Practical Insights on Data Risks

10 Ways Cybersecurity Can Improve Digital Development Outcomes

10 Ways Cybersecurity Can Improve Digital Development Outcomes

Published on: Jan 27 2022 by Guest Writer - Comments Off on 10 Ways Cybersecurity Can Improve Digital Development Outcomes
Rapid digital transformation – underpinned by affordable communications and cheap devices – has introduced new risks and vulnerabilities that cannot be ignored....
New USAID Primer: Disinformation, Misinformation, and Malinfomation

New USAID Primer: Disinformation, Misinformation, and Malinfomation

Published on: Nov 04 2021 by Guest Writer - Comments Off on New USAID Primer: Disinformation, Misinformation, and Malinfomation
Disinformation is by no means new. Although social media platforms have emerged as the most efficient spreaders of false information, disinformation is also spread...
12 Ways to Manage Digital Risks to Refugee Community Connectivity

12 Ways to Manage Digital Risks to Refugee Community Connectivity

Published on: Oct 06 2021 by Guest Writer - Comments Off on 12 Ways to Manage Digital Risks to Refugee Community Connectivity
Connectivity initiatives, which entail the provision of internet and mobile access, can positively impact the lives of crisis-affected people, especially refugees,...
Are You Deploying Technologies of Disempowerment?

Are You Deploying Technologies of Disempowerment?

Published on: Aug 27 2020 by Guest Writer - Comments Off on Are You Deploying Technologies of Disempowerment?
As noted in Technologies of Disempowerment, several technological systems for welfare delivery and social security in India have ended up disempowering many people,...
What Should Donors do to Support Responsible Data?

What Should Donors do to Support Responsible Data?

Published on: May 16 2019 by Linda Raftree - 4 Comments
  Donors such as USAID have a critical role to play in encouraging greater respect and protection of the data of vulnerable individuals and groups. They can help...
7 Ways You’re Contributing to the Humanitarian Metadata Problem

7 Ways You’re Contributing to the Humanitarian Metadata Problem

Published on: Dec 27 2018 by Guest Writer - Comments Off on 7 Ways You’re Contributing to the Humanitarian Metadata Problem
The past decade has seen a surge in the use of mobile telecommunications, messaging apps and social media. As they become more accessible around the world, these...
How Do You Mitigate Large Scale Distribution Risk For 3 Million Constituents?

How Do You Mitigate Large Scale Distribution Risk For 3 Million Constituents?

Published on: Oct 25 2017 by Catholic Relief Services - Comments Off on How Do You Mitigate Large Scale Distribution Risk For 3 Million Constituents?
Food distribution is a huge part of foreign aid in times of food insecurity. For Ethiopia, around 1.5 million acute food insecure households have received food...
What’s Your ICT4D Cyber Threat Model?

What’s Your ICT4D Cyber Threat Model?

Published on: Nov 18 2015 by Guest Writer - 1 Comment
Threat models can make ICT4D more secure and safe to use. In computer science, “threat modeling” is the approach of playing through attacks and hacks ahead...