Please RSVP Now for ICT4D Principle 8: Address Privacy & Security in Development Programs
In recent years, ICTs such as mobile phone apps, web-based mapping technologies and data-mining techniques have been incorporated into development programmes, ranging...
Digital Freedom is a Myth. How Can We Ethically Provide ICT4D Solutions?
Ethics is an ever-present theme in Development and one which is sometimes overlooked in ICT4D/Technology for Development – a field in which people can sometimes...
Do Development Constituents Have a Right to Be Forgotten Too?
Since Google started to comply with a European Union court ruling on individuals’ “right to be forgotten” by the search giant, its received 70,000...
The Best Mobile Data Collection System Exists: Choice is the Challenge
You might think that the topic of collecting data via mobile devices would be a rather dry discussion of data management and statistical methodology....
10 Signs That Your Computer is Infected with Viruses, Malware, or Trojans
PandaLabs, the anti-malware laboratory of Panda Security, has produced a simple guide to the 10 most common symptoms of infection, to help all users find out if...
Is Data Security and Encryption Really Necessary in Rural Africa?
I am often asked about cyber security on WiFi networks for international development projects in rural Africa. My response is usually a laugh, as I find it hard...