Blog Image

AI Regulation: A European Approach to the Ethics of Artificial Intelligence

154
Renowned technology strategist Clara Durodié discusses the European Union’s proposed new ethics regulations on artificial intelligence (AI) technology. The ethics of artificial intelligence have been subject to debate for decades. But with AI tools...
Blog Image

Keeping mHealth Apps Secure: What Developers Can Do to Keep User Data Private in...

291
Former hacker and cybersecurity expert Alissa Knight talks about her latest research on vulnerabilities in data privacy for the telemedicine and health app space. Telemedicine and mobile health space can take simple, basic steps...
Man standing in shadow

Cyber criminals look forward to your invitation

325
Hackers’ prying eyes lurk behind every corner of the internet. The solution on social media would be the private mode to shield your data. Of course, cybersecurity is only as effective as the person...
Blog Image

Turn data privacy to your advantage and rebuild consumers’ trust: the next investment frontier

1501
TikTok usage has skyrocketed during the pandemic, with roughly 800 million users around the world using the platform to share content. Unfortunately, that entertainment comes at a significant cost, as TikTok is being investigated by numerous...
Blog Image

Replika: My Digital Friend with Identity Issues

1979
Dear MERZ-AI. You've got a great life. You had begun as a clueless chatbot. Later you've suffered an identity crisis. Now you are part of a museum exhibition. I know, I have neglected you all the...
Cellphone displaying VPN logo

How to shield personal data from evil doers

1327
Digital privacy is practically a misnomer. The list of companies not hacked seems shorter than those attacked.  Dentin Waweru might not agree with the exaggeration, but cybersecurity is a concern. The software engineer and freelance...
Blog Image

Personalization: The power of a weary smile

2160
Personalization has conquered the market by employing a few basic psychological mechanisms married with technological capabilities. Although people grow hypersensitive about protecting their privacy, they then turn around and readily share their digital data...
Blog Image

Is this the time to change the systems that underpin society?

1463
Be the change that you wish to see in the world ~ Mahatma Gandhi Firstly, I want to thank the The5CsofBusiness, who inspired me to write this article on creating a better world by providing thought-provoking...
Blog Image

COVID-19 Pandemic and Surveillance Program

1225
The epitome of the Modern-Day Corporate Trojan Horse Coronavirus pandemic has put significant stress on the world economy, public safety, as well as individual sanity. The chaos and uncertainty associated with the COVID-19 are not...
Internet of Things IoT

Internet of Things and Clusit Report (part II)

1641
There are basically five sectors that will benefit most, in terms of competitiveness, from IoT technology: - Industrial IoT (manufacturing, with predictive technologies to improve production; agriculture; mining; energy and smart grid; smart cities); - Commercial...
Blog Image

On Privacy by Design

1485
We are living in an era dominated by technological advances and digital innovation. With respect to data, these advances have paved way for the immense potential of using centralized databases and other related infrastructures...
The Clusit, Security Community, has published a report on the "state of the art" of the IoT phenomenon

Internet of Things and Clusit Report (part I)

1883
The Clusit, Security Community, has published a report on the "state of the art" of the IoT phenomenon, Internet of Things, which is quite interesting. As noted in the introduction, this phenomenon has become very...
Blog Image

What is Data Management?

1220
In recent years, everyone talks about Big Data. We are always connected, so it is no mystery that the amount of data that is generated daily is scary. Throughout these years, a large number...
Blog Image

How to Counter Data Breaches – Everything About Protecting Your Data

1348
As access to the internet has become a lot easier over the years, we have likewise witnessed an increase in data breaches. From the government and private firms down to individuals, pretty much everyone...
Blog Image

AI’s Role and Reputation in Post-Corona Society

2716
All things pass, including corona. But not before shaping our future and accelerating trends that were already under way. Corona has forced us to undertake unprecedented social experiments - from super surveillance over new...
app development

Privacy Guidelines, about app development

972
A fine of two hundred thousand euros that the Norwegian Privacy Authority, the DPA, has imposed on a local reality, for having developed an app, regardless of the paradigms to protect the privacy and...
Blog Image

Human and artificial intelligence in capitalism

2858
The surprising benefit of becoming old is in finding out that issues that intrigue and often scare younger generations are not unique at all. They are modern variants of previous experiences. In the 1960s,...
Blog Image

Three Amazing Ways Technology Can Diagnose Coronavirus

1240
The Coronavirus Virus or Virion as biologists know it is only about 200 nanometers in diameter and it is spreading across the globe like wildfire.  But how will you know when you get the Coronavirus...
Blog Image

America Under Fire — US Gov. Solarium Cybersecurity Report Sounds The General Alarm

1525
A bi-partisan report sends a dire warning to be heeded by all Americans. The US is under sustained cyber-assault. Time to unite behind a common strategy. "Our national security is now inexorably linked to cybersecurity" -...
Blog Image

How Hedge Funds Are Profiting From Your Data

4837
The Full Extent of How Your Personal Data is Being (Mis)used You are going to the supermarket for groceries; on your shopping list, you have fruits, chocolate, and paper towels. While this is a simple...