Skip to content
Dr. Waël Hassan

Dr. Waël Hassan

Innovator Big Data, Social Analytics, Privacy, & Cybersecurity

  • Home
  • Books
  • Democracy Project
  • About

Latest Blogs

THE PRIVACY ACCORD: AN OPEN LETTER
Innovation, Privacy

THE PRIVACY ACCORD: AN OPEN LETTER

PRIVACY INNOVATION IN CANADIAN LAW, TECHNOLOGY, AND CORPORATE CULTURE I invite you and other privacy leaders to join me in […]

5 hints can help you recognize a fake LinkedIn profile
social

5 hints can help you recognize a fake LinkedIn profile

We received great feedback on our recently about hacking on LinkedIn . LinkedIn, as a business social network, offers a forum for members to post […]

The Startup’s Guide to Privacy: Turning Privacy into a Competitive Advantage – MaRS Best Practices MaRS Discovery District, Toronto, ON
social, Training

The Startup’s Guide to Privacy: Turning Privacy into a Competitive Advantage – MaRS Best Practices MaRS Discovery District, Toronto, ON

This is an event announcement. Register Here On January 28, 2016, Canada, along with many countries, will celebrate Data Privacy Day. Recognized […]

Canada’s Security Agency Issues:Top 10 Actions to Take to Eliminate Cyber Threats
Security

Canada’s Security Agency Issues:Top 10 Actions to Take to Eliminate Cyber Threats

In this series of posts, we review recommendations for workplace cyber security published by the Communications Security Establishment Canada. Today, […]

Agile Privacy for Modern Software Development
Privacy

Agile Privacy for Modern Software Development

 With the increasing popularity of agile IT, privacy officers responsible for assessing new software programs are finding it difficult to […]

Security

The Best Encryption ceases to work upon the first authorized access

Has encryption protect google and yahoo against NSA snooping, simply not.   Was the NSA protected against data extract by an […]

About Waël, Privacy, Security

IAM Maturity Model

Identity and Access Management (IAM) has two seemingly opposed purposes: to enable user access to information, and to block user […]

Privacy, Security, Uncategorized

Governance Analysis Method – PhD Thesis Waël Hassan

Governance Analysis is a logic-based, computer assisted framework for validating legal compliance of enterprise governance models. This framework is intended […]

eHealth, Privacy, Uncategorized

De-Identification Maturity Model

Recently I have been working on a formal framework for evaluating the maturity of de-identification services within an organization. The […]

Security, Uncategorized

An Enterprise Legal Reference Model

We have developed an enterprise reference model used to conceptualize enterprise elements. The model suggests three planes: Subject and role-grouping […]

Posts navigation

1 … 5 6 7 8 9 10

Copyright © 2020 | All Rights Reserved. BlogJr by Shark Themes

Get Support