Donald Norman (1998) advocated the concept of invisible technology, however, as the design of information technology has developed and technology has become invisible, information has also lost is visibility. Action is needed to make information visible in information technology.
Data Security
Storing Data But Losing Information
We focus on backing up data and worry about the threat of data being lost through technical malfunction or data breaches. However, we are storing data but losing information. Changing Technology Google’s vice president recently warned of the danger of losing precious photographs due to the age of changing technology (NewsX, 2015). As new data […]
Personal Data Protection Act
On 2 July 2014 the Personal Data Protection Act came into effect in Singapore. What impact will this have on organizations?
Are You an Information Security Risk?
How Big a Risk to Information Security do you Pose to your Organization? Take the fun quiz here to find out.
Data Security versus Data Access
Balancing data security versus data access for authorized users is a constant challenge. By increasing the number and range of security checks to authenticate customer access, are organizations making it more difficult for legitimate customers to access their accounts and subtly moving the balance of responsibility for data security to their customers?