Digital Identity, Privacy & Cybersecurity EN

When Avatars Overhear: How Cautiously Do Young People Share Personal Information in the Metaverse?

,
/
Young people may be more likely to open up in the metaverse if a third avatar is quietly present in the room. This is an initial finding from…
Memory-Safety

Memory Safety: An Interview on Rust and the Future of Secure Software Development, Part 2

,
/
The first part examined the issue of memory safety vulnerabilities and possible solutions. The programming language Rust is considered a promising…
Memory-Safety

Memory safety: opportunities and challenges for the software security of the future, Part 1

,
/
Software has become an integral part of our everyday lives: whether in the latest electric car, in e-banking or in life-saving systems. One of…
Rathaus

Secure and trustworthy data rooms – a factual tour d’horizon

,
/
The 17th Conference on IT and Law took place on 26 August at Bern City Hall and was dedicated to the topic of data rooms from a regulatory and…
Ghandi 8 15.98x5.98

True or False? How artificial intelligence is making it increasingly difficult to discern reality

,
/
The increasing spread of artificial intelligence and digital communication poses new challenges for human rights. Different value and legal systems…
User Reviewing App Permissions For Informed Consent

Never consent without a clear purpose: the only one way to save self-determination

, ,
/
Consent to the use of mobility data means permission for the collection, storage, and use of personal data. The necessity of such consent is…