: | dpv-tech:SurveillanceTechnology |
Note: | For example, a CCTV with a notice |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Algorithmic
|
Component
|
Fixed Use
|
Goods
|
Product
|
Service
|
Subscription
|
System
|
IRI | https://w3id.org/dpv/dpv-tech#Algorithmic |
Term: | Algorithmic |
Label: | Algorithmic |
Description: | Technology provided as an algorithm or method |
Instance of: | dpv-tech:TechnologyProvisionMethod |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#Component |
Term: | Component |
Label: | Component |
Description: | Technology provided as a component |
Instance of: | dpv-tech:TechnologyProvisionMethod |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#FixedUse |
Term: | FixedUse |
Label: | Fixed Use |
Description: | Technology that can be used a fixed numner of times |
Instance of: | dpv-tech:TechnologyProvisionMethod |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#Goods |
Term: | Goods |
Label: | Goods |
Description: | Technology provided or used as goods |
Instance of: | dpv-tech:TechnologyProvisionMethod |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#Product |
Term: | Product |
Label: | Product |
Description: | Technology that is provided as a product |
Instance of: | dpv-tech:TechnologyProvisionMethod |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#Service |
Term: | Service |
Label: | Service |
Description: | Technology provided or used as service(s) |
Instance of: | dpv-tech:TechnologyProvisionMethod |
Note: | Removed plural suffix for consistency in terms |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#Subscription |
Term: | Subscription |
Label: | Subscription |
Description: | Technology that is provided or used as a periodic subscription |
Instance of: | dpv-tech:TechnologyProvisionMethod |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#System |
Term: | System |
Label: | System |
Description: | Technology provided as a system |
Instance of: | dpv-tech:TechnologyProvisionMethod |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#hasProvisionMethod |
Term: | hasProvisionMethod |
Label: | has provision method |
Description: | Specifies the provision or usage method of technology |
Domain: | dpv:Technology |
Range: | dpv-tech:TechnologyProvisionMethod |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Technology Developer
|
Technology Provider
|
Technology Subject
|
Technology User
|
IRI | https://w3id.org/dpv/dpv-tech#TechnologyDeveloper |
Term: | TechnologyDeveloper |
Label: | Technology Developer |
Description: | Actor that develops Technology |
SubType of: | dpv-tech:TechnologyActor |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#TechnologyProvider |
Term: | TechnologyProvider |
Label: | Technology Provider |
Description: | Actor that provides Technology |
SubType of: | dpv-tech:TechnologyActor |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#TechnologySubject |
Term: | TechnologySubject |
Label: | Technology Subject |
Description: | Actor that is subject of use of Technology |
SubType of: | dpv-tech:TechnologyActor |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#TechnologyUser |
Term: | TechnologyUser |
Label: | Technology User |
Description: | Actor that uses Technologoy |
SubType of: | dpv-tech:TechnologyActor |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
has developer
|
has provider
|
has subject
|
has user
|
IRI | https://w3id.org/dpv/dpv-tech#hasDeveloper |
Term: | hasDeveloper |
Label: | has developer |
Description: | Indicates technology developer |
Domain: | dpv:Technology |
Range: | dpv-tech:TechnologyDeveloper |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#hasProvider |
Term: | hasProvider |
Label: | has provider |
Description: | Indicates technology provider |
Domain: | dpv:Technology |
Range: | dpv-tech:TechnologyProvider |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#hasSubject |
Term: | hasSubject |
Label: | has subject |
Description: | Indicates technology subject |
Domain: | dpv:Technology |
Range: | dpv-tech:TechnologySubject |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#hasUser |
Term: | hasUser |
Label: | has user |
Description: | Indicates technology user |
Domain: | dpv:Technology |
Range: | dpv-tech:TechnologyUser |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Bluetooth
|
Cellular Network
|
GPS
|
Internet
|
Local Network
|
Networking
|
WiFi
|
IRI | https://w3id.org/dpv/dpv-tech#Bluetooth |
Term: | Bluetooth |
Label: | Bluetooth |
Description: | Technology utilising bluetooth communication |
SubType of: | dpv-tech:Networking |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#CellularNetwork |
Term: | CellularNetwork |
Label: | Cellular Network |
Description: | Technology utilising cellular networking communication |
SubType of: | dpv-tech:Networking |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#GPS |
Term: | GPS |
Label: | GPS |
Description: | Technology utilising GPS communication |
SubType of: | dpv-tech:CommunicationMechanism |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#Internet |
Term: | Internet |
Label: | Internet |
Description: | Technology utilising internet communication |
SubType of: | dpv-tech:Networking |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#LocalNetwork |
Term: | LocalNetwork |
Label: | Local Network |
Description: | Technology utilising local networking communication |
SubType of: | dpv-tech:Networking |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#Networking |
Term: | Networking |
Label: | Networking |
Description: | Technology utilising networking communication |
SubType of: | dpv-tech:CommunicationMechanism |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#WiFi |
Term: | WiFi |
Label: | WiFi |
Description: | Technology utilising wifi wireless networking communication |
SubType of: | dpv-tech:Networking |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
Cookie
|
Database
|
File System
|
Identity Management Technology
|
Identity Wallet
|
Personal Information Management System
|
Smartphone Application
|
IRI | https://w3id.org/dpv/dpv-tech#Database |
Term: | Database |
Label: | Database |
Description: | A database, database management system (DBMS), or application database |
SubType of: | dpv-tech:DataStorageTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#FileSystem |
Term: | FileSystem |
Label: | File System |
Description: | A data storage and retrieval interface provided by an operating system |
SubType of: | dpv-tech:DataStorageTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#IdentityManagementTechnology |
Term: | IdentityManagementTechnology |
Label: | Identity Management Technology |
Description: | Technologies providing identity provision, verification, management, and governance |
SubType of: | dpv-tech:IdentityTechnology, dpv-tech:ManagementTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#IdentityWallet |
Term: | IdentityWallet |
Label: | Identity Wallet |
Description: | product and service that allows the user to store identity data, credentials and attributes linked to her/his identity, to provide them to relying parties on request and to use them for authentication, online and offline, and to create qualified electronic signatures and seals |
SubType of: | dpv-tech:DataStorageTechnology, dpv-tech:IdentityManagementTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#PersonalInformationManagementSystem |
Term: | PersonalInformationManagementSystem |
Label: | Personal Information Management System |
Description: | A PIMS is a system that helps to give individuals more control over their personal data by managing their personal data in secure, on-premises or online storage systems and sharing it when and with whomever they choose |
SubType of: | dpv-tech:DataManagementTechnology |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
IRI | https://w3id.org/dpv/dpv-tech#SmartphoneApplication |
Term: | SmartphoneApplication |
Label: | Smartphone Application |
Description: | A computing or digital program on a smartphone device |
SubType of: | dpv-tech:Application |
Created: | |
Contributor(s): | Harshvardhan J. Pandit |
The DPVCG and DPV were initiated as part of the SPECIAL H2020 Project, which received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 731601. The SPECIAL project ran over a 3-year period from 2017 to 2019.
Harshvardhan J. Pandit was funded by the Irish Research Council Government of Ireland Postdoctoral Fellowship Grant#GOIPD/2020/790 for working within the DPVCG and contributing to the DPV. The fellowship lasted from 2020 to 2022.
The contributions of Beatriz Esteves have received funding through the PROTECT ITN Project from the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement No 813497.
The contributions of Harshvardhan J. Pandit have received funding from the ADAPT SFI Centre for Digital Media Technology is funded by Science Foundation Ireland through the SFI Research Centres Programme and is co-funded under the European Regional Development Fund (ERDF) through Grant#13/RC/2106 (2018 to 2020) and Grant#13/RC/2106_P2 (2021 onwards)
Referenced in:
Referenced in: