d200x250

Interview with Dr. Rogier Creemers: AI + Social Credit + Algorithmic Governance + Cybersecurity + VPNs

It’s 2017. The world is increasingly looking eastwards for the latest technology and policy developments emerging out of Asia. When it comes to China, news of advances in AI and mobile payment systems battles for attention with thought pieces about social credit rating and circumvention tools. In July, a roadmap for AI development targeted China[…]

0-r1tpi91uEjNEPfwV

Blockchain for Music? Enter Musicoin

  Visualise this scenario for a moment. As a music lover, you have access to all the tunes in the world on your devices: no subscription and platform lock-in, no libraries divided across multiple apps, no regional restrictions. All the music you want, and fully interoperable. As a musician, you have the ability to copyright[…]

15070710118089

Lead Leapfrogger: Chinese O2O Commerce and The Nature Of Cultural Innovation

I. The Remarkable Story of Everyday O2O Commerce in China Let’s say you were planning to visit China ten years ago. You would have your visa and flights booked, perhaps even a hotel. But the preparations wouldn’t end there. You’d have withdrawn plenty of RMB in cash, which you’d need for just about everything, except[…]

Screen Shot 2016-12-21 at 6.07.23 pm

Taiwan’s g0v community holds 23rd hackathon

The Taiwanese civic tech community g0v held their ‘g0v hackath22n’ on December 17, a bimonthly event where citizens propose and present projects aimed at promoting civic participation and government transparency. “G0v is a vibrant community where you can actually meet new people and work on projects offline,” g0v co-founder Chia-liang Kao said. Participants’ projects ranged[…]

Pleniere

The Data Protection Convention that We All Need

Once upon a time, in a faraway land (Europe), some countries decided that it would be worth setting in stone (in an international treaty) the protection of persons when information on them were being used (automatically processed by computer). The Convention of the Council of Europe for the Protection of Individuals with regard to Automatic[…]

Screen Shot 2017-02-22 at 6.33.59 pm

Saving Face 2.0: 8 Simple Rules for Surviving China’s New Rating System

While China’s new surveillance policy purports to be a “credit system,” it in fact considers nearly every aspect of public and private behaviour in determining each citizen’s social score. These data points are not random, and have historical and cultural significance to the Chinese people, including the concept of “saving face,” or maintaining a good[…]

3295487447_6e33b95a2b_m

Data Privacy about more than Privacy

It is often forgotten that laws concerning data privacy serve purposes other than protecting privacy alone. Research conducted by this writer in New Zealand over the last decade has conclusively established in the first place that the vast majority (around 80% in one study) of litigation brought under the Privacy Act 1993 (the Act) was[…]

3123942310_82191296fb_m

Data protection: How are attitudes to disclosure changing? 

As more of our personal data is held in centralized, remote storage, it has become a tempting target for law enforcement and intelligence agencies.  Through various investigatory powers, these government agencies can demand that social media companies, e-mail providers, ISPs, and other intermediaries turn over sensitive records and message content.  Are governments abusing their investigatory[…]