Practical Insights on Digital Security

What Are User Perceptions of Internet Trust and Privacy in India and Ghana?

What Are User Perceptions of Internet Trust and Privacy in India and Ghana?

Published on: Jul 01 2020 by Kristen Roggemann - Comments Off on What Are User Perceptions of Internet Trust and Privacy in India and Ghana?
It’s been a hard couple of years for the internet. Between election interference via social media platforms, disinformation going viral and facilitating genocides,...
We Need a 10th Principle for Digital Development: Educate the User

We Need a 10th Principle for Digital Development: Educate the User

Published on: Mar 07 2019 by Kristen Roggemann - 3 Comments
We in the international development community talk a lot about privacy and security in digital development. We try to think through privacy and security in terms...
When Will We Have Our Own Cambridge Analytica-Facebook Moment? Your Weekend Long Reads

When Will We Have Our Own Cambridge Analytica-Facebook Moment? Your Weekend Long Reads

Published on: Apr 21 2018 by Steve Vosloo - Comments Off on When Will We Have Our Own Cambridge Analytica-Facebook Moment? Your Weekend Long Reads
Facebook currently has a Cambridge Analytica problem. It is under severe pressure to explain how 87 million users had their personal data leaked and offer assurances...
4 Digital Security Principles to Protect Yourself from a Cybersecurity Nightmare

4 Digital Security Principles to Protect Yourself from a Cybersecurity Nightmare

Published on: Feb 05 2018 by Praekelt Org - Comments Off on 4 Digital Security Principles to Protect Yourself from a Cybersecurity Nightmare
2017 was an exciting and terrifying year in cybersecurity news. The digital world saw an upsurge in headlining ransomware, disclosure of large-scale data leaks...
Don’t Be Strava: Six Ways to Break Your Data Stockholm Syndrome

Don’t Be Strava: Six Ways to Break Your Data Stockholm Syndrome

Published on: Feb 02 2018 by Guest Writer - 2 Comments
In the last few days, there has been a lot of hand-wringing after Strava, a run tracking app, published a global heat map of its users’ exercise paths. As it...
5 Tools for Secure Communications and Data Storage

5 Tools for Secure Communications and Data Storage

Published on: Jul 27 2016 by Guest Writer - 1 Comment
Many local partner organizations that international development actors engage with face risks while operating in challenging – and sometimes dangerous – environments....
What’s Your ICT4D Cyber Threat Model?

What’s Your ICT4D Cyber Threat Model?

Published on: Nov 18 2015 by Guest Writer - 1 Comment
Threat models can make ICT4D more secure and safe to use. In computer science, “threat modeling” is the approach of playing through attacks and hacks ahead...