top of page
All Posts


Digital Harm & Somalia/Kenya: A Pipeline to Children at Risk
Contributor: Abdikadir Mohamed hassan Summary of the situation in Somalia Somalia’s history makes it a complex operational environment both politically and developmentally. The multi-layered crisis continues to have a profound impact on Somalia, increasing the vulnerability of the population at large. Ongoing political instability, insecurity and armed conflict exacerbate the effects of natural disasters and climate-driven shocks, such as droughts, flooding, and desert locust
john87559
Jul 24 min read


Op-ed: “If China Doesn’t Regulate, Why Should We?” A Lazy Excuse for Inaction
Written by Yvette Hastings You’ve probably heard it before, almost like background noise at this point: “What’s the point of regulating AI if China isn’t doing it?” On the surface, it sounds like a reasonable concern. Nobody wants to fall behind in the tech race. But dig a little deeper and it starts to unravel. It’s a bit like saying, “Why bother with a fire alarm if the neighbour’s house is already on fire?” It misses the point entirely. Skyline of of the city of Shanghai,
john87559
Jun 203 min read


Spotlight: the European AI Act
The Plunk Foundation is excited to introduce a resource to help you navigate the complexities of the EU Artificial Intelligence Act (AIA). "AI Watch: A Simplified Guide to the EU AI Act." This guide, created by privacy analyst, Rachael Olaitan Aborishade, breaks down the key provisions, risk-based approaches, and compliance requirements in a clear format. Why This Guide Matters Artificial intelligence is reshaping our world, but with innovation comes responsibility. The AIA a
john87559
Nov 16, 20241 min read


Cincy AI Week Appearance
Executive Director of the Plunk Foundation, John Cavanaugh, will speak at the fully packed Cincy AI week in Cincinnati Ohio. Visit www.cincyaiweek.com to learn more. John will be on the Responsible AI Safety, Security, and Privacy Panel along with Kris Brannock, Mary Grygleski, Mark Schnitter, and Brad Gardner. For more details on this panel please see https://cincyaiweek.sched.com/event/1dlpq/panel-responsible-ai-safety-security-and-privacy
john87559
Jun 3, 20241 min read


Plunk Foundation to Present to Journalists and Policy Makers
We're going to rely on journalists in today's turbulent climate. And we must protect them! Journalists are harmed by: Government Regimes Terrorist Organizations Violent situations they report Digital Privacy & Journalism: Protects their whereabouts Prevents sensitive information leaks Provides a safe haven from oppressive regimes As such, The Plunk Foundation will speak about privacy at the International Conference on Securitization and Information Policy (ICSIP). Who is this
john87559
Oct 20, 20231 min read


How the Plunk Foundation Aligns with the United Nations
The Plunk Foundation strongly intersects with 3 of the 17 UN sustainable goals and the UN Universal Declaration of Human Rights UN Goal 5: Gender Equality Women are at far higher risk of falling victim to doxxing, online harassment, and tech abuse from domestic partners. The UN did a study of 51 countries [1] which revealed 38% of women had personally experienced online harassment. In 2019, the Domestic abuse charity, Refuge reported that 72% of women [ 2 ] accessing its se
john87559
Sep 25, 20233 min read


What is digital data privacy? How thought leaders define it and why it matters for you and your fam
While the term “privacy” is not explicitly mentioned in the United States Constitution, the Supreme Court has recognized a constitutional right to privacy that is implied by the language and spirit of the First, Fourth, Fifth, and Fourteenth Amendments. In addition to constitutional protections, various federal and state laws define and protect privacy rights. For example, the Health Insurance Portability and Accountability Act (HIPAA) sets standards for protecting the privac
john87559
May 17, 20232 min read


A review of Privacy, Poverty, and Big Data: A Matrix of Vulnerabilities for Poor Americans
The authors examine the risks faced by low-income people due to the collection and analysis of big data and predictive analytics. While big data systems have the potential to expand opportunities for low-income people, they could also worsen economic inequality by preying on or excluding them due to algorithmic biases. The article presents empirical findings from a nationally representative survey that shows how certain low-status internet users are vulnerable to various form
john87559
May 17, 20232 min read


A brief history of big data that everyone should read
Author Bernard Marr provides an insightful overview of the history and evolution of big data, highlighting its various applications, challenges, and potential implications. It delves into how advancements in technology have enabled the collection and analysis of large amounts of data, and how this has led to new insights and opportunities across a range of fields, such as healthcare, business, and government. It explains how the ability to process vast amounts of data has all
john87559
May 17, 20231 min read


European law relating to the rights of children: 2022 edition
The Handbook on European law relating to the rights of the child - 2022 edition is a comprehensive guide that provides an overview of the legal framework governing the rights of children in Europe. The Handbook covers a broad range of topics, including child protection, education, health, and juvenile justice. One of the areas that the Handbook highlights is the importance of data privacy for children. With the increasing use of digital technologies and social media, children
john87559
May 17, 20231 min read


Have you, your family, or your business recently encountered a data breach in the US? What to do
Experiencing a data breach can be a daunting and upsetting experience for anyone, whether it’s an individual or a business. It can leave them feeling vulnerable and concerned about their personal or business information being compromised. Therefore, it’s crucial to create a comprehensive data security program that not only focuses on safeguarding consumer data but also includes a step-by-step plan of action to respond effectively in case of a data breach, empowering individua
john87559
May 17, 20231 min read


The IBM Data Breach Report 2022
The IBM report on data breaches provides an analysis of various factors contributing to data breaches, such as the root causes, types of data compromised, and industries most affected. The report also discusses the importance of implementing effective cybersecurity measures to protect sensitive data from unauthorized access. This report relates to data privacy as it highlights the need for organizations to prioritize data protection and implement robust security measures to p
john87559
May 17, 20231 min read
bottom of page