ESSENTIAL RECIPES FOR THE DIGITAL JOURNEY OF ENTERPRISES

Size: px
Start display at page:

Download "ESSENTIAL RECIPES FOR THE DIGITAL JOURNEY OF ENTERPRISES"

Transcription

1 DIRK KRAFZIG MANAS DEB MARTIN FRICK DIGITAL COOKBOOK ESSENTIAL RECIPES FOR THE DIGITAL JOURNEY OF ENTERPRISES For more details visit: GRAPHIC DESIGN BY KNUT JUNKER AND DIETMAR GRUBERT

2 328 Chapter 11: Executing the Digital Transformation Trust me. They re safe. I Hope so. Digital Trust Digital trust is a prerequisite for business in the digital age Attacks on the surface area continue to increase DIGITAL TRUST MUST BE SEEN AS A LONG-TERM marketing and business development Matter

3 Chapter 11: Executing the Digital Transformation Digital Trust M. Yunus Trust is the glue that maintains social groups. From an evolutionary perspective, trust enables social animals to share their specialised skills for survival and well-being. With an ever-increasing body of knowledge, humans continue to specialise. This specialisation increases the necessity for an individual to belong to and interact with a large number of groups. Trust, the shared interest and lack of malice, becomes the key ingredient for individuals to perform efficiently in a large number of groups that form a vibrant society. 264 Trust is pivotal for modern society. With the advent of the Internet, human interactions have moved from the physical world to the digital world. Much like in the non-digital world, where individuals trust their doctor for health care, an aeroplane for safe transport and a restaurant for clean food, in the digital world, consumers expect that their interactions will be without malice. We trust that, when we purchase a TV online, the right amount will be charged to our credit card only once, the product will be delivered undamaged in the time frame promised and the information we provided to the merchant during this process will not be misused. Without this trust, we may choose to find a more trustworthy physical store for our purchase, a different online store or not to purchase the product at all. Without trust, commerce and innovation slow down and progress is severely hampered. To begin with, we expect that any digital transaction entailing the exchange of money or personal information will be performed with the expected results. We also expect it to be done without information leaking to other entities through digital theft or unauthorised sale of information. A service delivered with poor quality or followed by digital information being shared with an external entity that can then use it without the owner s permission destroys digital trust and makes subsequent transactions with the entity less likely. We expect that if something goes wrong, and the digital exchange is not what we expected, then the entity we do business with will be capable of reversing the adverse impacts of the interaction. This may include compensating us through refunds or undoing an unauthorised transaction. At a minimum, we expect companies to inform us that our information has been compromised so that we can be prepared and take action, such as changing our passwords to prevent further loss. 264 Warren, M. E.: Democratic Theory and Trust, Cambridge University Press, pp , 1999.

4 330 Chapter 11: Executing the Digital Transformation We expect companies to be proactive and continually engaged to ensure that digital trust is maintained between us. For example, we expect our banks to detect anomalous transactions based on our established historical behaviour. It is particularly important that enterprises understand and respect those customer expectations, because the digital world empowers clients to communicate dissatisfaction with a service provider via social media, news groups etc. and rapidly damage the reputation of the enterprise. Digital assets are under increasingly sophisticated attack, a phenomenon known as cyber warfare. 265 Digital asset theft is motivated by either financial gain or socio-political activism. One of the largest known cyber thefts motivated purely by financial gain cost companies over US$300 million in 2013, when a group of five hackers from Russia and Ukraine stole 160 million credit card numbers. 266 Worldwide Monetary Damage Caused by Cyber Crime, as Reported to the IC3 (excluding 2010) 1,400 1,200 Total Damage (in mill. USD) 1, IC3 = Financial Bureau of Investigation Internet Crime Complaint Center. In contrast to blatant theft of digital assets, organisations are engaged in micro-targeting consumers by learning their online behaviour. Using cookies artefacts that companies can read from or write to on our devices companies now collect thousands of attributes about consumers, mostly without their knowledge. The increasing popularity of big data analytics and machine learning for microtargeting has resulted in a stronger drive for collecting customer information without their explicit consent. Digital asset theft is a significant tool for socio-political activism. 265 FBI, IC3, US Department of Justice: Amount of monetary damage caused by reported cyber crime to the IC3 from 2001 to 2016, Statista, Voreacos, D.: 5 Hackers Charged in Largest Data-Breach Scheme in U.S., Bloomberg, 2013.

5 Chapter 11: Executing the Digital Transformation 331 Perhaps Ashley Madison, a dating site marketed to people who are married or in relationships, has had one of the most direct impacts on users lives. 267 With 32 million records of customers involved in extramarital affairs exposed, the breakdown of digital trust made a direct and perhaps irreversible impact on personal trust, a cornerstone of marriage. Breaching digital trust for political activism can cause significant changes in the way countries conduct themselves on the global stage. The impact of Wikileaks, the Snowden leaks and the Panama leaks continue to have a profound impact on public opinion, which translates directly into changes in government leadership and policies. Technology, process and culture are the fundamental building blocks of establishing and maintaining digital trust. All three are interdependent: strong technology alone does not ensure digital trust without the supporting processes and culture. From cryptographic clay tablets of 1500 BCE Mesopotamia to the quantum cryptography of the twenty-first century, the desire to protect information and communication has evolved to keep in step with human technological evolution. Significant tools, products and frameworks now exist that enable digital trust. From sophisticated multifactor biometric authentication for establishing identity, to strong crypto-algorithms for ensuring communication privacy and integrity, a wide array of commercial and open-source technologies are available for establishing digital trust. Trust in the virtual world should be measurable through outcomes. If the outcome of a transaction or a process is not as expected, the trust between the transacting entities should be reviewed, strengthened or annulled. Digital assets, for example credit card numbers, should be protected with as much, if not more, diligence as a physical asset (for example, a new car). Unlike physical assets, digital assets can be stolen quickly with minimal physical effort. Once stolen, a digital asset cannot be recovered. A stolen digital asset can be reused repeatedly and rapidly, unlike most physical assets. Our digital presence continues to increase. This means that the digital attack surface area also continues to increase. Taking a holistic approach to establishing digital trust requires evaluating leading technologies (for example, face recognition as a login credential), implementing processes and building a culture in our ecosystem that considers digital trust as a fundamental pillar of modern society. 267 Zetter, K.: Hackers Finally Post Stolen Ashley Madison Data, Wired, 2015.

6 382 Guest Authors Mamoon Yunus is visionary in API, cloud and XML-based technologies. As the founder of Forum Systems, Yunus pioneered API Security Gateways and Firewalls with the only granted patent for XML network appliances. For over 15 years, he has spearheaded award-winning API and XML security products. Yunus holds two graduate degrees in engineering from MIT and a BSME from Georgia Institute of Technology. Yunus enjoys playing squash and running computations on GPUs.

Lecture 7 Ethics, Privacy, and Politics in the Age of Data

Lecture 7 Ethics, Privacy, and Politics in the Age of Data Lecture 7 Ethics, Privacy, and Politics in the Age of Data Module Roadmap Representation Technologies Digital workplaces Ethics, Privacy and Politics Digital Workplaces and Capitalist Accumulation tbc

More information

Running head: THE IMPACT OF COMPUTER ENGINEERING 1

Running head: THE IMPACT OF COMPUTER ENGINEERING 1 Running head: THE IMPACT OF COMPUTER ENGINEERING 1 The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015 THE IMPACT OF COMPUTER ENGINEERING 2 Abstract The purpose of this paper

More information

Our Corporate Strategy Digital

Our Corporate Strategy Digital Our Corporate Strategy Digital Proposed Content for Discussion 9 May 2016 CLASSIFIED IN CONFIDENCE INLAND REVENUE HIGHLY PROTECTED Draft v0.2a 1 Digital: Executive Summary What is our strategic digital

More information

Digital Identity Innovation Canada s Opportunity to Lead the World. Digital ID and Authentication Council of Canada Pre-Budget Submission

Digital Identity Innovation Canada s Opportunity to Lead the World. Digital ID and Authentication Council of Canada Pre-Budget Submission Digital Identity Innovation Canada s Opportunity to Lead the World Digital ID and Authentication Council of Canada Pre-Budget Submission August 4, 2017 Canadian governments, banks, telcos, healthcare providers

More information

Making Identity Use Predictable. UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016

Making Identity Use Predictable. UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016 Making Identity Use Predictable UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016 Why Am I Here CertiPath High Assurance Identity Trust Framework Supports Aerospace and Defense

More information

Personal Data Protection Competency Framework for School Students. Intended to help Educators

Personal Data Protection Competency Framework for School Students. Intended to help Educators Conférence INTERNATIONAL internationale CONFERENCE des OF PRIVACY commissaires AND DATA à la protection PROTECTION des données COMMISSIONERS et à la vie privée Personal Data Protection Competency Framework

More information

MSc(CompSc) List of courses offered in

MSc(CompSc) List of courses offered in Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The

More information

The global leader in trusted identities for an increasingly digital world. Press kit September, 28 th 2017

The global leader in trusted identities for an increasingly digital world. Press kit September, 28 th 2017 The global leader in trusted identities for an increasingly digital world Press kit September, 28 th 2017 2 FOREWORD Foreword by Didier Lamouche, Chief Executive Officer I am pleased and proud to present

More information

Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability

Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability Legal Week s Corporate Counsel Forum 2016 Renaissance Harbour View Hotel 23 June 2016 Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability Stephen Kai-yi Wong Privacy

More information

Session 1, Part 2: Emerging issues in e-commerce Australian experiences of privacy and consumer protection regulation

Session 1, Part 2: Emerging issues in e-commerce Australian experiences of privacy and consumer protection regulation 2013/ SOM3/CTI/WKSP1/007 Australian Experiences of Privacy and Consumer Protection Regulation Submitted by: Australia Workshop on Building and Enhancing FTA Negotiation Skills on e-commerce Medan, Indonesia

More information

Innovation and Technology Law Curriculum

Innovation and Technology Law Curriculum Innovation and Technology Law Curriculum Core Courses FOUNDATIONS OF PRIVACY LAW (FALL 2016) This course explores the principles of privacy law in relation to the affairs of government, non-government

More information

Presentation Outline

Presentation Outline Functional requirements for privacy enhancing systems Fred Carter Senior Policy & Technology Advisor Office of the Information & Privacy Commissioner / Ontario, Canada OECD Workshop on Digital Identity

More information

The Case for ISO27001:2013

The Case for ISO27001:2013 The Case for ISO27001:2013 Second edition ALAN CALDER Every possible effort has been made to ensure that the information contained in this book is accurate at the time of going to press, and the publisher

More information

CURRENSEE INITIAL GOLD BACKED COIN OFFERING

CURRENSEE INITIAL GOLD BACKED COIN OFFERING WHITE PAPER www.currensee.io CURRENSEE INITIAL GOLD BACKED COIN OFFERING 01 Currensee Initial Gold Backed Table Of Contents Introduction 02 Future of Cryptocurrencies 03 Gold on the Blockchain 04 Why CURRENSEE?

More information

BLOCKCHAIN FOR SOCIAL GOOD. November 9, 2017 Dr. Cara LaPointe

BLOCKCHAIN FOR SOCIAL GOOD. November 9, 2017 Dr. Cara LaPointe BLOCKCHAIN FOR SOCIAL GOOD November 9, 2017 Dr. Cara LaPointe What is the Blockchain for Social Good project? 3 Building a Framework Around Privacy & Ethics 4 Approach Build Community Understand the Challenges

More information

Boao Forum for Asia Annual Conference

Boao Forum for Asia Annual Conference Boao Forum for Asia Annual Conference Summary (No. 3) Boao Forum for Asia Institute March 23rd, 2017 Session Two FinTech: How will it change Finance? Time: 1:35 p.m. to 2:46 p.m., March 23rd, 2017 Venue:

More information

Course Form for PKU Summer School International 2019

Course Form for PKU Summer School International 2019 Course Form for PKU Summer School International 2019 Course Title The Social Implications of Computing Teacher Josh Hug First day of classes July 15, 2019 Last day of classes July 26, 2019 Course Credit

More information

Gartner s Top 10 Strategic Technology Trends for 2018

Gartner s Top 10 Strategic Technology Trends for 2018 Gartner s Top 10 Strategic Technology Trends for 2018 How do designers make cars safer? They treat them like a school of fish. Safe Swarm, recently unveiled by Honda, uses vehicle-to-vehicle communication

More information

Privacy. New technologies, same responsibilities. Carole Fleeman Office of the Victorian Privacy Commissioner

Privacy. New technologies, same responsibilities. Carole Fleeman Office of the Victorian Privacy Commissioner Privacy New technologies, same responsibilities Carole Fleeman Office of the Victorian Privacy Commissioner Victorian privacy regulators Office of the Victorian Privacy Commissioner (Privacy Victoria)

More information

Empowering People: How Artificial Intelligence is 07changing our world

Empowering People: How Artificial Intelligence is 07changing our world Empowering People: How Artificial Intelligence is 07changing our world The digital revolution is democratizing societal change, evolving human progress by helping people & organizations innovate in ways

More information

Managing Technology Risks Through Technological Proficiency A Leadership Summary

Managing Technology Risks Through Technological Proficiency A Leadership Summary Managing Technology Risks Through Technological Proficiency A Leadership Summary Research and Guidance for Local Governments to Understand and Address the Risks Presented by Contemporary Technology Prepared

More information

RBI Working Group report on FinTech: Key themes

RBI Working Group report on FinTech: Key themes www.pwc.in RBI Working Group report on FinTech: Key themes April 2018 Ten key themes: 1 2 3 4 5 6 7 8 9 10 Need for deeper understanding of Fintech and inherent risks Regulatory supervision, realignment

More information

INTRODUCTION. The 2015 Brookings Blum Roundtable was convened to explore how digital technologies might disrupt global development.

INTRODUCTION. The 2015 Brookings Blum Roundtable was convened to explore how digital technologies might disrupt global development. INTRODUCTION The 2015 Brookings Blum Roundtable was convened to explore how digital technologies might disrupt global development. Our intention was to imagine a world 10 years from now where digital technologies

More information

Committee on the Internal Market and Consumer Protection. of the Committee on the Internal Market and Consumer Protection

Committee on the Internal Market and Consumer Protection. of the Committee on the Internal Market and Consumer Protection European Parliament 2014-2019 Committee on the Internal Market and Consumer Protection 2018/2088(INI) 7.12.2018 OPINION of the Committee on the Internal Market and Consumer Protection for the Committee

More information

How do you teach AI the value of trust?

How do you teach AI the value of trust? How do you teach AI the value of trust? AI is different from traditional IT systems and brings with it a new set of opportunities and risks. To build trust in AI organizations will need to go beyond monitoring

More information

GLOBAL RISK AND INVESTIGATIONS JAPAN CAPABILITY STATEMENT

GLOBAL RISK AND INVESTIGATIONS JAPAN CAPABILITY STATEMENT GLOBAL RISK AND INVESTIGATIONS JAPAN CAPABILITY STATEMENT CRITICAL THINKING AT THE CRITICAL TIME ABOUT US The Global Risk and Investigations Practice (GRIP) of FTI Consulting is the leading provider of

More information

Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the

Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the U. S. Senate Committee on Commerce, Science, and Transportation Subcommittee

More information

Ethics and technology

Ethics and technology Professional accountants the future: Ethics and technology International Ethics Standards Board for Accountants (IESBA) 19 June 2018 Agenda ACCA Professional Insights (PI) and technology Technology impact

More information

HashCash in Gaming. Gaming is now more Exciting with HC Net Blockchain. HashCash Consultants All Rights Reserved HashCash Gaming

HashCash in Gaming. Gaming is now more Exciting with HC Net Blockchain. HashCash Consultants All Rights Reserved HashCash Gaming HashCash in Gaming Gaming is now more Exciting with HC Net Blockchain HashCash Consultants All Rights Reserved HashCash Gaming AN OVERVIEW CURRENT GAMING INDUSTRY The computer and video game industry has

More information

(Beijing, China,25 May2017)

(Beijing, China,25 May2017) Remarks by the Secretary General of the International Civil Aviation Organization (ICAO), Dr. Fang Liu, to the First Session of the 2017 China Civil Aviation Development Forum: New Opportunities for Aviation

More information

Digital Transformation. A Game Changer. How Does the Digital Transformation Affect Informatics as a Scientific Discipline?

Digital Transformation. A Game Changer. How Does the Digital Transformation Affect Informatics as a Scientific Discipline? Digital Transformation A Game Changer How Does the Digital Transformation Affect Informatics as a Scientific Discipline? Manfred Broy Technische Universität München Institut for Informatics ... the change

More information

Eastern Bank Challenges the Status Quo in Bank Lending by Implementing the DocuSign esignature API to Digitize Processes

Eastern Bank Challenges the Status Quo in Bank Lending by Implementing the DocuSign esignature API to Digitize Processes Eastern Bank Challenges the Status Quo in Bank Lending by Implementing the DocuSign esignature API to Digitize Processes Implementing a digital transaction strategy was a huge win for Eastern Bank. It

More information

MEDIA AND INFORMATION

MEDIA AND INFORMATION MEDIA AND INFORMATION MI Department of Media and Information College of Communication Arts and Sciences 101 Understanding Media and Information Fall, Spring, Summer. 3(3-0) SA: TC 100, TC 110, TC 101 Critique

More information

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use: Executive Summary Artificial Intelligence (AI) is a suite of technologies capable of learning, reasoning, adapting, and performing tasks in ways inspired by the human mind. With access to data and the

More information

Running head: ETHICS, TECHNOLOGY, SUSTAINABILITY AND SOCIAL ISSUES 1. Ethics, Technology, Sustainability and Social Issues in Business.

Running head: ETHICS, TECHNOLOGY, SUSTAINABILITY AND SOCIAL ISSUES 1. Ethics, Technology, Sustainability and Social Issues in Business. Running head: ETHICS, TECHNOLOGY, SUSTAINABILITY AND SOCIAL ISSUES 1 Ethics, Technology, Sustainability and Social Issues in Business Name Institutional Affiliation ETHICS, TECHNOLOGY, SUSTAINABILITY AND

More information

Global Standards Symposium. Security, privacy and trust in standardisation. ICDPPC Chair John Edwards. 24 October 2016

Global Standards Symposium. Security, privacy and trust in standardisation. ICDPPC Chair John Edwards. 24 October 2016 Global Standards Symposium Security, privacy and trust in standardisation ICDPPC Chair John Edwards 24 October 2016 CANCUN DECLARATION At the OECD Ministerial Meeting on the Digital Economy in Cancun in

More information

Written response to the public consultation on the European Commission Green Paper: From

Written response to the public consultation on the European Commission Green Paper: From EABIS THE ACADEMY OF BUSINESS IN SOCIETY POSITION PAPER: THE EUROPEAN UNION S COMMON STRATEGIC FRAMEWORK FOR FUTURE RESEARCH AND INNOVATION FUNDING Written response to the public consultation on the European

More information

Sustainable Society Network+ Research Call

Sustainable Society Network+ Research Call Sustainable Society Network+ Research Call Call for Pilot Studies and Challenge Fellowships Closing date: 17:00 on 31 st October2012 Summary Applicants are invited to apply for short- term pilot study

More information

Privacy and Security in an On Demand World

Privacy and Security in an On Demand World Privacy and Security in an On Demand World Harriet Pearson, V.P. Workforce & Chief Privacy Officer IBM Corporation Almaden Institute Symposium on Privacy April 9, 2003 2002 IBM Corporation Outline Where

More information

INTERNET OF THINGS IOT ISTD INFORMATION SYSTEMS TECHNOLOGY AND DESIGN

INTERNET OF THINGS IOT ISTD INFORMATION SYSTEMS TECHNOLOGY AND DESIGN INTERNET OF THINGS IOT ISTD INFORMATION SYSTEMS TECHNOLOGY AND DESIGN PILLAR OVERVIEW The Information Systems Technology and Design (ISTD) pillar focuses on information and computing technologies, and

More information

Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain

Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain This fiche is part of the wider roadmap for cross-cutting KETs activities Potential areas of industrial interest relevant for cross-cutting KETs in the Electronics and Communication Systems domain Cross-cutting

More information

Legal Aspects of Identity Management and Trust Services

Legal Aspects of Identity Management and Trust Services Legal Aspects of Identity Management and Trust Services Anna Joubin-Bret Secretary What is Identity Management (IdM)? Fundamental issue for the use of electronic means Answers the basic questions: Who

More information

WHY FLUENCY IN VALUES MATTERS AT SCHOOL. by ROSEMARY DEWAN, CEO Human Values Foundation

WHY FLUENCY IN VALUES MATTERS AT SCHOOL. by ROSEMARY DEWAN, CEO Human Values Foundation WHY FLUENCY IN VALUES MATTERS AT SCHOOL by ROSEMARY DEWAN, CEO Human Values Foundation rosemary.dewan@hvf.org.uk In pursuit of a better world The theme of this conference is: Why Values Matter The Power

More information

Designing for Older Adults

Designing for Older Adults Designing for Older Adults Overcoming Barriers toward a Supportive, Safe, and Healthy Retirement Cosmin Munteanu Institute of Communication, Culture, Information, and Technology University of Toronto Mississauga

More information

LAB3-R04 A Hard Privacy Impact Assessment. Post conference summary

LAB3-R04 A Hard Privacy Impact Assessment. Post conference summary LAB3-R04 A Hard Privacy Impact Assessment Post conference summary John Elliott Joanne Furtsch @withoutfire @PrivacyGeek Table of Contents THANK YOU... 3 WHAT IS PRIVACY?... 3 The European Perspective...

More information

PROGRAM CONCEPT NOTE Theme: Identity Ecosystems for Service Delivery

PROGRAM CONCEPT NOTE Theme: Identity Ecosystems for Service Delivery PROGRAM CONCEPT NOTE Theme: Identity Ecosystems for Service Delivery Program Structure for the 2019 ANNUAL MEETING DAY 1 PS0 8:30-9:30 Opening Ceremony Opening Ceremony & Plenaries N0 9:30-10:30 OPENING

More information

Towards a Magna Carta for Data

Towards a Magna Carta for Data Towards a Magna Carta for Data Expert Opinion Piece: Engineering and Computer Science Committee February 2017 Expert Opinion Piece: Engineering and Computer Science Committee Context Big Data is a frontier

More information

2 LEADING IN THE NEW IN PUBLIC SAFETY

2 LEADING IN THE NEW IN PUBLIC SAFETY Disruption is creating a new operating environment for public safety agencies: new threats, a need to identify, risk and harm from volume, meet increasing citizen expectation, to create new ecosystems,

More information

Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009

Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009 Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009 1 Today s presentation Databases solving one problem & creating another What is a privacy impact

More information

Encouraging Economic Growth in the Digital Age A POLICY CHECKLIST FOR THE GLOBAL DIGITAL ECONOMY

Encouraging Economic Growth in the Digital Age A POLICY CHECKLIST FOR THE GLOBAL DIGITAL ECONOMY Encouraging Economic Growth in the Digital Age A POLICY CHECKLIST FOR THE GLOBAL DIGITAL ECONOMY The Internet is changing the way that individuals launch businesses, established companies function, and

More information

Enabling ICT for. development

Enabling ICT for. development Enabling ICT for development Interview with Dr M-H Carolyn Nguyen, who explains why governments need to start thinking seriously about how to leverage ICT for their development goals, and why an appropriate

More information

HARNESSING TECHNOLOGY

HARNESSING TECHNOLOGY HARNESSING TECHNOLOGY TO TRANSFORM PUBLIC SERVICE DELIVERY AND OUTCOMES ACCENTURE PUBLIC SERVICE TECHNOLOGY CONSULTING Remember when public service organizations viewed IT as a cost center separate from

More information

Front Digital page Strategy and leadership

Front Digital page Strategy and leadership Front Digital page Strategy and leadership Who am I? Prof. Dr. Bob de Wit What concerns me? - How to best lead a firm - How to design the strategy process - How to best govern a country - How to adapt

More information

Human + Machine How AI is Radically Transforming and Augmenting Lives and Businesses Are You Ready?

Human + Machine How AI is Radically Transforming and Augmenting Lives and Businesses Are You Ready? Human + Machine How AI is Radically Transforming and Augmenting Lives and Businesses Are You Ready? Xavier Anglada Managing Director Accenture Digital Lead in MENA and Turkey @xavianglada TM Forum 1 Meet

More information

ENGINEERING COUNCIL. GUIDANCE ON SUSTAINABILITY for the Engineering Profession.

ENGINEERING COUNCIL. GUIDANCE ON SUSTAINABILITY for the Engineering Profession. ENGINEERING COUNCIL GUIDANCE ON SUSTAINABILITY for the Engineering Profession www.engc.org.uk/sustainability This guidance describes the role of professional engineers in sustainability. It lists six principles

More information

Xena Exchange Users Agreement

Xena Exchange Users Agreement Xena Exchange Users Agreement Last Updated: April 12, 2018 1. Introduction Xena Exchange welcomes You ( User ) to use Xena Exchange s online software ( Xena s Software ) described herein in accordance

More information

The Blockchain Ethical Design Framework

The Blockchain Ethical Design Framework The Blockchain Ethical Design Framework September 19, 2018 Dr. Cara LaPointe Senior Fellow Georgetown University Beeck Center for Social Impact + Innovation The Blockchain Ethical Design Framework Driving

More information

Digital transformation in the Catalan public administrations

Digital transformation in the Catalan public administrations Digital transformation in the Catalan public administrations Joan Ramon Marsal, Coordinator of the National Agreement for the Digital Society egovernment Working Group. Government of Catalonia Josep Lluís

More information

ZoneFox Augmented Intelligence (A.I.)

ZoneFox Augmented Intelligence (A.I.) WHITEPAPER ZoneFox Augmented Intelligence (A.I.) Empowering the Super-Human Element in Your Security Team Introduction In 1997 Gary Kasperov, the chess Grandmaster, was beaten by a computer. Deep Blue,

More information

The 8 step plan to build a digital culture. Martin Talks

The 8 step plan to build a digital culture. Martin Talks The 8 step plan to build a digital culture Martin Talks Introduction The key to driving digital transformation is culture. And that s where many businesses fail. This report outlines the essential steps

More information

AIMICT.ORG AIMICT Newsletter

AIMICT.ORG AIMICT Newsletter SEPTEMBER 2018 AIMICT.ORG 1 IN THIS ISSUE AIMICT Conducts ISO 9001 Lead Auditor Course AIMICT Conducts ILM s Training of Trainers Program in Irbid AIMICT Organizes Professional Quality Manager Program

More information

VON DER VISION ZUR WIRKLICHKEIT PLATTFORMEN UND LÖSUNGEN FÜR DAS INTERNET DER DINGE. Dr.-Ing. Rainer Kallenbach CEO Bosch Software Innovations GmbH

VON DER VISION ZUR WIRKLICHKEIT PLATTFORMEN UND LÖSUNGEN FÜR DAS INTERNET DER DINGE. Dr.-Ing. Rainer Kallenbach CEO Bosch Software Innovations GmbH VON DER VISION ZUR WIRKLICHKEIT PLATTFORMEN UND LÖSUNGEN FÜR DAS INTERNET DER DINGE Dr.-Ing. Rainer Kallenbach CEO Bosch Software Innovations GmbH Bosch Group: Technology to enhance quality of life Four

More information

Federal Trade Commission Address. Delivered 12 January 2015, Constitution Center, Washington, D.C.

Federal Trade Commission Address. Delivered 12 January 2015, Constitution Center, Washington, D.C. Barack Obama Federal Trade Commission Address Delivered 12 January 2015, Constitution Center, Washington, D.C. AUTHENTICITY CERTIFIED: Text version below transcribed directly from audio Thank you so much.

More information

How Connected Mobility Technology Is Driving The Future Of The Automotive Industry

How Connected Mobility Technology Is Driving The Future Of The Automotive Industry How Connected Mobility Technology Is Driving The Future Of The Automotive Industry After over 20 years of advances in the world of mobile connectivity, big data and social networks, technology is now rapidly

More information

The Value of Membership.

The Value of Membership. The Value of Membership. Driving the global transformation to a smarter, more sustainable world with digital solutions at its core. 2018 gesi.org Information and Communications Technology (ICT) innovators

More information

Scott Klososky Phillip Seawright. Smart Cities: Risks & Real Opportunities

Scott Klososky Phillip Seawright. Smart Cities: Risks & Real Opportunities Scott Klososky Phillip Seawright Smart Cities: Risks & Real Opportunities Like it or not, technology has become the jugular vein of the organization Mike Foster Digital Transformation 2000 to 2050 A historically

More information

IBM Security: Future of Identity Study

IBM Security: Future of Identity Study IBM Security: Future of Identity Study Consumer perspectives on : Moving beyond the password Click here to start 1 2 The concept of granting digital access to users based on proper identification has been

More information

CHARTER PACIFIC SIGNS SHARE PURCHASE AGREEMENT TO ACQUIRE 100% OF THE MICROLATCH GROUP

CHARTER PACIFIC SIGNS SHARE PURCHASE AGREEMENT TO ACQUIRE 100% OF THE MICROLATCH GROUP 7 October 2016 Australian Securities Exchange Limited Sydney CHARTER PACIFIC SIGNS SHARE PURCHASE AGREEMENT TO ACQUIRE 100% OF THE MICROLATCH GROUP The Directors of Charter Pacific Corporation Limited

More information

DON T LET WORDS GET IN THE WAY

DON T LET WORDS GET IN THE WAY HUMAN EXPERIENCE 1 DON T LET WORDS GET IN THE WAY ustwo is growing, so it s about time we captured and put down on paper our core beliefs and values, whilst highlighting some priority areas that we d like

More information

ibeacon Spoofing Security and Privacy Implications of ibeacon Technology Karan Singhal

ibeacon Spoofing Security and Privacy Implications of ibeacon Technology Karan Singhal ibeacon Spoofing Security and Privacy Implications of ibeacon Technology Karan Singhal ABSTRACT Apple introduced ibeacons with ios 7, revolutionizing the way our phones interact with real- life places

More information

Communication and dissemination strategy

Communication and dissemination strategy Communication and dissemination strategy 2016-2020 Communication and dissemination strategy 2016 2020 Communication and dissemination strategy 2016-2020 Published by Statistics Denmark September 2016 Photo:

More information

Book Review: The dotcrime Manifesto: How to Stop Internet Crime

Book Review: The dotcrime Manifesto: How to Stop Internet Crime Publications 2008 Book Review: The dotcrime Manifesto: How to Stop Internet Crime Gary C. Kessler Champlain College - Burlington, kessleg1@erau.edu Follow this and additional works at: https://commons.erau.edu/publication

More information

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT Abstract This report brings together the final papers presented by the students in the Frontiers in Information

More information

Slide 25 Advantages and disadvantages of patenting

Slide 25 Advantages and disadvantages of patenting Slide 25 Advantages and disadvantages of patenting Patent owners can exclude others from using their inventions. If the invention relates to a product or process feature, this may mean competitors cannot

More information

2015 ISACA IT Risk/Reward Barometer US Consumer Results. October 2015

2015 ISACA IT Risk/Reward Barometer US Consumer Results. October 2015 2015 ISACA IT Risk/Reward Barometer US Consumer Results October 2015 www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org 1. Which of the following

More information

2015 ISACA IT Risk/Reward Barometer UK Consumer Results. October

2015 ISACA IT Risk/Reward Barometer UK Consumer Results. October 2015 ISACA IT Risk/Reward Barometer UK Consumer Results October 2015 www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org 1. Which of the following

More information

2015 ISACA IT Risk/Reward Barometer Australia Consumer Results. October

2015 ISACA IT Risk/Reward Barometer Australia Consumer Results. October 2015 ISACA IT Risk/Reward Barometer Australia Consumer Results October 2015 www.isaca.org/risk-reward-barometer Media Inquiries: Kristen Kessinger, ISACA, +1.847.660.5512, news@isaca.org 1. Which of the

More information

Stanford Blockchain Protocol Analysis and Security Engineering 2018 Introduction & Overview

Stanford Blockchain Protocol Analysis and Security Engineering 2018 Introduction & Overview Stanford Blockchain Protocol Analysis and Security Engineering 2018 Introduction & Overview Byron Gibson https://cyber.stanford.edu/bpase18 1 of 5 Contents Contents 2 I. Introduction & Overview 3 What

More information

Masterclass on GDPR Compliance

Masterclass on GDPR Compliance Masterclass on GDPR Compliance UNDERSTAND COMPLY PROTECT Presenters: AMRUT JOSHI Founder, GameChanger Law Advisors ADITYA SHAMLAL Partner, GameChanger Law Advisors Webinar conducted by GameChanger Law

More information

Big data: a complex and evolving regulatory framework

Big data: a complex and evolving regulatory framework Digital Transformation Monitor Big data: a complex and evolving regulatory framework January 2017 Internal Market, Industry, Entrepreneurship and SMEs 7 Big data: a complex and evolving regulatory framework

More information

The Citizen View of Government Digital Transformation 2017 Findings

The Citizen View of Government Digital Transformation 2017 Findings WHITE PAPER The Citizen View of Government Digital Transformation 2017 Findings Delivering Transformation. Together. Shining a light on digital public services Digital technologies are fundamentally changing

More information

ICO submission to the inquiry of the House of Lords Select Committee on Communications - The Internet : To Regulate or not to Regulate?

ICO submission to the inquiry of the House of Lords Select Committee on Communications - The Internet : To Regulate or not to Regulate? Information Commissioner s Office ICO submission to the inquiry of the House of Lords Select Committee on Communications - The Internet : To Regulate or not to Regulate? 16 May 2018 V. 1.0 Final 1 Contents

More information

Open Infinite Intelligence in a trusted Ecology. Open Infinite Intelligence in a trusted Ecology and. Share Value With Users

Open Infinite Intelligence in a trusted Ecology. Open Infinite Intelligence in a trusted Ecology and. Share Value With Users Open Infinite Intelligence in a trusted Ecology and Share Value With Users 1.Blockchain leads to a new era of intelligent digital economy...1 1.1. Design ideas at the economic level... 2 1.2.Design ideas

More information

Privacy, Technology and Economics in the 5G Environment

Privacy, Technology and Economics in the 5G Environment Privacy, Technology and Economics in the 5G Environment S A M A N T K H A J U R I A A S S I S T P R O F E S S O R, C M I K N U D E R I K S K O U B Y P R O F E S S O R, D I R E C T O R C M I S K O U B Y

More information

Introduction to Computer Science - PLTW #9340

Introduction to Computer Science - PLTW #9340 Introduction to Computer Science - PLTW #9340 Description Designed to be the first computer science course for students who have never programmed before, Introduction to Computer Science (ICS) is an optional

More information

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase Term Paper Sample Topics Your topic does not have to come from this list. These are suggestions.

More information

STEERING FINTECH FOR A PROSPEROUS SOCIETY

STEERING FINTECH FOR A PROSPEROUS SOCIETY STEERING FINTECH FOR A PROSPEROUS SOCIETY Introduction [Modem Connecting Sound] Ladies and Gentlemen, if you are 30 years old or younger, by a show of hands, how many of you have heard that sound before?

More information

Assessing the socioeconomic. public R&D. A review on the state of the art, and current work at the OECD. Beñat Bilbao-Osorio Paris, 11 June 2008

Assessing the socioeconomic. public R&D. A review on the state of the art, and current work at the OECD. Beñat Bilbao-Osorio Paris, 11 June 2008 Assessing the socioeconomic impacts of public R&D A review on the state of the art, and current work at the OECD Beñat Bilbao-Osorio Paris, 11 June 2008 Public R&D and innovation Public R&D plays a crucial

More information

Outdoing Huxley: Forging a high level of data protection for Europe in the brave new digital world

Outdoing Huxley: Forging a high level of data protection for Europe in the brave new digital world SPEECH/ Viviane Reding Vice-President of the European Commission, EU Justice Commissioner Outdoing Huxley: Forging a high level of data protection for Europe in the brave new digital world Digital Enlightenment

More information

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER

IAB Europe Guidance THE DEFINITION OF PERSONAL DATA. IAB Europe GDPR Implementation Working Group WHITE PAPER IAB Europe Guidance WHITE PAPER THE DEFINITION OF PERSONAL DATA Five Practical Steps to help companies comply with the E-Privacy Working Directive Paper 02/2017 IAB Europe GDPR Implementation Working Group

More information

A Roadmap for Connected & Autonomous Vehicles. David Skipp Ford Motor Company

A Roadmap for Connected & Autonomous Vehicles. David Skipp Ford Motor Company A Roadmap for Connected & Autonomous Vehicles David Skipp Ford Motor Company ! Why does an Autonomous Vehicle need a roadmap? Where might the roadmap take us? What should we focus on next? Why does an

More information

Security services play a key role in digital transformation for higher education

Security services play a key role in digital transformation for higher education Security services play a key role in digital transformation for higher education Publication Date: 27 Jun 2016 Product code: IT0008-000274 Nicole Engelbert Ovum view Summary Securing institutional assets

More information

2013 IT Risk/Reward Barometer: Asia-Pacific Results. October Unless otherwise noted, n = 343

2013 IT Risk/Reward Barometer: Asia-Pacific Results. October Unless otherwise noted, n = 343 2013 IT Risk/Reward Barometer: Asia-Pacific Results October 2013 www.isaca.org/risk-reward-barometer Unless otherwise noted, n = 343 Respondents are business and IT professionals from the Asia-Pacific

More information

Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.

Notes from a seminar on Tackling Public Sector Fraud presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Tackling Public Sector Fraud Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Glenis Bevan audit Manager, Audit

More information

Joint Research Centre. The European Commission s in-house science service

Joint Research Centre. The European Commission s in-house science service Joint Research Centre The European Commission s in-house science service 1 Digital Games for Empowerment & Inclusion (DGEI) DGEI Policy Workshop, 24 September 2012, Brussels Shaping DGEI: video games,

More information

250 Introduction to Applied Programming Fall. 3(2-2) Creation of software that responds to user input. Introduces

250 Introduction to Applied Programming Fall. 3(2-2) Creation of software that responds to user input. Introduces MEDIA AND INFORMATION MI Department of Media and Information College of Communication Arts and Sciences 101 Understanding Media and Information Fall, Spring, Summer. 3(3-0) SA: TC 100, TC 110, TC 101 Critique

More information

Game Rules Algorithmic rules, Games of Emergence and Progression. Prof. Jim Whitehead CMPS 80K, Winter 2006 January 26, 2006

Game Rules Algorithmic rules, Games of Emergence and Progression. Prof. Jim Whitehead CMPS 80K, Winter 2006 January 26, 2006 Game Rules Algorithmic rules, Games of Emergence and Progression Prof. Jim Whitehead CMPS 80K, Winter 2006 January 26, 2006 Highlights from the Microsoft Academic Gaming Workshop Second Life (http://secondlife.com/)

More information

Challenging the Situational Awareness on the Sea from Sensors to Analytics. Programme Overview

Challenging the Situational Awareness on the Sea from Sensors to Analytics. Programme Overview Challenging the Situational Awareness on the Sea from Sensors to Analytics New technologies for data gathering, dissemination, sharing and analytics in the Mediterranean theatre Programme Overview The

More information

Heriot-Watt University

Heriot-Watt University Heriot-Watt University Heriot-Watt University Research Gateway An Analysis of Currency of Computer Science Student Dissertation Topics in Higher Education Jehoshaphat, Ijagbemi Kolawole; Taylor, Nicholas

More information

Front Digital page Strategy and Leadership

Front Digital page Strategy and Leadership Front Digital page Strategy and Leadership Who am I? Prof. Dr. Bob de Wit What concerns me? - How to best lead a firm - How to design the strategy process - How to best govern a country - How to adapt

More information