15070710118089

Lead Leapfrogger: Chinese O2O Commerce and The Nature Of Cultural Innovation

I. The Remarkable Story of Everyday O2O Commerce in China Let’s say you were planning to visit China ten years ago. You would have your visa and flights booked, perhaps even a hotel. But the preparations wouldn’t end there. You’d have withdrawn plenty of RMB in cash, which you’d need for just about everything, except[…]

Screen Shot 2016-12-21 at 6.07.23 pm

Taiwan’s g0v community holds 23rd hackathon

The Taiwanese civic tech community g0v held their ‘g0v hackath22n’ on December 17, a bimonthly event where citizens propose and present projects aimed at promoting civic participation and government transparency. “G0v is a vibrant community where you can actually meet new people and work on projects offline,” g0v co-founder Chia-liang Kao said. Participants’ projects ranged[…]

Pleniere

The Data Protection Convention that We All Need

Once upon a time, in a faraway land (Europe), some countries decided that it would be worth setting in stone (in an international treaty) the protection of persons when information on them were being used (automatically processed by computer). The Convention of the Council of Europe for the Protection of Individuals with regard to Automatic[…]

Screen Shot 2017-02-22 at 6.33.59 pm

Saving Face 2.0: 8 Simple Rules for Surviving China’s New Rating System

While China’s new surveillance policy purports to be a “credit system,” it in fact considers nearly every aspect of public and private behaviour in determining each citizen’s social score. These data points are not random, and have historical and cultural significance to the Chinese people, including the concept of “saving face,” or maintaining a good[…]

3123942310_82191296fb_m

Data protection: How are attitudes to disclosure changing? 

As more of our personal data is held in centralized, remote storage, it has become a tempting target for law enforcement and intelligence agencies.  Through various investigatory powers, these government agencies can demand that social media companies, e-mail providers, ISPs, and other intermediaries turn over sensitive records and message content.  Are governments abusing their investigatory[…]

Screen Shot 2016-12-02 at 7.24.00 pm

AI in Australian vehicles – how is privacy faring so far?

Automated technologies using artificial intelligence are increasingly being applied in daily life, and Australia is no exception. Transportation has emerged as a prominent area in which AI and automation are being deployed among the general population, prominently unmanned aerial vehicles (UAVs – better known as drones) and autonomous vehicles (better known as ‘driverless cars’). While[…]