Monthly Archives: March 2015

Archived Posts

2015-03-28 by: James Bone Categories: Risk Management Are basic Human Rights being violated by Big Data?

The Edwastock-photo-11012758-computer-networkrd Snowden insider threat has been played out in a variety of scenarios but the questions have been expressed as theoretical “What IF” table top exercises at best.   To date no research has been conducted to analyze the potential unintended circumstances that could lead to real harm to society and basic human rights if big data is misused.

That is until now.   A research grant of nearly 5 million pounds or $7.4 million US dollars has been awarded to the Economic and Social Research Council (ESRC) at the University of Essex who will lead the first global project investigating the human rights implications of the collection, storage and use of big data.

The project will explore how big data that is gathered through social media can be used against us and to determine if there are ways to document human rights violations through the exploitation of this information.

Essex University will conduct the research through its Human Rights Centre using a multidisciplinary team of experts from law, social science, computer science and technology.    Principal investigator, Professor Maurice Sunkin of the Essex School of Law noted, “Rapid technological developments, and our engagement with things like social media, enable unprecedented collection and analysis of big data.

“The data can be used to provide comprehensive profiles of our societies, and of identifiable individuals.  While offering huge potential benefits this poses significant threats to fundamental human rights.”

“Adopting a global perspective, our research will improve understanding and assist the development of law to enable us to benefit from big data, while limiting the potential harm and ensuring human rights are protected.”

For more information please contact the University of Essex Communications Office telephone:  01206 872400 or email: comms@.

2015-03-10 by: James Bone Categories: Risk Management HP Cyber Risk Report 2015

You must be logged in to view this document. Click here to login

free_59647 images for thegrcbluebook working on laptopThe headlines show us any business can become a victim of cyber crime. To fight back, we need to understand the vulnerabilities that exist in IT infrastructure and applications and how hackers exploit them to penetrate defenses and steal data.

The HP Cyber Risk Report 2015 provides a broad overview of the threat landscape and how hackers operate. The report executive summary brings you the facts and findings you need to better understand the threat and deploy your defenses. Read it to learn:

  • The top exploits of 2014;
  • The evolving mobile malware threat;
  • How the Internet of things will increase threats;
  • Why multi-layer defenses are now required.
2015-03-06 by: James Bone Categories: Risk Management 2015 GRC Survey

You must be logged in to view this document. Click here to login

Grant Thornton LLP’s 2015 Governance, Risk and Compliance Survey, which has previously only surveyed chief audit executives (CAEs), expanded this year to include responses from audit committee members.

2015-03-03 by: James Bone Categories: Risk Management 1st Issue of the Journal of Enterprise Risk Management

stock-photo-4637317-business-meetingYou must be logged in to view this document. Click here to login

The Journal of Enterprise Risk Management aim is to become a bridge among risk professionals and academics, as reflected in the heterogeneity of JERM’s Authors.  As widely recognized, Enterprise Risk Management is a relatively new approach to risk management that is characterized by a high degree of integration at enterprise-wide level, is proactive and linked with corporate strategy.

<a href=””>Feed Shark</a>