Practical Insights on Data Security

Please RSVP Now for ICT4D Principle 8: Address Privacy & Security in Development Programs

Please RSVP Now for ICT4D Principle 8: Address Privacy & Security in Development Programs

Published on: Apr 09 2015 by Wayan Vota - Comments Off on Please RSVP Now for ICT4D Principle 8: Address Privacy & Security in Development Programs
In recent years, ICTs such as mobile phone apps, web-based mapping technologies and data-mining techniques have been incorporated into development programmes, ranging...
Digital Freedom is a Myth. How Can We Ethically Provide ICT4D Solutions?

Digital Freedom is a Myth. How Can We Ethically Provide ICT4D Solutions?

Published on: Feb 18 2015 by Matt Haikin - Comments Off on Digital Freedom is a Myth. How Can We Ethically Provide ICT4D Solutions?
Ethics is an ever-present theme in Development and one which is sometimes overlooked in ICT4D/Technology for Development – a field in which people can sometimes...
Do Development Constituents Have a Right to Be Forgotten Too?

Do Development Constituents Have a Right to Be Forgotten Too?

Published on: Sep 11 2014 by Wayan Vota - 1 Comment
Since Google started to comply with a European Union court ruling on individuals’ “right to be forgotten” by the search giant, its received 70,000...
The Best Mobile Data Collection System Exists: Choice is the Challenge

The Best Mobile Data Collection System Exists: Choice is the Challenge

Published on: Sep 28 2012 by Guest Writer - 7 Comments
    You might think that the topic of collecting data via mobile devices would be a rather dry discussion of data management and statistical methodology....
10 Signs That Your Computer is Infected with Viruses, Malware, or Trojans

10 Signs That Your Computer is Infected with Viruses, Malware, or Trojans

Published on: Oct 11 2010 by Wayan Vota - 2 Comments
PandaLabs, the anti-malware laboratory of Panda Security, has produced a simple guide to the 10 most common symptoms of infection, to help all users find out if...
Is Data Security and Encryption Really Necessary in Rural Africa?

Is Data Security and Encryption Really Necessary in Rural Africa?

Published on: Jan 07 2010 by Wayan Vota - 7 Comments
I am often asked about cyber security on WiFi networks for international development projects in rural Africa. My response is usually a laugh, as I find it hard...