6 posts found
PET technologies: how to use protected data in a privacy-sensitive way
As organisations seek to harness the potential of data to make decisions, innovate and improve their services, a fundamental challenge arises: how can data collection and use be balanced with respect for privacy? PET technologies attempt to address this challenge. In this post, we will explore what…
Invisibilisation and algorithmic discrimination
Digital technology and algorithms have revolutionised the way we live, work and communicate. While promising efficiency, accuracy and convenience, these technologies can exacerbate prejudice and social inequalities exacerbate prejudice and social inequalities and create new forms of exclusion and cr…
The gender gap: inequality is also in the data
Today, 8 March is the day on which we commemorate women's struggle to achieve their full participation in society, as well as giving visibility to the current gender inequality and demanding global action for effective equality of rights in all areas.
However, the data seem to indicate that we still…
The protection of personal data in the draft Data Governance Regulation (Data Governance Act)
Since the initial publication of the draft European Regulation on Data Governance, several steps have been taken during the procedure established for its approval, among which some reports of singular relevance stand out. With regard to the impact of the proposal on the right to the protection of pe…
The most popular network analysis tools
Two decades ago they did not exist, but in recent years, social networks have become an important part of our lives. 29 million Spaniards actively use these services, according to data compiled by EPData. On average, users spend almost 2 hours a day connected to them.
This data makes social networks…
Personal open data but under control
Open data has great potential to improve transparency and accountability or to enhance public services and the creation of new services, but at the same time they also show a less friendly face by increasing our vulnerability and exposing information increasingly more detailed that is not always use…