<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.gccollab.ca/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Keith.douglas</id>
	<title>wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.gccollab.ca/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Keith.douglas"/>
	<link rel="alternate" type="text/html" href="https://wiki.gccollab.ca/Special:Contributions/Keith.douglas"/>
	<updated>2026-04-29T10:04:19Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.35.2</generator>
	<entry>
		<id>https://wiki.gccollab.ca/index.php?title=Talk:Renewing_the_GC_Data_Strategy&amp;diff=75082</id>
		<title>Talk:Renewing the GC Data Strategy</title>
		<link rel="alternate" type="text/html" href="https://wiki.gccollab.ca/index.php?title=Talk:Renewing_the_GC_Data_Strategy&amp;diff=75082"/>
		<updated>2022-07-06T13:42:38Z</updated>

		<summary type="html">&lt;p&gt;Keith.douglas: Some initial comments&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Speaking for myself ONLY:&lt;br /&gt;
&lt;br /&gt;
A data strategy IMO needs very close attention to mechanisms used to acquire, process, store, etc. these data. Development standards (particularly in the cybersecurity space) are very out of date - they reflect 1990s style &amp;quot;big bang&amp;quot; releases and paper assessments, no assignment of controls until months into a project, etc. This has to be changed or people will end run around procedures.&lt;br /&gt;
&lt;br /&gt;
Worse, some initiatives to &amp;quot;democratize&amp;quot; the development process also jeopardize what '''little''' we have in this respect. IMO, we should be moving towards professionalization in software development, application security, data security (which was barely alluded to at all in the talks, which is terrifying), etc. Remember that data *integrity* is as important (or often more) than confidentiality, and so even if there is a revolution in &amp;quot;secrecy&amp;quot; there is still a problem with data omissions, misrepresentations, distoritions, etc. that is not only the target of bad actors, but also just a way to suffer accidents.&lt;br /&gt;
&lt;br /&gt;
Finally, there is a desire to use certain acquisitions of extremely fraught ethical character - for example, spidering. Clear, agilily updatable regulations (legal sanction to departments, particularly) and very very concrete specifics on what is tolerated and not. A campaign to make the public aware of this and standards for being ignored personally (including businesses). Serious engagement with the philosophy of computing community on matters related is also vital (and this must also go beyond ethics to epistemology and effectively also, metaphysics like theories of human nature); scholars like H. Nissenbaum have pointed out that our traditional categories of privacy and such are not anything like how people actually behave and think. Whole categories of thought on these matters are not reflected (yet!) in law and policy. One interesting and terribly complicated example - terms of service. Do we honour them?&lt;/div&gt;</summary>
		<author><name>Keith.douglas</name></author>
	</entry>
	<entry>
		<id>https://wiki.gccollab.ca/index.php?title=Talk:M365/Home/PowerBI&amp;diff=30563</id>
		<title>Talk:M365/Home/PowerBI</title>
		<link rel="alternate" type="text/html" href="https://wiki.gccollab.ca/index.php?title=Talk:M365/Home/PowerBI&amp;diff=30563"/>
		<updated>2020-07-31T13:14:15Z</updated>

		<summary type="html">&lt;p&gt;Keith.douglas: Application security resources?&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;We've found that doing proper application security with Power BI stuff is hard:&lt;br /&gt;
(a) &amp;quot;Everyone wants to use it&amp;quot;, so lots of activity&lt;br /&gt;
(a2) Corrolary: proper software development techniques have to be instituted for a large group, etc.&lt;br /&gt;
(b) Microsoft does not supply elementary diagnostic tools like request-response logs&lt;br /&gt;
(c) The ecosystem does not seem to do much validation (or at least documented as such) on visualizers&lt;br /&gt;
(d) The &amp;quot;SaaS&amp;quot; nature blackboxes a lot of the functions&lt;br /&gt;
(e) Some aspects like returning all of the Undo history to Micorosoft's engines as part of the upload is dubious&lt;br /&gt;
etc.&lt;br /&gt;
(f) Microsoft says effectively, &amp;quot;by all means, pentest, but we won't help you understand the result because we won't document our appliances for you.&amp;quot; This is the opposite of the Open By Default principles we are supposed to work with and annoying/hard to work with to boot. (This is a generalization of b, I guess.)&lt;br /&gt;
&lt;br /&gt;
Anyone have any good ideas on the software/application security front here?&lt;/div&gt;</summary>
		<author><name>Keith.douglas</name></author>
	</entry>
</feed>