Practical Insights on Data Privacy

10 Examples of Successful African e-Government Digital Services

10 Examples of Successful African e-Government Digital Services

Published on: Jan 24 2024 by Wayan Vota - 5 Comments
What are African e-Government Services? African countries are implementing a diverse range of e-Government services, aiming to improve service delivery, enhance...
Applying US Blueprint for an AI Bill of Rights to African Countries

Applying US Blueprint for an AI Bill of Rights to African Countries

Published on: Dec 08 2022 by Guest Writer - Comments Off on Applying US Blueprint for an AI Bill of Rights to African Countries
Regulation of artificial intelligence is the need of the hour. The release of The Blueprint for An AI Bill of Rights (AIBoR) by the US White House Office of Science...
Data Misuse is a Timeless Problem in Development

Data Misuse is a Timeless Problem in Development

Published on: Nov 17 2022 by Guest Writer - 2 Comments
In the research paper, “Datafication, Power and Control in Development: A Historical Perspective on the Perils and Longevity of Data“, Katarzyna Cieslik...
Who Owns the Data in Global Public Health Programming?

Who Owns the Data in Global Public Health Programming?

Published on: Apr 20 2022 by Guest Writer - 7 Comments
A couple of years ago I attended the Global Digital Health Forum, where a speaker by the name of Jeff Street said something that has stuck with me ever since: “Whoever...
Facebook Data Privacy Concepts Do Not Translate in Cambodia

Facebook Data Privacy Concepts Do Not Translate in Cambodia

Published on: Mar 31 2022 by Guest Writer - Comments Off on Facebook Data Privacy Concepts Do Not Translate in Cambodia
Privacy scholarship has shown how norms of appropriate information flow and information regulatory processes vary according to environment, which change as the...
ICRC Cyber Attack is Our Constituent Data Management Nightmare

ICRC Cyber Attack is Our Constituent Data Management Nightmare

Published on: Jan 26 2022 by Wayan Vota - 1 Comment
A sophisticated cyber security attack against International Committee of the Red Cross (ICRC) servers last week exposed sensitive personally identifiable information...
5 Ways We Get Survey Participants To Opt Out of Data Collection

5 Ways We Get Survey Participants To Opt Out of Data Collection

Published on: Oct 28 2021 by Laura Scanlon - Comments Off on 5 Ways We Get Survey Participants To Opt Out of Data Collection
Over the years, we’ve found that one specific area of the research life cycle – informed consent – needs serious improvement. The consent process...
What Digital Technology Systems Are Procured by African Governments?

What Digital Technology Systems Are Procured by African Governments?

Published on: Oct 14 2021 by Guest Writer - 1 Comment
What does the public know about transparency and safeguards in the procurement and deployment of Digital Technology Systems in Africa, including biometric identification,...
12 Ways to Manage Digital Risks to Refugee Community Connectivity

12 Ways to Manage Digital Risks to Refugee Community Connectivity

Published on: Oct 06 2021 by Guest Writer - Comments Off on 12 Ways to Manage Digital Risks to Refugee Community Connectivity
Connectivity initiatives, which entail the provision of internet and mobile access, can positively impact the lives of crisis-affected people, especially refugees,...
We Need Strong Information Security Practices in Afghanistan Right Now

We Need Strong Information Security Practices in Afghanistan Right Now

Published on: Aug 20 2021 by Mike Dawson - 3 Comments
The situation in Afghanistan is heartbreaking for everyone. Those who are there, those with family there, and those with friends, colleagues, and care for our fellow...