New Search

If you are not happy with the results below please do another search

281 search results for:

265

The reconciliation of data reality and the real world – on the way to a data quality model

It has become a truism that data is becoming more and more important and that handling it can lead to a real competitive advantage for companies and a great increase in efficiency for public authorities. In order to also take the importance of data into account with concrete measures, the eGovernment Institute has created the […]

266

The Education ID as the basis for the digital school

If digital teaching aids are increasingly used in class, pupils and teachers need an electronic identity in order to be able to use applications and platforms securely. This is increasingly becoming a critical success factor for schools. From the cantons’ point of view, national developments and cantonal requirements must be reconciled. In a research project […]

267

What are the challenges of managing cyber-attacks in a large company?

With the ever-increasing risks of cyber-attacks, companies need to make cyber security a priority. Today, it is not a question of “if” a company will suffer a cyber-attack, but “when” it will fall victim. Therefore, organisations need to implement measures to prevent and manage cyber incidents. This article discusses the challenges of managing cyber incidents […]

269

eDiscovery – the search for relevant information for investigations

Every day, the amount of data in organisations grows and so do the opportunities to misuse it. With eDiscovery, data is located, secured and searched for use as evidence in civil or criminal proceedings. Our author is a specialist in this topic and explains the complex process of eDiscovery. Differentiating eDiscovery from digital forensics Since […]

270

Vulnerabilities discovered in Swiss Post’s e-voting system

The public intrusion test of Swiss Post’s e-voting system carried out in recent weeks has aroused a great deal of interest among experts and the public, especially when the discovery of serious vulnerabilities became known. These incidents show how important cooperation and transparency are in the introduction of e-voting. In mid-February, Swiss Post published the […]