Personal Data

Leveraging data to support widening participation past the point of entry

Technology is not a simple fix for complex societal needs, but it can enable institutions to evaluate the impact of widening participation initiatives, and can go on to support disadvantaged students once they are through the front door.

Coronavirus should not be a pretext for lowering AML defences

John Dobson, chief executive, SmartSearch, declares that the coronavirus pandemic should not be justification for lowering AML defences.

The ethics of AI development in public policy

Dr Emma Carmel illustrates the paradoxical realities of ethics in AI development, with recommendations for forming an effective public policy.

European Commission: Personal cybersecurity via encrypted messaging

Signal is the messaging app that claims the highest level of personal cybersecurity: Why has the European Commission chosen this over other platforms?

Overcoming the complexities of healthcare security

Matt Walmsley, EMEA Director at Vectra, discusses how security teams within the healthcare industry lack visibility into and control over medical devices connected to the network.

Our actions decide what we read online, algorithms are only a part of it

In light of scandals like Cambridge Analytica, Tor Richardson Golinski, Amelia Harshfield and Advait Deshpande dissect the truths of who decides what we read online.

Protecting patient data through stringent access rights management

Sascha Giese, Head Geek at SolarWinds, looks at the importance of managing access rights in healthcare organisations, highlighting four steps to help illustrate how IT teams can integrate this successfully into every department.

Keeping hackers out and costs low: Cyber security in the public sector

Kieran O’Driscoll, Public Sector Business Lead at CyberArk discusses the challenges faced by public sector firms when it comes to balancing cost-effective cyber security with the need to secure the personal details of millions of UK citizens.

Smart cities, smarter approaches: How to build trust into connected urban spaces?

Here, Ashley Stevenson explains to us how smart cities need to build trust into connected urban spaces.

The Lancaster University data breach: Safeguarding students personal information

Organisations like universities that handle significant amounts of confidential and personal information are increasingly being targeted by cyber criminals. In this article SecureTeam looks at the damage data breaches are causing in UK universities.

Why trust at face value can’t fix the civil service email leaks

Matt Radolec, Security Architect Manager at Varonis, discusses the issues around unlimited access to email, the importance of appropriate levels of protection and what needs to change to prevent further government leaks of this nature, here.

Cybersecurity in hospitals and care centres

Dr Peter Leitner and Stela Shiroka, at INTERSPREAD GmbH, detail cybersecurity in hospitals and care centres and their thoughts on the need for increased awareness and enhanced training capabilities in Europe.

5 steps to demystify data in Defence

Vanessa Fernandes highlights five tips on how to demystify data and get yourself closer to the benefits it can bring, here.

The future of public services means giving citizens control over their own data

Patrick Stephenson, Client Managing Director: Central and Regional Government at Fujitsu in the UK and Ireland, discusses why governments need to give citizens control over their own data.

How have security threats revamped the mobile industry?

Tech geek Devin Smith highlights how the mobile industry has been revamped to counter security threats posed by cyber crime in this article.

How voice biometric technology is transforming modern contact centres

Tim Dunn, Commercial Director at ValidSoft discusses the benefits of deploying voice biometric technology and how it can transform modern call centres.

Millions at risk of identify theft when using free public Wi-Fi

New research of 2,000 Brits has revealed that 79% of public Wi-Fi users take significant risks when choosing hotspots.

Advertisements


Latest Academic Articles

The latest academic articles from key research stakeholders