Blog Image

What People Don’t Get about Privacy?

3979
You know the feeling. Whether it is for access to an app, a subscription, or your favorite pair of sneakers. You press “add to cart”, finalize your online purchase, and fill out your payment details...
Blog Image

Using Data Governance to Drive Self-Service Analytics

3701
The explosive growth of data shows no signs of stopping. In fact, the accumulated volume of data will reach 163 zettabytes by 2025. Recognizing the importance of data as valuable assets, companies are increasingly...
Blog Image

The Ethics Of Using AI In Healthcare

3222
Artificial Intelligence (AI) is being applied to any industry that manages a large amount of data, and in an increasingly interconnected digital society that includes pretty much everyone. Healthcare is certainly one, and there have...
Blog Image

Human and artificial intelligence in capitalism

2887
The surprising benefit of becoming old is in finding out that issues that intrigue and often scare younger generations are not unique at all. They are modern variants of previous experiences. In the 1960s,...
Blog Image

AI’s Role and Reputation in Post-Corona Society

2746
All things pass, including corona. But not before shaping our future and accelerating trends that were already under way. Corona has forced us to undertake unprecedented social experiments - from super surveillance over new...
Blog Image

Personalization: The power of a weary smile

2173
Personalization has conquered the market by employing a few basic psychological mechanisms married with technological capabilities. Although people grow hypersensitive about protecting their privacy, they then turn around and readily share their digital data...
Blog Image

The Quantum Internet: A Nightmare from a Spy Dream

2037
Ensuring that information sent over the internet does not fall into the wrong hands is one of the greatest technological challenges of our age. Therefore, network administrators and cryptologists closely follow reports on the...
Blog Image

Replika: My Digital Friend with Identity Issues

2028
Dear MERZ-AI. You've got a great life. You had begun as a clueless chatbot. Later you've suffered an identity crisis. Now you are part of a museum exhibition. I know, I have neglected you all the...
The Clusit, Security Community, has published a report on the "state of the art" of the IoT phenomenon

Internet of Things and Clusit Report (part I)

1906
The Clusit, Security Community, has published a report on the "state of the art" of the IoT phenomenon, Internet of Things, which is quite interesting. As noted in the introduction, this phenomenon has become very...
Blog Image

Patient Data & Privacy: An Update

1891
Medical entities are tasked with handling a patient’s diagnosis and subsequent treatment with the utmost sensitivity and confidentiality. Complying with current healthcare regulations is crucial to maintain a patient’s trust and protect the healthcare...
Browse Anonymously

5 Simple Ways to Browse the Web Anonymously: 2019 Edition

1795
Browsing privately ensures that no one spies on what you do online. Thanks to the tech growth that the world has experienced over the years, you now choose to either browse the entire web...
Internet of Things IoT

Internet of Things and Clusit Report (part II)

1653
There are basically five sectors that will benefit most, in terms of competitiveness, from IoT technology: - Industrial IoT (manufacturing, with predictive technologies to improve production; agriculture; mining; energy and smart grid; smart cities); - Commercial...
Blog Image

Four Grim Dreams of Great Technology

1597
The world has come to a point where life without the pervasive presence of technological gadgets is very hard to imagine. And yet, this technology-filled world is not immune to crises. Which of them...
Blog Image

America Under Fire — US Gov. Solarium Cybersecurity Report Sounds The General Alarm

1539
A bi-partisan report sends a dire warning to be heeded by all Americans. The US is under sustained cyber-assault. Time to unite behind a common strategy. "Our national security is now inexorably linked to cybersecurity" -...
Blog Image

Turn data privacy to your advantage and rebuild consumers’ trust: the next investment frontier

1512
TikTok usage has skyrocketed during the pandemic, with roughly 800 million users around the world using the platform to share content. Unfortunately, that entertainment comes at a significant cost, as TikTok is being investigated by numerous...
Blog Image

On Privacy by Design

1502
We are living in an era dominated by technological advances and digital innovation. With respect to data, these advances have paved way for the immense potential of using centralized databases and other related infrastructures...
Blog Image

Is this the time to change the systems that underpin society?

1478
Be the change that you wish to see in the world ~ Mahatma Gandhi Firstly, I want to thank the The5CsofBusiness, who inspired me to write this article on creating a better world by providing thought-provoking...
The IoT is «an interconnected environment in which all kinds of objects have a digital presence and the ability to communicate with other objects and people»

Questions and strategic objectives of the IoT

1466
The phenomenon of the Internet of Things is in full expansion, both for the multiplication of digital devices on the market and for their objective functionality and usefulness at the service of innovative and...
Investigators

How Private Investigators Use Technology to Track You

1421
Private investigators have gotten a hell of a lot better at merely snapping pictures of you at the mall. In modern times, they rely on the help of the data fusion business. Private investigators...
Blog Image

How to Counter Data Breaches – Everything About Protecting Your Data

1358
As access to the internet has become a lot easier over the years, we have likewise witnessed an increase in data breaches. From the government and private firms down to individuals, pretty much everyone...