top of page
![](https://static.wixstatic.com/media/763506_8e4ecdffd46f479da289b6cabb43ec2d~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/763506_8e4ecdffd46f479da289b6cabb43ec2d~mv2.webp)
![What is Data Ethics? A deep dive into ethical data use and data privacy.](https://static.wixstatic.com/media/763506_8e4ecdffd46f479da289b6cabb43ec2d~mv2.jpg/v1/fill/w_289,h_217,fp_0.50_0.50,q_90,enc_auto/763506_8e4ecdffd46f479da289b6cabb43ec2d~mv2.webp)
7 min read
What is Data Ethics? A deep dive into ethical data use and data privacy.
Data privacy is vital in data ethics as it protects individuals' control over their personal data, but legal protections alone can't...
![Dark patterns and ethical design in data privacy](https://static.wixstatic.com/media/763506_b4a9d69e49934e1b909c8ba3fd560d6a~mv2.png/v1/fill/w_289,h_217,fp_0.50_0.50,q_95,enc_auto/763506_b4a9d69e49934e1b909c8ba3fd560d6a~mv2.webp)
6 min read
Dark patterns and ethical design in data privacy
Design choices made by websites and applications influence user choice in data privacy. They can foster autonomy, providing users with...
![](https://static.wixstatic.com/media/763506_9e890edf170f4ad6a5de102b666f8d98~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/763506_9e890edf170f4ad6a5de102b666f8d98~mv2.webp)
![Beyond the Grave: Navigating Post-Mortem Data Privacy](https://static.wixstatic.com/media/763506_9e890edf170f4ad6a5de102b666f8d98~mv2.jpg/v1/fill/w_289,h_217,fp_0.50_0.50,q_90,enc_auto/763506_9e890edf170f4ad6a5de102b666f8d98~mv2.webp)
8 min read
Beyond the Grave: Navigating Post-Mortem Data Privacy
In the digital age, the fate of personal data after death remains a captivating enigma. What becomes of our digital lives, encompassing...
![](https://static.wixstatic.com/media/763506_1acaf39bdc224478baadf555ba7c0f71~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/763506_1acaf39bdc224478baadf555ba7c0f71~mv2.webp)
![Gender Data Bias and its Wider Implications](https://static.wixstatic.com/media/763506_1acaf39bdc224478baadf555ba7c0f71~mv2.jpg/v1/fill/w_289,h_217,fp_0.50_0.50,q_90,enc_auto/763506_1acaf39bdc224478baadf555ba7c0f71~mv2.webp)
4 min read
Gender Data Bias and its Wider Implications
For decades, the fight for parity between the genders has been a losing battle. International organisations such as the United Nations...
![](https://static.wixstatic.com/media/763506_9bd546d8bf2e4a5f931cba36b249bbf9~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/763506_9bd546d8bf2e4a5f931cba36b249bbf9~mv2.webp)
![Data Privacy during Conflict: Part II](https://static.wixstatic.com/media/763506_9bd546d8bf2e4a5f931cba36b249bbf9~mv2.jpg/v1/fill/w_289,h_217,fp_0.50_0.50,q_90,enc_auto/763506_9bd546d8bf2e4a5f931cba36b249bbf9~mv2.webp)
12 min read
Data Privacy during Conflict: Part II
Harmful uses of data during violent conflict and political unrest High quality data and information are vital to making good decisions....
![](https://static.wixstatic.com/media/763506_746eee95954744099c5ebde205aedcf5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/763506_746eee95954744099c5ebde205aedcf5~mv2.webp)
![Data Privacy during Conflict: Part I](https://static.wixstatic.com/media/763506_746eee95954744099c5ebde205aedcf5~mv2.jpg/v1/fill/w_289,h_217,fp_0.50_0.50,q_90,enc_auto/763506_746eee95954744099c5ebde205aedcf5~mv2.webp)
8 min read
Data Privacy during Conflict: Part I
Modern conflicts are not only fought out on the battlefields, but also in cyberspace. As our lives are permanently technologically...
bottom of page