Data Protection Act 1998
View article: Privacy-Preserving AI on Edge Devices: A Comparative Study of On-Device Learning and Cloud Processing
Privacy-Preserving AI on Edge Devices: A Comparative Study of On-Device Learning and Cloud Processing Open
The rise of edge computing has transformed how artificial intelligence (AI) processes personal and sensitive data. Traditional cloud-based AI architectures raise privacy concerns due to the transmission and centralized storage of user data…
View article: Assessing Legal Protection Effectiveness for Women Facing Digital Sexual Violence
Assessing Legal Protection Effectiveness for Women Facing Digital Sexual Violence Open
The Electronic Information and Transactions Law functions as the principal legal framework for addressing online gender-based sexual violence in Indonesia; however, legal and structural weaknesses within this framework continue to obstruct…
View article: BLOCKCHAIN + HOMOMORPHIC ENCRYPTION FOR PRIVACY-PRESERVING CREDIT SCORING MODELS
BLOCKCHAIN + HOMOMORPHIC ENCRYPTION FOR PRIVACY-PRESERVING CREDIT SCORING MODELS Open
Credit scoring is a critical component of financial decision-making, yet traditional models often require thedisclosure of sensitive personal and financial information to multiple institutions, raising privacy, compliance,and trust concern…
View article: Global Synchronous Virtual Collaboration for Shared Goals in Workplaces
Global Synchronous Virtual Collaboration for Shared Goals in Workplaces Open
Not final + Work in progress. This manuscript was first drafted on October 2021, also documented privately. To protect the originality and integrity of the author’s unpublished work, key methodological details, experimental designs, data, …
View article: Global Synchronous Virtual Collaboration for Shared Goals in Workplaces
Global Synchronous Virtual Collaboration for Shared Goals in Workplaces Open
Not final + Work in progress. This manuscript was first drafted on October 2021, also documented privately. To protect the originality and integrity of the author’s unpublished work, key methodological details, experimental designs, data, …
View article: Algorithmic Justice Under Contract: Reconciling Data Licensing with Fairness in AI
Algorithmic Justice Under Contract: Reconciling Data Licensing with Fairness in AI Open
This paper explores the complex intersection of data licensing, algorithmic fairness, and contractual obligations in the context of artificial intelligence (AI). As AI systems become increasingly reliant on large datasets, the terms under …
View article: Security Essentials for How to Build a Custom Astrology App Like Co-Star or The Pattern Platforms
Security Essentials for How to Build a Custom Astrology App Like Co-Star or The Pattern Platforms Open
As astrology apps continue to rise in popularity, platforms like Co-Star and The Pattern have transformed how users consume cosmic insights. With millions of users sharing sensitive data such as birth details, relationship histories, and p…
View article: Impact of the Internet of Things on transparency and accountability in public sector: theory and practice
Impact of the Internet of Things on transparency and accountability in public sector: theory and practice Open
The study aims to analyse the impact of the Internet of Things (IoT) on transparency and accountability in the public sector by examining theoretical concepts and practical examples of the implementation of this technology in public admini…
View article: Data management plan (Draft)
Data management plan (Draft) Open
Description of the data management life cycle for the data collected, processed and/or generated along the project. The first version of the Data management plan will include an evaluation of the ethics risks related to the data processing…
View article: Data management plan (Draft)
Data management plan (Draft) Open
Description of the data management life cycle for the data collected, processed and/or generated along the project. The first version of the Data management plan will include an evaluation of the ethics risks related to the data processing…
View article: Security Essentials for How to Build a Custom Astrology App Like Co-Star or The Pattern Platforms
Security Essentials for How to Build a Custom Astrology App Like Co-Star or The Pattern Platforms Open
As astrology apps continue to rise in popularity, platforms like Co-Star and The Pattern have transformed how users consume cosmic insights. With millions of users sharing sensitive data such as birth details, relationship histories, and p…
View article: Towards the implementation of a new European XFEL scientific data policy – challenges and chances
Towards the implementation of a new European XFEL scientific data policy – challenges and chances Open
As data volumes at European XFEL continue to grow rapidly, the need for sustainable storage, access, and preservation has become increasingly critical. In response, and despite operating within an established data management environment, t…
View article: D3.2.1.1 Process for contributing and accessing FAIR data defined and executed with industry partners
D3.2.1.1 Process for contributing and accessing FAIR data defined and executed with industry partners Open
The deliverable D3.2.1.1 proposes a defined process for contributing and accessing FAIR (Findable, Accessible, Interoperable, Reusable) data within the energy sector, based on the services from NFDI4Energy, in collaboration with industry p…
View article: Impact of the Internet of Things on transparency and accountability in public sector: theory and practice
Impact of the Internet of Things on transparency and accountability in public sector: theory and practice Open
The study aims to analyse the impact of the Internet of Things (IoT) on transparency and accountability in the public sector by examining theoretical concepts and practical examples of the implementation of this technology in public admini…
View article: The Cybercrime Act and Intellectual Property Rights: An Interrogation
The Cybercrime Act and Intellectual Property Rights: An Interrogation Open
The paper interrogated the corelates between the Cybercrimes Act 2015 and intellectual property rights in Nigeria. No doubt, the introduction of the anti-cybercrime legislation marked a watershed in the efforts geared towards the promotion…
View article: BLOCKCHAIN + HOMOMORPHIC ENCRYPTION FOR PRIVACY-PRESERVING CREDIT SCORING MODELS
BLOCKCHAIN + HOMOMORPHIC ENCRYPTION FOR PRIVACY-PRESERVING CREDIT SCORING MODELS Open
Credit scoring is a critical component of financial decision-making, yet traditional models often require thedisclosure of sensitive personal and financial information to multiple institutions, raising privacy, compliance,and trust concern…
View article: Privacy-Preserving AI on Edge Devices: A Comparative Study of On-Device Learning and Cloud Processing
Privacy-Preserving AI on Edge Devices: A Comparative Study of On-Device Learning and Cloud Processing Open
The rise of edge computing has transformed how artificial intelligence (AI) processes personal and sensitive data. Traditional cloud-based AI architectures raise privacy concerns due to the transmission and centralized storage of user data…
View article: Algorithmic Justice Under Contract: Reconciling Data Licensing with Fairness in AI
Algorithmic Justice Under Contract: Reconciling Data Licensing with Fairness in AI Open
This paper explores the complex intersection of data licensing, algorithmic fairness, and contractual obligations in the context of artificial intelligence (AI). As AI systems become increasingly reliant on large datasets, the terms under …
View article: The Cybercrime Act and Intellectual Property Rights: An Interrogation
The Cybercrime Act and Intellectual Property Rights: An Interrogation Open
The paper interrogated the corelates between the Cybercrimes Act 2015 and intellectual property rights in Nigeria. No doubt, the introduction of the anti-cybercrime legislation marked a watershed in the efforts geared towards the promotion…
View article: NO-RDA working group on personal data in research
NO-RDA working group on personal data in research Open
The NO-RDA working group on personal data in research has developed a draft set of practical guidelines for storing and sharing personal data in research projects. These guidelines are based on current legislation and best practices, aimin…
View article: D3.2.1.1 Process for contributing and accessing FAIR data defined and executed with industry partners
D3.2.1.1 Process for contributing and accessing FAIR data defined and executed with industry partners Open
The deliverable D3.2.1.1 proposes a defined process for contributing and accessing FAIR (Findable, Accessible, Interoperable, Reusable) data within the energy sector, based on the services from NFDI4Energy, in collaboration with industry p…
View article: NO-RDA working group on personal data in research
NO-RDA working group on personal data in research Open
The NO-RDA working group on personal data in research has developed a draft set of practical guidelines for storing and sharing personal data in research projects. These guidelines are based on current legislation and best practices, aimin…
View article: Privacy Policies dan Terms of Service serta GDPR Checklist dari 10 Health-tech di Indonesia
Privacy Policies dan Terms of Service serta GDPR Checklist dari 10 Health-tech di Indonesia Open
View article: MLDR: A Machine Learning-driven Radio Interface
MLDR: A Machine Learning-driven Radio Interface Open
1. Introduction This document contains the data management plan of the MLDR: A Machine Learning-driven Radio (MLDR) Interface project. It reports the data types the project will be dealing with, how they will be stored and released / disse…
View article: TRANSFORMATION OF INTERNATIONAL LAW IN THE ERA OF SMART REGULATION: Sanctions Architecture, Export Control, Digital Risk Governance and the New Global Normativity
TRANSFORMATION OF INTERNATIONAL LAW IN THE ERA OF SMART REGULATION: Sanctions Architecture, Export Control, Digital Risk Governance and the New Global Normativity Open
This report analyses the structural transformation of international law in 2014–2025, arguing that a new regulatory paradigm—Smart Regulation—has emerged at the intersection of sanctions architecture, export control, AML/CFT, digital gover…
View article: D1.1 Data Management Plan
D1.1 Data Management Plan Open
The first version of the Deliverable 1.1 - Data Management Plan (DMP) for the 4Sir2 project sets out how the FAIR principles will guide the handling of all research data and public outputs. The document explains the procedures that ensure …
View article: AI's Achilles Heel: The Critical Need for Verified Data in a World of Synthetic Realities
AI's Achilles Heel: The Critical Need for Verified Data in a World of Synthetic Realities Open
The proliferation of synthetic data and the increasing sophistication of AI-generated content pose a significant threat to the reliability and trustworthiness of artificial intelligence systems. This paper explores the critical need for ve…
View article: D1.1 Data Management Plan
D1.1 Data Management Plan Open
The first version of the Deliverable 1.1 - Data Management Plan (DMP) for the 4Sir2 project sets out how the FAIR principles will guide the handling of all research data and public outputs. The document explains the procedures that ensure …
View article: GST compliance - issues and Challenges
GST compliance - issues and Challenges Open
GST compliance in India requires strict adherence to statutory deadlines, creating significant operational pressure for Chartered Accountancy firms that manage multiple client portfolios. This case examines Girish G R & Associates, a Benga…
View article: The Unlicensed Foundations: Building a Data Rights Framework for Generative AI
The Unlicensed Foundations: Building a Data Rights Framework for Generative AI Open
The rapid advancement of generative AI models has brought unprecedented capabilities but also significant ethical and legal challenges, particularly concerning the vast amounts of data used for their training. Much of this data is often sc…