Blog Image

Personalization: The power of a weary smile

2117
Personalization has conquered the market by employing a few basic psychological mechanisms married with technological capabilities. Although people grow hypersensitive about protecting their privacy, they then turn around and readily share their digital data...
Blog Image

Is this the time to change the systems that underpin society?

1425
Be the change that you wish to see in the world ~ Mahatma Gandhi Firstly, I want to thank the The5CsofBusiness, who inspired me to write this article on creating a better world by providing thought-provoking...
Blog Image

COVID-19 Pandemic and Surveillance Program

1190
The epitome of the Modern-Day Corporate Trojan Horse Coronavirus pandemic has put significant stress on the world economy, public safety, as well as individual sanity. The chaos and uncertainty associated with the COVID-19 are not...
Internet of Things IoT

Internet of Things and Clusit Report (part II)

1597
There are basically five sectors that will benefit most, in terms of competitiveness, from IoT technology: - Industrial IoT (manufacturing, with predictive technologies to improve production; agriculture; mining; energy and smart grid; smart cities); - Commercial...
Blog Image

On Privacy by Design

1450
We are living in an era dominated by technological advances and digital innovation. With respect to data, these advances have paved way for the immense potential of using centralized databases and other related infrastructures...
The Clusit, Security Community, has published a report on the "state of the art" of the IoT phenomenon

Internet of Things and Clusit Report (part I)

1839
The Clusit, Security Community, has published a report on the "state of the art" of the IoT phenomenon, Internet of Things, which is quite interesting. As noted in the introduction, this phenomenon has become very...
Blog Image

What is Data Management?

1162
In recent years, everyone talks about Big Data. We are always connected, so it is no mystery that the amount of data that is generated daily is scary. Throughout these years, a large number...
Blog Image

How to Counter Data Breaches – Everything About Protecting Your Data

1320
As access to the internet has become a lot easier over the years, we have likewise witnessed an increase in data breaches. From the government and private firms down to individuals, pretty much everyone...
Blog Image

AI’s Role and Reputation in Post-Corona Society

2653
All things pass, including corona. But not before shaping our future and accelerating trends that were already under way. Corona has forced us to undertake unprecedented social experiments - from super surveillance over new...
app development

Privacy Guidelines, about app development

928
A fine of two hundred thousand euros that the Norwegian Privacy Authority, the DPA, has imposed on a local reality, for having developed an app, regardless of the paradigms to protect the privacy and...
Blog Image

Human and artificial intelligence in capitalism

2777
The surprising benefit of becoming old is in finding out that issues that intrigue and often scare younger generations are not unique at all. They are modern variants of previous experiences. In the 1960s,...
Blog Image

Three Amazing Ways Technology Can Diagnose Coronavirus

1198
The Coronavirus Virus or Virion as biologists know it is only about 200 nanometers in diameter and it is spreading across the globe like wildfire.  But how will you know when you get the Coronavirus...
Blog Image

America Under Fire — US Gov. Solarium Cybersecurity Report Sounds The General Alarm

1489
A bi-partisan report sends a dire warning to be heeded by all Americans. The US is under sustained cyber-assault. Time to unite behind a common strategy. "Our national security is now inexorably linked to cybersecurity" -...
Blog Image

How Hedge Funds Are Profiting From Your Data

4723
The Full Extent of How Your Personal Data is Being (Mis)used You are going to the supermarket for groceries; on your shopping list, you have fruits, chocolate, and paper towels. While this is a simple...
Blog Image

The Ethics Of Using AI In Healthcare

3142
Artificial Intelligence (AI) is being applied to any industry that manages a large amount of data, and in an increasingly interconnected digital society that includes pretty much everyone. Healthcare is certainly one, and there have...
Blog Image

Patient Data & Privacy: An Update

1842
Medical entities are tasked with handling a patient’s diagnosis and subsequent treatment with the utmost sensitivity and confidentiality. Complying with current healthcare regulations is crucial to maintain a patient’s trust and protect the healthcare...
The IoT is «an interconnected environment in which all kinds of objects have a digital presence and the ability to communicate with other objects and people»

Questions and strategic objectives of the IoT

1368
The phenomenon of the Internet of Things is in full expansion, both for the multiplication of digital devices on the market and for their objective functionality and usefulness at the service of innovative and...
Blog Image

On Artificial Intelligence and Surveillance Capitalism

8902
Intro: From Super-Elixer to Dangerous Dark Art Big Tech, which is always now: AI-fueled Big Tech, has made shopping, searching, connecting to friends on your preferred platforms astonishingly easy. Which is why the masses, including...
Blog Image

Sparks Interview – Dimension: Data Belongs to the People

5297
X-Order is an investment and research organization dedicated to the study of value capture in open finance. We strive to be a bridge between new finance and interdisciplinary fields with relation to science and...
Blog Image

One Metro NY: A Privacy Disaster, or Convenience Win?

1263
It seems like every morning brings new headlines that herald the end of our digital privacy as we know it. These stories spark outcry, worry, and -- counterintuitively -- no small amount of apathy.  The...