Latest blog articles

  • I am very pleased that today we will start teaching the EU and Global Cybersecurity Fundamentals course within the Advanced Master in Privacy, Cybersecurity and Data Management LLM we created at ECPC. Today we will kick off the course with Brian Honan, who will lecture on the concept of...

  • When we think of cybersecurity we are generally concerned with the code, algorithms and systems that are responsible for the functioning of out digital technologies and the safety of our sensitive data. What has become increasingly apparent is the role of humans in ensuring the security of our...

  • Could you estimate how much time of your day you spend on social media? The answer would most likely be something along the lines of ‘a lot’ or ‘I’m always connected, so I get notifications all the time anyways’ but an actual estimate, that’s a very tough guess to take. However, for most people, it...

  • One view on social media communication is that platforms should remove content deemed to be inappropriate or disturbing and suspend users who have repeatedly violated the Community Guidelines and should do so in a consistent and coherent manner. A contrasting view is that users can share what they...

  • The disturbances social media has been causing to its users’ mental health cannot be ignored. It is of extreme importance that the private and public spheres work together to protect consumers from the unfeasible search for perfection.

  • Over the few past years, there has been a professionalization of social media content creators. These creators now have the power to sway their followers, start trends, or serve as role models for their audiences. These individuals, that have such online persuasive power, are called “influencers”...