- Nov 2021
-
er.educause.edu er.educause.edu
-
In all cases, institutions need to have a security and privacy strategy. Endpoint protection platforms, two-factor authentication, and cloud monitoring tools are some of the technologies that IT staff use to protect institutional data and individuals' identities.
How to ingrain this into an organization without being dictatorial? I imagine: public pronouncements from high levels about the importance of cloud service governance, lots of education for decision-makers and implementers, clearinghouses of common information, open/blameless reports of problems.
-
- May 2021
-
www.bsg.ox.ac.uk www.bsg.ox.ac.uk
-
<small><cite class='h-cite via'>ᔥ <span class='p-author h-card'>Maria Farrell</span> in What is Ours is Only Ours to Give — Crooked Timber (<time class='dt-published'>05/18/2021 11:28:17</time>)</cite></small>
-
-
www.global-solutions-initiative.org www.global-solutions-initiative.org
-
<small><cite class='h-cite via'>ᔥ <span class='p-author h-card'>Maria Farrell</span> in What is Ours is Only Ours to Give — Crooked Timber (<time class='dt-published'>05/18/2021 11:28:17</time>)</cite></small>
-
- Oct 2020
-
www.mdpi.com www.mdpi.com
-
Brous, P., & Janssen, M. (2020). Trusted Decision-Making: Data Governance for Creating Trust in Data Science Decision Outcomes. Administrative Sciences, 10(4), 81. https://doi.org/10.3390/admsci10040081
-
- Jan 2020
-
alumni.berkeley.edu alumni.berkeley.edu
-
Is Cyberspace Still Anti-Sovereign
-
-
www.eff.org www.eff.org
-
A Declaration of the Independence of Cyberspace
-