Pages
- About Us
- Careers
- Climate, Environment & Energy
- Crisis and Security
- Cybersecurity Research
- Ethics, Human Rights and Emerging Technologies
- Health
- Honeycomb [Review]
- Innovation And Research
- irecs
- Law Enforcement & Community Safeguarding
- Test
- Ethics Innovation
- Sociotech Insights
- Air Quality
- Honeycomb
- Ethical AI Solutions
- HAMOC
- Cesium Application
- STRIAD Analytics Platform
- Data Protection
- Cyber Security
- Home
- PestNu2022
- Company News
- Knowledge Library
- Honeycomb
- Sitemap
- Projects
- Publications
- Cookie Policy
- Accessibility
- Privacy Policy
- Legal notice
- Contact Us
- Healthcare Cybersecurity
Posts by category
- Category: Artificial Intelligence
- AI Liability Twin Directives: European Commissions Attempt to make AI Tech Consumer Oriented
- Project Iron – Organised crime group mapping
- What Are The Risks Of Not Sharing Data For Safeguarding Children?
- CESIUM shines a light on the hidden exploitation of children
- Webinar: What is the Role of Ethical AI in Safeguarding Children? A CESIUM Case Study.
- Ensuring ethical research in a multi partner project
- Category: Company
- Category: Data Governance Insights
- ICO opts for public reprimands rather than fines for UK public sector. What are the implications for compliance?
- The ICO’s Transfer Risk Assessment and How it works in Practice
- “Data scraping” investigation results in €265m data protection fine for Meta
- Digital Services Act: A First Step in Regulating the Online Environment
- When is a data breach notifiable to the Supervisory Authority?
- Publishing house fined for data security violation under the GDPR
- First step into Irish clinical trials or refining your process? Key data protection considerations
- Transatlantic Data Privacy Framework a Step Closer – What Next?
- How to plan, deliver and maintain a robust Record of Processing Activities project
- Action taken by the ICO for failures relating to Subject Access Requests (SARs) and top tips to avoid caseload backlogs
- EDPB instructs Irish DPC to expand infringements against Instagram in €405M fine
- A Retention Schedule for your Organisation
- Ransomware Threat Landscape – Common access points and how to protect against attacks
- Draft UK Data Protection and Digital Information Bill
- Expansion of the Data Protection Commission
- Landmark CJEU judgment confirms broad interpretation of Special Category Data
- European Data Protection Supervisor insights on GI Regulation – Data Protection Recommendations
- Regulating Cybersecurity: The EDPS Opinion on the Proposal for a Regulating Cybersecurity and the Creation of a High Common Standard for EUIs (European Union Institutions)
- CNIL’s Decision on the Use of Google Analytics and Recommended Alternatives
- ENISA’s Cybersecurity Certification
- What the Public Sector Cyber Security Baseline Standards Mean for your Organisation
- How to deal with Processors: Facts and hints to do it in an efficient way
- The EDPS Annual Conference 2022: Trilateral’s involvement and key take-aways
- Article 30 Record Keeping – Know your data
- EDPS Opinion on Information Security Proposal
- Googles decides to make easier to Reject All
- The DPC’s new approach to addressing personal data breach notifications
- Highlights of the EDPS Annual Report (2021)
- European Commission launches proposal for a Regulation for the European Health Data Space (EHDS)
- ENISA Report on Deploying Pseudonymisation Techniques in the Health Sector
- EU-US Data Transfers – The Inception of Privacy Shield 2.0
- Transparency while processing Children’s personal data
- Analysing the human-factor aspects of cybersecurity
- EDPB issues new guidelines on Codes of Conduct as tools for transfers
- Greek DPA imposes its highest to date fine on Telecom Providers
- Annual Report by the Data Protection Commission – Trends and Forecasts
- The GoDaddy data breach
- The importance of an appropriate GDPR-focused Risk Assessment: Why Policies and Procedures are nothing without a clear program providing oversight and testing
- Data Protection Compliance 2022 Priorities – International Data Transfers
- How to Mitigate Data Breaches resulting from Human Error
- EDPB Launches Coordinated Enforcement Actions on the use of Cloud Services by European Institutions and National Public Authorities
- ICO and DPC Guidance Regarding Children’s Data and the Services aimed at Children
- Raising awareness as a first step towards change – the ENISA report
- The Way Forward Following the Demise of Third Party Cookies
- Processing personal data of vulnerable employees: lessons from the Spanish AEPD
- Fines, forensics, and hidden costs – the developing picture of GDPR infringements
- Privacy governance in action: Insights from the IAPP / EY Annual Privacy Governance Report 2021
- EDPB Adopts Guidelines for Restrictions on Data Subject Rights
- A Surfeit of Data and the Importance of Explainability for Defence
- The Responsible AI Forum 2021
- Regulating after the GDPR: Proposed changes to the role of the ICO
- Facial recognition technology as a measure to enhance public safety
- Transparency obligation and data controllers: enforcement across Europe
- Google’s DeepMind faces legal action over UK patient data use
- Data-driven technologies and the fight against child-exploitation: getting data protection right during development
- A lesson in transparency leads to a record fine under the GDPR for WhatsApp
- The UK is set to diverge from the GDPR
- GDPR fines may be susceptible to significant reductions upon appeal
- Transfer Impact Assessments: a new normal in international data protection?
- International Data Transfer Agreement to replace Standard Contractual Clauses for transfers outside the UK
- WhatsApp transmission of health data results in fine under the GDPR
- Direct marketing guidance for the public sector
- Using CCTV with Facial Recognition Technology in Public Spaces and Workplaces
- Failure to support the data protection officer contravenes the GDPR
- European Digital Identity Wallet
- CCTV leak of Hancock footage raises substantial data protection concerns
- Algorithms may provide steps leading to substantial breaches of the GDPR
- Data vulnerability for the public sector
- Mergers, acquisitions and data protection
- European Union Issues New Standard Contractual Clauses for Data Transfers Outside the EEA
- The ICO Children’s Code
- How to make your newsletter subscription offerings compliant with data protection requirements
- A retrospective on the GDPR
- “Dark patterns” and data protection compliance
- Clouds on the horizon for international transfers of personal data
- Return to the office and COVID-19 vaccination status
- Agreeing to share research data and biological material – factors to consider
- Preventing ransomware attacks
- Leveraging the value of healthcare data
- Schrems II: Using Mailchimp, SurveyMonkey and other popular US service providers
- The importance of precautionary data breach reporting: the Booking.com case study
- Trends from the 2020 Data Protection Commission Annual Report
- Five essential data protection improvements for hospitals
- Clubhouse, data protection and other international apps
- Understanding cyber-risk in the healthcare sector
- Facing up to biometric data
- What changes to expect in the ePrivacy Regulation
- The rise of GDPR-based compensation claims
- Digging deep: The picture beneath the data on human trafficking
- WhatsApp: Why you must get your privacy notice right
- Vaccine roll-out – challenges posed by the rollout of management systems
- The Carrefour case study – Common errors in data protection and cookie compliance
- Brexit and data protection – The path to EU / UK coordination
- The benefits of vulnerability scanning and penetration testing of information systems
- Conducting a needs analysis for access to electronic health records
- The importance of the Ethical and Privacy Impact Assessment Plus in the INGENIOUS project
- Post-Schrems II updates on international data transfers and draft SCCs
- The implications of new SCCs for data controllers
- Data protection in education during the COVID-19 pandemic
- Common challenges faced by organisations implementing compliant cookie processing
- Five things needed for compliant cookie processing
- Helping SMEs better cope with the GDPR
- Data protection and marketing: optimising your outreach activities
- Data governance and data protection compliance within the social enterprise, charity and the third-sector
- Revised CNIL cookie guidance – moving towards harmonisation?
- Fostering a data protection culture within universities and academic institutions
- How to keep COVID-19 temperature checks privacy compliant
- Preventing the exploitation of data in the healthcare sector
- Rights to privacy and data protection – Reiterating the basics and busting a few myths for managers
- National Security Certificates under the Data Protection Act 2018
- EDPB proposes new guidelines on controllers and processors
- How to implement a data retention policy
- DPO for clinical trials: Protect participants’ data privacy throughout the clinical trial lifecycle
- Avoiding phishing emails in the workplace
- Anti-Money Laundering, KYC and Data Protection
- The elephant in the room: international data transfers after the Schrems II decision
- Do you know what type of organisation you are doing business with?
- Ransomware attacks in healthcare on the rise
- Relying on public task as a lawful basis for data processing in Ireland
- Shedding light on biometric data processing
- Cyber Threats and Pandemics: Tackling Risk Through Shared Responsibility
- What is it like to participate in a Witness Seminar in the time of COVID-19?
- COVID-19 Returning to Work: Temperature Checks
- Supporting Absences of your DPO
- How to achieve GDPR-compliant anonymisation according to the French CNIL
- How to provide meaningful information about the logic involved in automated decisions
- Analysis of Microsoft Office 365 Data Protection Compliance
- Can new technologies improve healthcare?
- CCTV, images and purpose limitation
- Best practices in sharing research data between private entities and researchers
- Video Conferencing Applications – advice for employees
- Video Conferencing Applications – advice for employers
- Using digital surveillance tools – what are the privacy and ethical issues to take into account?
- EDPB Updated Guidance on Consent
- Utilising the services of the office of government procurement, a data protection perspective
- Personal data protection breaches and employer liability
- Irish DPC updates cookie guidance on foot of cookie sweep report
- Providing safe educational technologies – a guide for educators
- DPC draws line in the sand with cookie sweep report, six months given to comply
- Fine issued for the refusal of a child’s subject access request
- Desperate times call for desperate measures? Understanding the privacy risks of digital-contact tracing in the COVID-19 fight
- Improving cybersecurity for remote workers
- Business Continuity Planning and Cyber-resilience
- Data Protection Commission Report for the First Full Year of GDPR
- COVID-19 and Data Protection in Emergency Circumstances
- Cross-border data transfers between public authorities: the EDPB guidance
- How to Protect Your Organisation Against Phishing Attacks
- Events and attendee lists – Can I release them?
- Cryptography and Privacy
- Ireland’s National Cybersecurity Strategy 2019-2024
- Data protection roles in health research: Controllers vs Processors
- All you need to know to get ready for the ICO’s Age Appropriate Design Code
- Emerging Technologies: Account Based Ticketing
- Embracing data protection to shield your company from Cyber-Risks – common organisational challenges
- Standard Contractual Clauses: New obligations for data transfers?
- Celebrating Data Protection Day
- Data Protection Authorities Increase Oversight of Website Cookie Practices – Key Considerations
- What are the challenges that SMEs are facing in complying with the GDPR? A view from the field
- Monitoring in the Workplace: Employer Considerations
- The California Privacy Act: A Primer for European Businesses
- Better Understanding the Right to Erasure – A brief explanation of the Google Right to be Forgotten Case
- New EDPB proposed guidelines on the territorial scope of the GDPR
- Key steps in ensuring resilient and effective pseudonymisation
- Developing GDPR training materials for data protection authorities
- eReceipts, The Irish Supervisory Authority’s Guidance on Using Personal Data Correctly
- Data Protection Commission publishes new Subject Access Request Guidance
- The GDPR: A business imperative
- Special categories of personal data: Special requirements and conditions
- Cultivating a culture of data protection within your organisation
- Data Protection and Password Management Best Practices
- Privacy, data protection and drone operations: the new EASA Guidance
- Investigations, priorities and Data Protection Authorities: the Irish PSC case
- Understanding and minimising the risk of identifiability
- Cybersecurity Risk and Data Protection Compliance
- Training sessions for drone professionals – Online Data Privacy Course
- STAR Research project launches free and open GDPR training materials
- What is Mobile Device Management and how your organisation can get started
- Consent and Cookies – The Impact of the Planet49 Judgement on Website Operators
- The Implications of ISO 27701 for organisations seeking privacy certification
- Data Protection and Securing your Website
- Shaping the Future of International Transfers of Personal Data – CIPL Publishes Their Take on the Development of the Next Generation Standard Contractual Clauses
- How to ensure your website does not breach the data privacy framework: Key recommendations
- How are small businesses managing the GDPR?
- Reporting Personal Data Breaches: proving the “unlikely”
- Key lessons on GDPR and scientific research
- European Data Protection Supervisor Publishes information note on international data transfers after Brexit
- Privacy Frameworks and Standards – A Measurable Approach to Privacy Compliance
- Using GPS tracking on commercial vehicles: a German perspective
- Cookie Guidance – Data Protection Authorities publish update
- Schrems II and the Potential Implications for Global Personal Data Transfers from the EEA
- GDPR fines in telemarketing – some interesting lessons from Italy
- Preventing SMEs data breaches – the UK NCSC guidance
- The DPC publishes guidance on securing cloud-based environments
- Data Protection Authorities publish updated cookie guidance
- Assessing the Ethical, Legal and Social Impacts of new technologies: the EUNOMIA project case study
- The GDPR: One year on
- Parental Subject Access Requests in Ireland
- Time-keeping Data – have you got enough?
- Lessons on identifiability: Are anonymised clinical trial data identifiable?
- How to be in pole position to avoid data protection regulatory actions
- The right to rectification – clarifications from the Data Protection Commission
- Data protection requirements for school events and children
- Danish Data Protection Authority issues fine for ineffective anonymisation
- Biometrics in the workplace: The French perspective
- Do medicine related apps share health data safely?
- How do the ePrivacy Directive and the GDPR complement each other?
- The Irish Data Sharing and Governance Act 2019: ensuring lawful, proportionate and transparent data sharing
- Lessons on accountability: How well is your organisation prepared?
- Safeguarding the right of data subjects: Bounty’s data breach case study
- 2019 Cybercrime Trends
- Nosy Drones? Know the rules before you fly
- Annual Report on the cost of data breaches from the Ponemon Institute
- Legitimate Interest as a Lawful Basis of Processing
- Living with the GDPR: Insights from Ireland’s Data Protection Commission
- Improving compliance: Trilateral’s DPO Assist service
- Data subjects’ requests made on behalf of others: Practical considerations on data subjects’ requests and elected representatives
- The Bavarian Data Protection Authority’s recent Cookie Sweep
- CNIL fines Google €50m following investigation into ad personalisation
- Liability clauses in data processing agreements
- New EU Regulation refreshed the legal regime for data processing by European institutions
- What are the benefits of outsourcing your Data Protection Officer?
- GDPR and implications for Research
- The CNIL on data sharing with third-parties
- 2019 – Year of the ePrivacy Regulation?
- Brexit update: political uncertainty demands proactive steps to protect from no-deal consequences
- GDPR and Charities: Key operational considerations
- How the GDPR Will Help Europe Win the AI Race
- Do you need a DPIA? The view from Ireland
- ICO Publishes Updated Guidance for International Transfers
- DPIAs for CCTV cameras: UK public authorities, duties and space
- Avoiding Data Breaches – practical guidance to implement security measures
- Data protection by design in the context of the GDPR
- Criminal Records Checks In Employment Contexts: Old And New Obligations Under Data Protection Law
- Biometric Data in the workplace – French Authority to address the GDPR regime
- The Equifax scandal one year on – The importance of promoting an organisation-wide, proactive cyber-security culture
- National laws implementing the GDPR: The case of health research in Ireland
- How to Receive Personal Data from EU partners in a “No Deal” Brexit scenario
- Privacy Insight: Anonymisation and data-erasure requests
- Data Protection Law and Ethics: where do we stand?
- Lessons on consent: the use of data analytics in political campaigns
- Can we make Virtual Reality Privacy savvy?
- Requesting customer data: the (desperate) need for proper processes
- Preventing Personal Data Breaches: more than just cyber-security
- ICO report highlights increased public awareness of data protection
- Which are the technology areas to assess for the GDPR implementation?
- DroneRules PRO is looking for new Advisory Board members
- Working together to design new technologies to fight crime and terrorism
- Data Protection Officer in Small and Medium Enterprises – A useless figure or an accountability cornerstone?
- Privacy and Data Security for IoT – what are the risks in monitoring our environment?
- Is Your Organisation A Public Authority Under the GDPR?
- These six organisations are considering appointing a DPO – and yours?
- Data Protection Officer: what is it and – most importantly – do you need one?
- Assessing the Ethical, Legal and Social Impacts of new technologies: the DEVELOP project case study
- Part IV. Are you a public or private organisation assessing your technology for the GDPR?
- Part III. Are you a public or private organisation assessing your technology for the GDPR?
- Assessing the Privacy and Ethical Impacts of new technologies: the RAMSES project case study
- Part II. Are you a public or private organisation assessing your technology for the GDPR?
- Developing privacy enhanced technology: The INSPEC2T project case study
- Part I. Are you a public or private organisation assessing your technology for the GDPR?
- Tailoring solutions to meet ethical implications within EU projects
- Drones: new applications, new privacy considerations
- Trilateral examines ethical standards for webscraping technology
- New PHAEDRA II publication
- Category: DG Pages
- Category: Emerging Technology
- Category: Events
- Assessing the Ethical Implications of Artificial Intelligence In Policing workshop – 14th ACM Web Science Conference
- Streamlining and validating standards for crisis management – Join the STRATEGY CEN/CENELEC workshops
- Critical Security – 4th Annual West Coast Conference
- What does the ethics of technology mean?
- Honeycomb end-users’ workshop – understanding end-users’ requirements to better combat human trafficking and modern slavery
- Co-designing policy recommendations on accessible public transport – join the TRIPS webinar
- Ethics, privacy and responsibility by design – Join COPKIT’s webinar
- The ethical governance of disruptive technologies – join the SHERPA, SIENNA & PANELFIT conference
- Market needs on water security standardisation: join the aqua3S workshop
- Ethics, human rights & emerging technologies: Join the SIENNA project conference
- Recover Better, Recover Stronger, Recover Together: key takeaways from the UN Global Compact 20th Anniversary Leaders Summit
- A Knowledge Discovery tool to analyse darknet advertisements – Join COPKIT’s webinar
- Preparedness in the EU emergency medical care: demonstration event
- Project Solebay Conference – Discussing modern slavery in conflict
- SATORI final conference draws over 140 participants
- TRI’s Crisis team participate in the 7th IRDR Conference
- Category: News
- Celebrating Earth Day
- Providing a more comprehensive and collaborative response to cyberattacks – Trilateral joins the CYBERSPACE Project
- Achieving the Green Deal ambitions with just and equitable sustainable solutions
- Understanding crime victims’ experience – survey
- Views of people with disabilities on future mobility
- Regulatory changes for AI in Europe are coming!
- World Water Day – Celebrating the importance and vulnerability of the world’s water supplies
- The role of women in Trilateral: how we integrate gender sensitivity in our work culture, research and innovation
- Law and ethics, not law or ethics: comments to the UNESCO recommendations on the ethics of artificial intelligence
- Celebrating gender equality
- The ACM Conference Highlights: Fairness, Accountability, and Transparency in Socio-Technical Systems
- A European Discussion Around the Hottest Trends in Science and Technology
- COPKIT workshop: How can new technologies support Law Enforcement Agencies to stay ahead of organised crime?
- What will the future look like if AI mimics people?
- Developing new technology to stay ahead of terrorism and organised crime
- Which are the enablers of Modern Slavery and Human trafficking?
- When AI, big data, ethics and human rights converge
- Tax crime: how much do we pay for those who don’t?
- Collaborative innovation: the advantages of co-design in creating sustainable technological solutions
- Combining technology and social sciences for sustainable innovation
- New EU research project develops GDPR training for data protection authorities and officials
- Category: Research Highlights
- 3 key takeaways from the Eurocrim Conference 2022 in Malaga
- Case Study on County Lines drug trafficking and Cuckooing in the UK
- Latest data-driven insights into modern slavery victim demographics and case outcomes in greater Manchester
- Security, privacy and trust in software – assessing the ethical impact of technology
- Human intervention and human oversight in the GDPR and AI Act
- The causes and the futures of populism and civic engagement
- Flying Emergency Class – The transport challenges of Search and Rescue drones
- Using Gender-based Analysis Plus (GBA+) in PREPARE
- Boosting building renovation rates – Trilateral Research provide feedback to the Energy Performance of Buildings Directive
- Analysing the human-factor-based aspects of cybersecurity
- Enhancing the resilience of children exposed to violent extremist environments – Trilateral joins the PREPARE project
- THE MOBILITY DIVIDE INDEX – A brand-new measuring system of public transportation accessibility for people with disabilities
- Online gambling: how can we combat the perfect disguise to transfer illicit profits?
- Ethics, human rights & emerging technologies: Key takeaways from the SHERPA project
- Call for papers: Reimagining ethical, legal, and social issues in a COVID era
- Pandemics and the Environment: Modelling the Broader Picture
- A structured path towards behaviour change – How can training sessions help bring a to change people’s behaviour?
- Creating a holistic diagnostic and assessment tool for early detection of melanoma
- Pulling In and Pushing Out: Crowdfunding Regulation and Financial Inclusion in Mexico
- Improving Digital Privacy and Security in Software
- Using technology in the fight against human trafficking and modern slavery. Challenges with tech-mediated interventions.
- The Need for Inclusive Communication in Crisis – Findings From European Commission Funded Research
- Training on human trafficking: a component of the human security operationalisation framework
- Developing AI solutions to track illicit money flows
- Closing the risk perception gap to increase disaster resilience
- Child sexual exploitation online: how can we better protect children in the wake of COVID-19 lockdowns?
- Better preparedness and response for emergency situations in Europe
- “Ethics by Design” for new and emerging technologies
- Fighting misinformation: an ethical perspective
- Disputing the Independence and Impartiality of an AI-assisted Judiciary
- Ethical and Practical Challenges of Tackling Organised Crime in Conflict
- Sexual crimes and public trials – how can we better protect vulnerable witnesses?
- Young and connected: An analysis of the new General Comment on children’s rights in the digital environment
- Sociotech in practice: developing AI solutions to tackle societal challenges
- Optimising manufacturing processes using Artificial Intelligence and Virtualisation
- First responders, borders, and data – can shared data help build a more coordinated response to crises and disasters?
- Using data insights to address the impacts of the COVID-19 pandemic
- Harmonising European cybersecurity strategies to tackle cybercrime
- Energy Efficiency in Buildings – is the focus shifting from commercial to residential buildings?
- Four mistakes to avoid when making policy recommendations about populism
- Exploring political bias in false information spread on social media
- Unprotected children fighting adults’ wars
- Assessing the ethical impact of new standards for more effective crisis management
- Ethical, legal and societal impact assessment in security research – the example of the PREVISION project
- Building a smart support platform for pandemic prediction and management
- AI for good: Recommendations for enhancing legal frameworks for AI and robotics
- Mobility Survey – Redesigning accessible transport systems
- Supporting governmental responses to COVID-19 across Europe
- Develop better early intervention strategies to combat child exploitation – interview with Sheila Taylor MBE, CEO of NWG Network
- Understanding how COVID-19 exacerbates existing inequalities and vulnerabilities
- The experiences of victims of crime with the Garda Síochána: Interim report
- Adopting co-creation processes to build innovation into end-users’ practices
- Increasing Vaccination Uptake Through Message Framing
- The Ethics of Space Exploration
- Exploring human security by analysing news coverage
- Developing augmented reality tools to combat crime and terrorism
- Combating child exploitation with ethically designed technology
- Energy Efficiency as a Tool for Effective Maintenance
- Gender and Leadership in Higher Education and Research
- Risk communication strategies in the context of COVID-19
- The future of ethics assessment: SATORI’s European standard
- A new approach to designing transport systems
- The practice of ethics at Trilateral: how we make ethics meaningful in technology design, policy and research
- Advancing Standardisation and Interoperability for Effective Crisis Management
- Blockchain Technologies and Cryptocurrencies: Join EUNOMIA’s Pilot
- Behavioural Science – why do people do what they do?
- Supporting international medical responses during the COVID-19 pandemic: the NO-FEAR network
- AI in healthcare: paving the way with standardisation
- Adopting voice-to-text technologies for social good
- Protecting the water sector from cyber-security risks
- Adopting an evidence-based approach to support adolescent mental health
- What are the Hottest Trends in Science and Technology?
- The ethics of a multilingual app in humanitarian emergencies: finding a voice or excluding voices?
- “Siri, talk dirty to me” – The Ethics of Conversational AI
- Practicing information hygiene routine to flatten the curve of the ‘infodemic’ – EUNOMIA project’s recommendations
- Creating clusters to develop sustainable data-driven policing solutions by adopting an ethical approach
- Ethically developed technologies for safer societies – the ROXANNE project case study
- Analysing the impact of COVID-19 on gender, peace and security
- Combating Cybercriminality by Understanding Human and Technical Drivers
- Detecting identity fraud to reduce abuses and vulnerabilities
- Unpicking the contradictions that facilitate tax crime
- Ethically developed technology for safer societies – the PREVISION project case study
- Giving voice to end-users’ needs in designing new transport systems
- Why is human security important?
- The response to COVID-19: a comparison of experiences in Europe
- AI for Good – Security Issues, Dangers and Implications of Smart Information Systems
- Better communication for pandemics at all scales
- Bringing better justice to child soldiers
- Why take an interdisciplinary approach to data-driven decision-making around complex social problems?
- “Staying ahead of the curve” – Data-driven policing tools to combat crime and terrorism
- Empowering Law Enforcement Agencies in the investigation and prevention of crime
- Understanding crime victims’ experience with the police
- Blockchain and privacy-by-design: a holistic approach to cybersecurity for the financial sector
- AI and robotics adverse impacts – how resilient or vulnerable are we?
- Operationalising human security in South Sudan – Operation Trenton
- Preventing and mitigating water insecurity
- Developing innovative tools for improved search and rescue operations
- Bias in machine learning: How to measure fairness in algorithms?
- Analysing “populist” narratives – what are the ethical and social implications?
- Ethics in the digital society
- Recruitment, Retention and Career Progression of Women in Academia
- Join the Ethical and Societal Impact Advisory Board of the COPKIT project
- Prioritising investments in energy efficiency
- What are the factors that make individuals vulnerable to human trafficking?
- Developing new technologies to speed up criminal network analysis
- Setting new benchmarks for cybersecurity in the financial sector
- Policing Economic Crime Post Brexit
- AI for good – fostering the ethical use of artificial intelligence
- Improving security in emergencies – lessons learned and best practices
- Social media and populism: Facebook’s challenges with political speech
- Gender Equality – box ticking is not enough
- Enhancing the investigation, prosecution and prevention of tax crimes in the EU
- How will AI and Big Data shape our future?
- Call for papers: The Ethics of Disruptive Technologies
- How do criminal and terrorist organisations exploit the Internet?
- Why Mental Health at Work is so important
- Using data to enhance collaborative crisis management
- Project Solebay Conference: Assessing the risk of modern slavery in conflict
- Advancing standardisation to strengthen disaster resilience
- Leveraging data to develop modern slavery risk assessments
- Analysing the rise and causes of populism in Europe
- Promoting more effective gender equality in research institutions
- Addressing fake news and disinformation on social media
- Developing Risk Assessment tools to combat Child Sexual Exploitation
- Call for papers: Ethics and Human Rights in Smart Information Systems
- Research Pilots – evaluating and validating new technologies
- Framing the vision for a stronger EU emergency medical care
- Call for Papers: Edited Book on the Human Trafficking, Conflict and Military Nexus – Project Solebay 2019
- Developing a new technology for a more coordinated response to emergencies
- Risk – “easy to say and difficult to understand”
- Artificial intelligence and Big Data – use responsibly
- Assessing the impact of new technologies at different scales
- Developing ICT solutions to improve crime prevention in Europe
- How do we make society more human as it becomes more AI-dependant?
- How can new policing technology make our societies safer?
- ICT solutions for humanitarian missions: can new technologies understand different cultural contexts?
- Are AI, big data and robotics changing life for the better or for the worse?
- Developing new methods to prevent, investigate and mitigate corruption and TAX Crimes in the EU
- Combating human trafficking in areas affected by armed conflicts
- How can new technology support career development?
- Improving the coordination of the Emergency Medical System for an effective response to security threats
- What’s the economic added value of machine-learning in the manufacturing sector?
- Fragmentation in policy making and poor investment in Energy Efficiency: how can data analytics help?
- How to make ethics visible through design
- Risk Management: identifying risks to achieve sustainable impact
- Open sources intelligence: how to use it to uncover crimes against humanity?
- Cybercrime – what is the hidden nature of digital criminal activities nowadays?
- Will new technology for the justice system help combat Human Trafficking?
- Understanding end-users’ needs for new community policing technology
- Research highlights: Bitcoin mining and the creation of unbalanced power dynamics
- AI and Cybersecurity: How can ethics guide artificial intelligence to make our societies safer?
- Helping the drone industry adapt to a changing regulatory landscape: the DroneRules PRO case study
- How can citizens and society engage and benefit from digital transformation?
- Research Highlights: Identifying the link between human trafficking and homelessness
- Data Science Frontiers – Capturing the benefits of “extreme scale” analytics
- Can new technology help local authorities to prevent homelessness?
- Assessing your data makes you more efficient in protecting vulnerable persons
- Digital transformation for the public sector: The case for National Health Services
- The ResiStand Final Conference: boosting disaster resilience through standardisation
- What impact will new technologies have on our lives? Job losses or new opportunities?
- AI ethics, foresight and ethics by design: Digital Ethics Summit
- Developing new forensic tools to combat Internet Organised Crime and Terrorism
- Working together to build more resilient societies mitigating the risks related to earthquakes
- Artificial Intelligence makes manufacturing smart
- Working together to address extreme ideologies and polarisation
- Improving safety of humanitarian missions with intelligent sociotechnical solutions
- Working together to address the socioeconomic challenge of forced displacement
- Ensuring an ethical approach to detecting terrorist-related online content and financing activities
- Working together to enable responsible, secure and sustainable data-driven innovation in the transport sector
- What will future governments look like?
- Designing an effective communication strategy through stakeholder engagement
- Working together to combat gender-based violence and violence against children
- EU project will improve crisis management response across EU member states and beyond
- Trilateral to support the co-ordination of multi-million Euro project on ethics and human rights impact of new technologies
- ENERGIC-OD: How open data in the Geographic Information System will drive innovation
- Bitcoin – Is it really anonymous and what could its implications be?
- SATORI ethics assessment framework has lift-off
- Research ethics for industry 4.0
- CLARITY – Eight considerations for the up-take of open eGovernment services in Europe
- ENERGIC-OD contest as a technology and commercialization proof of concept
- Introducing TITANIUM (Tools for the Investigation of Transactions in Underground Markets)
- Big data community officially launched
- Trilateral’s Dissemination and Stakeholder Engagement Services
- SATORI: A FRAMEWORK FOR ETHICS ASSESSMENT IN RESEARCH & INNOVATION
- EU researchers shine light on ethical concerns in public health emergency response
- Updates from the CLARITY project
- PHAEDRA II Project helping the EU DPAs to work more closely together publishes final recommendations
- Trilateral’s work for ENISA within smart infrastructures
- SATORI December 2016 newsletter and blog post published
- Trilateral participates in Babson college and TRACCC webinar series on human trafficking
- Trilateral contributes to book on the future of drone use with a chapter on “Big Data Drone Data.”
- Trilateral hosts workshop with privacy and ethics experts for the DEVELOP project
- Category: Security
- Better visualisation of electronic evidence to improve digital forensic capabilities
- CESIUM: Innovation in child safeguarding – An interdisciplinary journey
- Tackling child exploitation – Join the CESIUM webinar
- Enhancing analytical capability to support safeguarding professionals in tackling child exploitation – interview with Jon Betts, CESIUM application project manager
- Webinar: The role of ethical AI in safeguarding children – A CESIUM case study
- “Failing to plan for the day after”: planning for civilian protection in Libya
- Do we care about care? The role of new technologies in tackling Adult Social Care issues
- A people-centred approach to military planning: why it matters
- Data-driven insights into the Colombian conflict: a statistical analysis of child soldiers trends in the department of Antioquia, Colombia
- Human Security and Crisis: A Snapshot
- Trilateral Research develops a new risk assessment method for analysing the Risk of Modern Slavery in Conflict
- Category: Sociotech Insights
- Shining light on a hidden crime in Greater Manchester
- The financial argument, a complement to moral decision-making
- Housing support for victims of trafficking in Ireland remains a chronic issue
- E-learning and the Ethics of Robot Bullying
- Using AI-Powered Immersive Technologies for Improved Situational Awareness of Police Officers: Promise and Challenges
- Unleashing the Power of AI: Explainability and Transparency are the Keys to Promote Ethics, Trust and Inclusion in Digital Policing
- The Interplay of Explicit and Tacit Knowledge with Automated Systems for Safeguarding Children
- Do We Really Need Another Recommendation for Ethical AI?
- Machine Speed Strategic Analysis – Using AI to unlock information advantage
- Developing a sustainable model to enhance policing’s ability to safeguard children – interview with Chris Todd from West Midlands Police and National Policing lead for Data Analytics
- Leading the way in protecting the most vulnerable – interview with Chief Superintendent Jon McAdam from Lincolnshire Police
- Category: Technology Development
- Category: Uncategorized
Projects
- MEMENTOES
- Innovate UK KTN
- CLIMOS
- CYBERSPACE
- PREPARE
- popAI
- Firelogue
- Suvivor’s Engagement
- TRIM Air Quality Project
- HEROES
- NDAS Modern Slavery Assessment
- TRACE
- RiskPACC
- TRUST aWARE
- Honeycomb
- iToBoS
- OPTIMAI
- TECHETHOS
- PANDEM-2
- Combatting the spread of child sexual abuse content
- Supporting young people at risk of exploitation
- Improving suicide prevention
- STAMINA
- COVINFORM
- CESIUM
- Enhancing Adolescent Mental Health
- Patch
- Solebay
- INSPECTr
- ROXANNE
- INGENIOUS
- IN-PREP
- BYTE
- DroneRules Pro
- DroneRules.EU
- CLARITY
- TRACE
- SATORI
- iTRACK
- DEVELOP
- DARLENE
- HAMOC
- NO-FEAR
- STAR II
- Understanding crime victims’ experience
- SIENNA
- TRIPS
- CURSOR
- D4FLY
- aqua3S
- PROTAX
- PREVISION
- SHERPA
- PaCE
- GEARING ROLES
- PREFET
- COPKIT
- SOTER
- EUNOMIA
- STRATEGY
- EERAdata
- CAPE
- CC-DRIVER
Profiles
- Ruaraidh Dobson
- Aiste Timukaite
- Trilateral Research
- Stratos Papafotiou
- James Cadman
- Alannah Carey Bates
- Julie Vinders
- Fabienne Ufert
- Nanditha Plakazhi
- Agnel Nidhi Shiji
- Kiran Sidhu
- Nicola Battersby
- Cathriona Diggins
- Sharon McCann
- Shyonne Amedee
- Catherine Hill
- Karen Ronayne
- Pascale Waschnig
- Desmond Faucher
- Melanie Rodriguez
- Anjhana Damodaran
- Franky Farra-Fond
- Ekaterina Kyulyumova
- Corinna Pannofino
- Matthew Reilly
- Karen Richardson
- Matt Buckley
- Kehinde Owoeye
- Emily Maitland
- Simon Hoffmann
- Aneeq Ur Rehman
- Steven Belacel-Rincon
- Patrick Munnelly
- Noorul Hoda
- Ezra Webb
- Ben Howkins
- Irma Poder
- Giada Anversa
- Richa Kumar
- Dr Joshua Hughes
- Matthew Hall
- Krzysztof Garstka
- Trilateral Reseach
- Anaïs Rességuier
- Tally Hatzakis
- Ilaria Bonavita
- Dr Agata Gurzawska
- Dr Anita Nandi
- Prodromos Lilitsis
- Raffaele Loseto
- Dr Nikola Tomić
- Dr Leanne Cochrane
- Dr David Barnard-Wills
- Dr Rowena Rodrigues
- Zainab Mehdi
- Eliza Jordan
- Vangjel Gjorgjiev
- Selby Knudsen
- Jason Colclough
- Susannah Copson
- Robin Renwick
- Panagiotis Loukinas
- Pinelopi Troullinou
- Mistale Taylor
- Olivia Iannelli
- Niamh Aspell
- Katrina Petersen
- Dr Su Anson
- Diana Dinu
- Panagiota Kourti
- Andrea Nicolaou
- Rosie Christos
- Brenda Kilgannon
- Tracey Webb
- Ciaran Greaney
- Claire Looney
- Alkmini Gianni
- Sandra Moran
- Aindrias Cullen
- Dr Thordis Sveinsdottir
- Cleo Farah
- Mattheus Webster
- Scott Clare
- Jana Dilger
- Tim Jacquemard
- Sara Domingo
- Rory Maxwell
- Gwilym Ellis
- Stephen Anning
- Toby Fenton
- Dr Filippo Marchetti
- Dr Zachary J. Goldberg
- Dr Julia Muraszkiewicz
- Sarah Alderton
- Shantanu Kulkarni
- Nancy Baker
- Dr Rachel Finn
- Dr Hayley Watson
- David Wright
- Kush Wadhwa
Publications
- Using AI to shine a light on the hidden crime of child exploitation
- Mapping and understanding human factors in effective cybersecurity: a finance-sector organisation case study
- Designing the (data)Hive: Principles-based decentralised architectures
- Shared mobility services: an accessibility assessment from the perspective of people with disabilities
- How to Conduct an Ethics Assessment of AI in Policing
- Data augmentation for fairness-aware machine learning: Preventing algorithmic bias in law enforcement systems
- New research shows extensive gaps in the conceptualisation of surveillance, security, privacy, and trust in public opinion surveys
- AI and Information Warfare in 2025
- Creating companions for senior citizens with technologies that mimic people
- A reflection on participatory research methodologies in the light of the COVID-19 – lessons learnt from the European Research Project TRIPS
- Socio-economic impact assessments for enhanced decision-making
- A reflection on participatory research methodologies in the light of the COVID-19 – lessons learnt from the European Research Project TRIPS
- Socio-economic impact assessments for new and emerging technologies
- A European Agency for Artificial Intelligence: Protecting fundamental rights and ethical values
- Designing the (data)Hive: Principles-based decentralised architectures
- Space ethics – A New Morality for a New Age
- A survey of AI risk assessment methodologies
- AI in Medicine, Philosophy and Ethics
- Thinking AI with a Hammer. Kate Crawford’s Atlas of AI
- AI ethics in action: How Merck created its own code of digital ethics
- Operationalising Human Security in the Contemporary Operating Environment: Proposing Population Intelligence (POPINT)
- A survey of artificial intelligence risk assessment methodologies
- Human Suffering and Migration Management: The Crisis at the Poland-Belarus Border Explained
- Human Suffering and Migration Management: The Crisis at the Poland-Belarus Border Explained
- Understanding vulnerability to inform two-way inclusive COVID-19 communication
- Ethics as attention to context: recommendations for the ethics of artificial intelligence
- The Digital Avatar on a Blockchain: E-Identity, Anonymity and Human Dignity
- Data in Crisis: anticipating risk, vulnerability, and resilience through communication infrastructures
- A framework for regulating AI in the public sector
- A framework for regulating AI in the public sector
- Poking Holes: Distributed Ambivalence and Aesthetics in Sound Networks
- A participatory qualitative analysis of barriers of public transport by persons with disabilities from seven European cities
- Strategic responsible innovation management (StRIM): A new approach to responsible corporate innovation through strategic CSR
- Data in Crisis: anticipating risk, vulnerability, and resilience through communication infrastructures
- Thinking AI with a Hammer. Kate Crawford’s Atlas of AI
- AI in Medicine: A View from Philosophy and Ethics
- Ethical Responsibility in Space Exploration
- Ethical Responsibility in Space Exploration
- Without data we are fighting blind: the need for human security data in defence sector responses to human trafficking
- Without data we are fighting blind: the need for human security data in defence sector responses to human trafficking
- The tale of 400 victims: A lesson for intervention
- Could ‘bias bounty’ competitions tackle AI discrimination?
- Rising to the Proliferation of Cybercrime Challenging LEAs Across Europe
- Evil Matters, A Philosophical Inquiry
- ‘Is it just the latest plaything for billionaires?’: How space travel ethics and tech giants make us sceptical
- COPKIT: Technology and Knowledge for Early Warning/Early Action-Led Policing in Fighting Organised Crime and Terrorism
- COPKIT: Technology and Knowledge for Early Warning/Early Action-Led Policing in Fighting Organised Crime and Terrorism
- Whose Evidence Counts? Problems in the Identification of Victims of Trafficking
- Inclusive Communication to Influence Behaviour Change During the COVID-19 Pandemic: Examining Intersecting Vulnerabilities
- Inclusive Communication to Influence Behaviour Change During the COVID-19 Pandemic
- Energy efficiency in buildings – from commercial to residential
- Why are they prosecuting children who grow cannabis?
- Disaster Risk Management 2020: acting today, protecting tomorrow
- Ethics as attention to context: recommendations for the ethics of artificial intelligence
- Translating Ethical Theory into Ethical Action: An Ethic of Responsibility Approach to Value-Oriented Design
- Translating Ethical Theory into Ethical Action: An Ethic of Responsibility Approach to Value-Oriented Design
- Digging deep: The picture beneath the data on human trafficking
- Data protection made simple(r) for small and medium sized enterprise
- Artificial intelligence for human flourishing–Beyond principles for machine learning
- Windows to the future around Top trends in Emerging Technologies. Roadmapping exercise
- Artificial intelligence for human flourishing – Beyond principles for machine learning
- Legal and human rights issues of AI: Gaps, challenges and vulnerabilities
- Legal and human rights issues of AI: Gaps, challenges and vulnerabilities
- The Role of Data in AI: Report for the Data Governance Working Group of the Global Partnership of AI
- Strategic responsible innovation management (StRIM): A new approach to responsible corporate innovation through strategic CSR
- Predictive Policing in 2025: A Scenario
- Industry and sector bodies have a key role in raising the awareness of small and medium sized companies about data protection
- The role of security and defence companies in EU migration and border control and the impact on the protection of the rights of refugees, migrants and asylum seekers.
- New discussions on the complicated relationship between Poland and forced labour.
- Those who control the code control the rules: How different perspectives of privacy are being written into the code of blockchain systems
- Keeping AI ethics agile and alive
- Addressing Human Trafficking: Let’s Shift the Onus from Individuals to Businesses and Policy Makers.
- Human Trafficking in Conflict: Context, Causes and the Military (Crime Prevention and Security Management)
- Evidence-based technology trends grown into “play- grounds” for sparking creativity
- Balancing Innovation and Vulnerability: Water Security in An Age of Cyber-Warfare
- Evidence-based technology trends grown into “play- grounds” for sparking creativity
- AI’s evolution and the GDPR.
- Policy scenarios as an instrument for policymakers
- Policy scenarios as an instrument for policymakers – Technological Forecasting and Social Change
- Poland: Human Trafficking And Homelessness.
- Doing human security — where are the people?
- Civil Society Organisations in Counter-Trafficking Governance: When Long-Standing Interactions Lead to Solid Partnerships
- Human Trafficking as a Conflict Financing Measure
- The GDPR as Global Data Protection Regulation?
- Toward a Better Understanding of Human Security Risks: Developing a Risk Assessment Methodology for Human Trafficking at the onset, during and after conflict
- Human Trafficking as a Conflict Financing Measure
- Recommendations for Dental Care during COVID-19 Pandemic
- AI ethics should not remain toothless! A call to bring back the teeth of ethics
- Those who control the code control the rules: How different perspectives of privacy are being written into the code of blockchain systems
- Data Protection Authorities and their Awareness-raising Duties under the GDPR: The Case for Engaging Umbrella Organisations to Disseminate Guidance for Small and Medium-size Enterprises
- Surveillance in Europe
- Protecting Victims of Human Trafficking from Liability. The European Approach.
- Implementing the right to erasure: the judgment of the EU Court of Justice in Google v CNIL
- AI and Information Warfare in 2025
- An Umbraco Privacy Health Check.
- The underdog in the AI ethical and legal debate: human autonomy.
- Protecting Victims of Human Trafficking from Liability: An Evaluation of Section 45 of the Modern Slavery Act
- Managing Risk Across Borders: ethical implications of engaging information technology for transboundary disaster collaboration
- Making social media data valuable for humanitarian actors.
- Making social media data valuable for humanitarian actors
- Assessing ethical and social impacts as part of Agile software development
- The Investigation and Prosecution of Traffickers: Challenges and Opportunities
- What a Drag(net): Dutch Surveillance Laws in the Light of European Union Data Protection Law
- Protecting Victims of Human Trafficking From Liability
- Agile ethics: an iterative and flexible approach to assessing ethical, legal and social issues in the agile development of crisis management information systems
- Reasonableness in its reasoning: How the European Union can mitigate problematic extraterritoriality on a de-territorialised internet
- Smart Grids and Ethics
- Towards Responsible and Sustainable Supply Chains – Innovation, Multi-stakeholder Approach and Governance – Philosophy of Management
- Protecting Victims of Human Trafficking from Liability: An Evaluation of Section 45 of the Modern Slavery Act
- The Homelessness Reduction Act & Future of Homelessness.
- The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developments,
- Major Steve Anning, Combating human trafficking in areas affected by armed conflicts.
- Addressing interlinked social problems: Human trafficking and homelessness
- The Human Rights Centre Clinic Introductory Guide to Open Source Intelligence and Digital Verification
- Ethics, Technology and Innovation in Humanitarian Settings: Calibrating the Conversation.
- Assessing the privacy of mhealth apps for self-tracking: heuristic evaluation approach
- Assessing the Privacy of mHealth Apps for Self-Tracking: Heuristic Evaluation Approach
- Ethics, Technology and Innovation in Humanitarian Settings: Calibrating the Conversation
- Is it time to include technology considerations in policy and legislation addressing human trafficking?
- Assessing the privacy of mhealth apps for self-tracking: heuristic evaluation approach
- A Crowd-Sourced Intelligent Information Management and Decision Support System Enabling Diverse E-Government G2C2G Services
- The drive for Virtual (Online) Courts and the failure to consider obligations to combat Human Trafficking – a short note of concern on identification, protection and privacy of victims
- Ethics and Privacy in AI and Big Data
- The state of the art and future of privacy seals
- IoT, data analytics, and the public sector
- Mining social media for effective crisis response: machine learning and disaster response
- Certified Video Surveillance Systems for More Resilient Urban Societies
- Crowd Knowledge Sourcing – A Potential Methodology to Uncover Victims of Human Trafficking
- Understanding the ‘open’ in making research data open: policy rhetoric and research practice
- The Law of Armed Conflict Issues Created by Programming Automatic Target Recognition Systems Using Deep Learning Methods
- Privacy and Data Protection Seals
- Proactive Engagement with Ethics and Privacy in AI and Big Data – Implementing responsible research and innovation in AI-related projects
- Bitcoin: a shift in the paradigm of capitalist power relations? A Marxist counterargument to Libertarian and Socialist Utopias
- Facilitating two-way public communication in crisis and disaster management
- A look into the future
- Data aggregators: a solution to open data issues
- Facilitating two-way public communication in crisis and disaster management
- So we produced this big pile of GIS data, what now?
- Mining social media for effective crisis response: machine learning and disaster response
- Open Data and the Knowledge Society
- The importance of an Ethics and Privacy Impact Assessment in digital humanitarianism
- Using social media data for disaster preparedness
- Analysing social media data for disaster preparedness: understanding the opportunities and barriers faced by humanitarian actors
- Using technology foresight to improve data protection
- The Human Rights Argument in Human Trafficking: Duty to Identify Victims
- Using Digital Technologies to Combat Human Trafficking: Privacy Implications
- The Ethical Assessment of Research and Innovation – A Reflection on the State of the Art (Based on Findings of the SATORI Project)
- Open Data and the Knowledge Society
- A gap in the market: the conceptualisation of surveillance, security, privacy and trust in public opinion surveys
- Bringing privacy into the fold: considerations for the use of social media in crisis management
- On anonymity in disasters: Socio-technical practices in emergency management
- Agility in crisis management information systems requires an iterative and flexible approach to assessing ethical, legal and social issues
- Understanding cross-cultural adoption of a first aid app
- Methods for practising ethics in research and innovation: a literature review, critical analysis and recommendations
- Working with data: ethical legal and social considerations surrounding the use of crisis data and information sharing during a crisis
- Privacy and trust at risk in surveillance societies
- Preparing the public for terrorism
- Engaging with Social Media Analysis Tools
- Privacy for Refugees
- Improving First Aid Skills: How Local Conceptions of Risk Influence User Engagement with the First Aid App in Israel and Malta
- The future of privacy certification in Europe: an exploration of options under article 42 of the GDPR
- Can trust in surveillance technologies be enhanced through certification? Lessons from the CRISP project”
- A nature based taxonomy of cyber crime in the financial sector: a comprehensive approach to countermeasures
- Introduction to Enforcing Privacy
- Results from the PHAEDRA project
- Findings and recommendations
- Social networking in Times of Crisis
- Should drones be subject to privacy impact assessments?
- Enforcing Privacy – Regulatory, Legal and Technological Approaches
- Certified security systems for sustainable cities of the 21st century
- Privacy, data protection and ethics for civil drone practice: A survey for industry, regulators and civil society organisations
- A Right to Flee: Refugees, States, and the Construction of International Cooperation
- Organisational and societal impacts of big data in crisis management
- Challenges in Designing and Distributing a Not For Profit First Aid App Worldwide
- Raising Trust in Security Products and Systems through Standardisation and Certification: The CRISP Approach
- Raising trust in security products and systems through standardisation and certification: The CRISP approach
- Cyber criminal journeys to support forensic investigation and response deployment
- Digital Methods as Mainstream Methodology: An Introduction
- Ethical Impact Assessment
- Social media: a paradox for increasing European community preparedness
- Exploring big crisis data in action: potential positive and negative externalities
- Electronic health records expose privacy fears
- The Day of the Drone
- Working with emergency responders across Europe to enhance crisis communication practices
- Developing and testing a surveillance impact assessment methodology
- Trafficking in Human Beings as an Enterprise: Highlighting Key Questions About Data Shortage on the Business Side
- Digital Methods for Social Science: An Interdisciplinary Guide to Research Innovation
- Surveillance in Europe
- Questioning Surveillance
- An engaged public: considerations for the use of social media in managing crises
- Findings and recommendations
- Resilience in Europe’s surveillance society
- The surveillance industry in Europe
- Introduction to surveillance in Europe
- Ethical Impact Assessment
- Privacy Impact Assessment Policy Issues
- Cooperation and coordination viewed by supervisory authorities themselves: results of PHAEDRA surveys
- Independent citizen journalism and terrorism: from blogs to Twitter
- Should privacy regulation be more than just data protection?
- Ethical and Privacy Implications of the use of Social Media during the Eyjafjallajokull Eruption Crisis
- Guest Editorial Preface: Special Issue on How to do IT more Carefully: Ethical, Legal, and Social Issues (ELSI) in IT Supported Crisis Response and Management
- Privacy principles, risks and harms
- A strategy for operationalising privacy by design
- Flight MH17: Considerations for Social Sharing and Reporting in an Emergency
- The ethics of ‘smart’ advertising and regulatory initiatives in the consumer intelligence industry
- A multi-level approach to understanding the impact of cyber crime on the financial sector
- TACTIC
- FORTRESS
- The state of the art in societal impact assessment for security research
- How to best assess the social impact of security technology research projects?
- Integrating privacy impact assessment in risk management
- Drones: Regulatory challenges to an incipient industry
- Social media and the 2013 UK heat wave: opportunities and challenges for future events
- Citizen (in)security?: social media, citizen journalism and crisis response
- How good are PIA reports – and where are they?
- The COSMIC project
- The ethics of “smart” advertising and regulatory initiatives in the consumer intelligence industry: a critical review of digital red-lining, exploitation and other ethical impacts
- Following best practices in Privacy Impact Assessments
- The Evolution of Citizen Journalism in Crises: From reporting to crisis management
- Misuse of Information Technologies and Reliability of Information in New Media During Emergencies
- PRIPARE: A New Vision on Engineering Privacy and Security by Design
- Ethical dilemma scenarios and emerging technologies
- Integrating privacy and ethical impact assessments
- Integrating privacy and ethical impact assessment
- Seven types of Privacy
- The evolution of citizen journalism in emergency management
- Making Privacy Impact Assessment More Effective
- Security, Privacy and Surveillance in European Policy Documents
- Biomedical Engineering and Elderly Support
- Privacy and ethical implications of the use of social media during a volcanic eruption: some initial thoughts
- Evaluating Privacy Impact Assessments
- Reconciling privacy and security
- The proposed Regulation and the construction of a principles-driven system for individual data protection
- Introducing a privacy impact assessment policy in the EU Member States
- Developing a privacy seals scheme (that works)
- A Comparative Analysis of Privacy Impact Assessment in Six Countries
- Seven types of privacy
- Constructing a surveillance impact assessment
- Constructing a surveillance impact assessment
- Privacy Impact Assessment Reports: A Report Card
- Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications
- The state of the art in privacy impact assessment
- Privacy Impact Assessment
- eHealth Frameworks for Assessing Ethical Impacts
- Privacy and ethical impact assessment
- Findings and Recommendations
- Introduction to Privacy Impact Assessment
- Surveillance: Extending the limits of privacy impact assessment
- Privacy Impact Assessment
- Minimizing technology risks with PIAs, precaution and participation
- Mechanisms for Stakeholder Co-ordination in ICT and Ageing
- A Framework for the Ethical Impact Assessment of Information Technology
- Should Privacy Impact Assessment be Mandatory?
- Trust in the employer: The role of high-involvement work practices and procedural justice in European organizations
- Are the OECD Guidelines at 30 showing their age?
- Structuring e-inclusion Stakeholder Needs
- Sorting Out Smart Surveillance
- A framework for the ethical impact assessment of information technology
- Privacy, Data Protection and Emerging Sciences and Technologies: Towards a Common Framework
- Mainstreaming the e-excluded in Europe: Strategies, Good Practices and Some Ethical Issues
- Good Practices in e-Inclusion
- Senior Citizens and the Ethics of e-inclusion
- Identification of Emerging and Future Risks in a 2011 eHealth Scenario
- Legal Safeguards for Privacy and Data Protection in Ambient Intelligence
- Ethics, e-Inclusion and Ageing
- Privacy, Trust and Policy-making: Challenges and Responses
- Constructing Dark Scenarios for Privacy Policy Formulation
- Alternative futures: AmI scenarios and Minority Report
- The illusion of security
- Safeguards in a World of Ambient Intelligence
- Shining Light on the Dark Side of Ambient Intelligence
- Privacy, identity and security in ambient intelligence: A scenario analysis
- The dark side of ambient intelligence
Podcast
- Episode 12 – Alexander Gilder – Stabilisation and UN Peace Operations
- Episode 11 – Lee Beales: Beirut and China, Health security.
- Episode 10 – Maj Helen Bryan: Security, stability, and the DRC
- Episode 9 – Dr Simon Rushton: Public health and security
- Episode 8 – Prof Shahrbanou Tadjbakhsh: Humanising security at home and abroad
- Episode 7 – Prof Daniel Bar-Tal: Society, subjectivity, and the psychology of security
- Episode 6 – Prof Gyöngyi Kovács: Logistics, partnerships, and listening to the silence
- Episode 5 – Fred Koolhof: People, elephants, and dialogue
- Episode 4 – Rachel Agelou: Human security and humanitarian affairs
- Episode 3 – Lt Col Leon Marshall: Dissertation, deployments, and doing human security
- Episode 2 – Dr Martijn Dekker: People, conflict, and security from below
- Episode 1 – Dr Julia Muraszkiewicz and Toby Fenton: Humans of security.