Can DevOps Help your Business Make the Digital Transition?
Digital enterprises are taking the world by storm, with organizations looking to benefit from rapidly expanding cloud computing services, mobile computing, automation, and Internet of Things (IoT). In a bid to enhance […]
Identity and Access Management as a Service: A New Assessment Model
Our experience has shown us that typical privacy impact assessment frameworks are not ideal for assessing Identity and Access Management systems. We present a new assessment model that draws on authoritative standards […]
Untying the link: Why should retailers change course on linking data?
Recent news about customer credit card data breaches at Target and Home Depot has made retailers take a closer look at their security practices, but privacy has largely been left out of […]
Canadian Mobile Health Initiatives: Lessons Learned
Recent Canadian initiatives suggest that mobile health applications can help integrate healthcare into individuals’ daily lives, by enabling remote communication between healthcare providers and patients. These first initiatives have revealed significant opportunities […]
A Case for De-identification Business Architecture
Purchasing de-identification software and training staff to use it is a good first step – but more is needed to build an effective de-identification service. De-identification business architecture helps to clarify the […]