Practical Insights on Data Security

If Digital Freedom is a Myth, How Can We Ethically Provide Access to Cutting-Edge Technology?

If Digital Freedom is a Myth, How Can We Ethically Provide Access to Cutting-Edge Technology?

Published on: Feb 18 2015 by Matt Haikin - Comments Off on If Digital Freedom is a Myth, How Can We Ethically Provide Access to Cutting-Edge Technology?
Ethics is an ever-present theme in Development and one which is sometimes overlooked in ICT4D/Technology for Development – a field in which people can sometimes...
Do Development Constituents Have a Right to Be Forgotten Too?

Do Development Constituents Have a Right to Be Forgotten Too?

Published on: Sep 11 2014 by Wayan Vota - 1 Comment
Since Google started to comply with a European Union court ruling on individuals’ “right to be forgotten” by the search giant, its received 70,000...
The Best Mobile Data Collection System Exists: Choice is the Challenge

The Best Mobile Data Collection System Exists: Choice is the Challenge

Published on: Sep 28 2012 by Guest Writer - 7 Comments
    You might think that the topic of collecting data via mobile devices would be a rather dry discussion of data management and statistical methodology....
10 Signs That Your Computer is Infected with Viruses, Malware, or Trojans

10 Signs That Your Computer is Infected with Viruses, Malware, or Trojans

Published on: Oct 11 2010 by Wayan Vota - 2 Comments
PandaLabs, the anti-malware laboratory of Panda Security, has produced a simple guide to the 10 most common symptoms of infection, to help all users find out if...
Is Data Security and Encryption Really Necessary in Rural Africa?

Is Data Security and Encryption Really Necessary in Rural Africa?

Published on: Jan 07 2010 by Wayan Vota - 7 Comments
I am often asked about cyber security on WiFi networks for international development projects in rural Africa. My response is usually a laugh, as I find it hard...