Knowledge Library
Search our Knowledge Library for our latest contributions to research and industry
0
Items in the knowledge Library
What does it mean to adopt a sociotech approach to design and develop AI solutions aimed at tackling complex societal ch…
The extra-territorial effect of the GDPR (both EU and UK) provides that the rules protecting personal data in the EU app…
In traditional media, journalists have received training and need to follow specific standards of accuracy and reliability and a code of ethics. On social media, the information is…
Knowledge Library
Posts
It’s rare that a month goes by without a significant hacking incident or ransomware attack entering the public domain. A…
23/09/22
Posts
Public authorities in the England and Wales have a statutory duty to notify the Home Office when they come across potent…
20/09/22
Publications
The role of human factors in cybersecurity has gained increasing interest in the past decade. Social science research me…
19/09/22
Posts
The Honeycomb project, commissioned by Greater Manchester Combined Authority, focuses on using data to illuminate insigh…
14/09/22
Posts
Contemporary discussions on modern slavery tie in with ethical discourse and normative considerations. Modern slavery ha…
08/09/22
Posts
On July 18, 2022, the U.K. government introduced the Draft Data Protection and Digital Information Bill (hereafter refer…
23/08/22
Posts
On the 27th of July the Department of Justice announced that the Government had approved the expansion of the Data Prote…
23/08/22
Posts
Earlier this month, a case referred by the Regional Administrative Court of Lithuania to the CJEU OT v Vyriausioji …
19/08/22
Posts
The European Data Protection Supervisor (EDPS) recently issued an opinion on the European Commission’s proposal for a Re…
19/08/22
Publications
Decentralised architectures and networks are slowly embedding themselves into the technological and societal landscape, …
03/08/22
Posts
The Proposed European Commission Proposal for Cybersecurity Regulation lays down measures for a high common level of cyb…
29/07/22
Posts
After the Court of Justice of the European Union’s (CJEU) decision regarding Privacy Shield (Schrems II) the CNIL, on 10…
29/07/22
Posts
On 2nd–3rd June, ENISA held the 2022 edition of its Cybersecurity Certification Conference. The conference focused on…
29/07/22
Posts
The cyber-attack on the Irish Health Service Executive (HSE) in 2021 brought cybersecurity into sharp focus, particularl…
29/07/22
Posts
Protecting privacy and digital security are becoming increasingly important in everyday life. A lack of trust in softwar…
08/07/22
Posts
How to deal with Processors: Facts and hints to do it in an efficient way Data controllers must consider the manageme…
30/06/22