End User Trust Outlives Consent Forms
In my last post, I talked about ways that research consent can be more nuanced than “yes” or “no”. This second and final part explores scenarios in which consent can get complicated and trust may be endangered.
In my last post, I talked about ways that research consent can be more nuanced than “yes” or “no”. This second and final part explores scenarios in which consent can get complicated and trust may be endangered.
This will be the first in a short series on ways to protect end-user identities when collecting feedback or testing products. As many of us become more proficient in cybersecurity best practices, it’s crucial that we don’t forget some of the low-tech ways that we can keep identities secure and maintain trust.
Government agencies have a responsibility to protect our personally identifiable information, but that’s easier said than done. Strong data management and cultural mindsets are important, and there’s a role for automation as well.
Here’s how to improve customer experiences through more thoughtful use of technology and cross collaboration.
Data breaches are getting more sophisticated, while agencies’ cybersecurity teams are being held back by manual processes and disconnected systems.
On Monday, June 8, the White House Office of Management and Budget (OMB) released a final memorandum mandating that all Federal websites implement HTTPS (Hypertext Transfer Protocol Secure). By December of 2016, all Federal websites will need to implement HTTPS for all communications. Why the Mandate? Privacy, web communications, and encryption are certainly in theRead… Read more »
Hi, everyone, Before coming to government, I served as a college financial aid director. After moving to DC, I spent eight years surrounded by large financial aid data sets, doing risk analysis and providing decision support based on the myriad records that colleges had submitted to the Department in order to administer aid to theirRead… Read more »