Showing posts from December, 2019

Open Data and Closed Data

Introduction In our always connected environment, there are considerations that organisations have to make when determining whether certain data should be open or closed access, especially if they have the potential to benefit society as a whole. Decisions that are made can affect how they implement data protection and privacy regulations along with cybersecurity policies.  Definitions Open Data:  The Open Data Institute (ODI) provides the following definition: “open data is data that anyone can access, use or share.” “Anyone” refers to literally anyone, including commercial users. So Open Data can be accessed, used, remixed and shared again with no restrictions at all. Open Data – Data that meets the following criteria: Accessible (ideally via the internet) at no more than the cost of reproduction, without limitations based on user identity or intent; In a digital, machine-readable format for interoperation with other data; and Free of restriction on use or redistribution

Trustworthiness in the Information Age

Introduction In our Information Age where the vast majority of systems and devices are now able to connect to the internet and communicate with each other the trustworthiness of how we communicate, the devices we use and the networks they run becomes critical. But there is a slight problem it is difficult to prove trustworthiness but also maintain it and to have confidence in we operate in this environment this is a problem worth discussing.  Definition of  Trustworthiness: At it is most simple is the Quality of being authentic and reliable. In cybersecurity, the Industrial Internet Consortium   (IIC) defines trustworthiness as the degree of confidence one has that a system performs as expected. In our daily lives, trustworthiness inks to the problem of fake news and/or disinformation campaigns which stem from social media and can when comes to services and systems if can be used to harm the reputation of services and companies. This is due to the weaponisation of context in ord