For Whom the Bell Curve Tolls
Posted on: 02 Dec 2014
People prefer to choose the groups they are in. Even before social media exploited that, there were fan clubs, fraternities, sororities, and many different kinds of groups that people associated…
Anti-Viral
Posted on: 13 Oct 2014
Aggregating is the inverse of broadcasting. What complicates this is that many technologies are now used for both. Cell phones are the best example. They are a device originally designed…
The Point Beside the Point
Posted on: 15 Sep 2014
If we live in a data-centric world, it is still true that data are more immediate for some than for others. To use one individual as an example: by the…
Big Data And Us Little People
Posted on: 25 Aug 2014
The last series I wrote for securitycurrent dealt with principles of data security and privacy. Many authorities charged with enforcing data protection accept the principles. They are based on the idea that…
Security, Where Myths Should Go to Die
Posted on: 13 Mar 2014
There are tellers of tales and debunkers of myths. An organization needs both. An example: the March of Dimes needed people to have the vision of eradicating Polio. Its very…
Not Like the Others
Posted on: 12 Feb 2014
(This is the sixth installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. The second installment can be read here. The…
Being Data – The Principle of Participation
Posted on: 11 Jan 2014
(This is the fifth installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. The second installment can be read here. The…
Consent: The Part of ‘Yes’ that We Don’t Necessarily Understand
Posted on: 21 Dec 2013
(This is the fourth installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. The second installment can be read here. The…
I am Not a Number, I am a Bunch of Numbers
Posted on: 25 Nov 2013
(This is the third installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. The second installment can be read here. These…
Privacy Policies: Would You Give Customer Data to the Government?
Posted on: 03 Nov 2013
(This is the second installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. These principles, often represented in regulations…