Team Silhouette

Who tells you what to do?

People working in Information Technology (IT) must be trusted with many things so we look for people who are ethical....

June 29th, 2015 Donna Lindskog

money, IT expenses, saving, calculator

What IT leaders can learn about ethics from Mike Duffy

The subject of ethics continues to appear during the Mike Duffy trial and it should trigger thoughts about how we...

June 5th, 2015 Donna Lindskog

The future of IT

Wisdom: Designers are servants

I recently found some wise words about the design role.  In the book Wisdom by Andrew Zuckerman,  Terence Conran says...

May 11th, 2015 Donna Lindskog

People standing in a business meeting

Ethics say IT should track and measure projects

Ethics is often seen as being about what should NOT be done. The CIPS code of ethics says we should avoid...

March 26th, 2015 Donna Lindskog

Feature image Photoshop3D printing

3D printers are a new means of production, but that might not be a good thing

As with all new technology, 3D printers can have both positive and negative implications. In the case of these printers,...

March 5th, 2015 Donna Lindskog

Do politicians have the right to say who else has access to your social media?

Should Obama go through your Facebook, Twitter and other social media accounts?

Politicians are now coming to software companies asking for back doors to be able to track terrorists and cyber-attacks. In...

February 2nd, 2015 Donna Lindskog

Security Encryption Graphic

Should businesses respond to terrorism threat levels?

After the shootings on Parliament Hill businesses may consider if they have a role protecting information in our country. When...

November 14th, 2014 Donna Lindskog

Cartoon Selfie by Donna Lindskog

Songvids and copyright

IT professionals should take a lesson from the digital camera industry about how technology can impact the public. I recently...

August 5th, 2014 Donna Lindskog

Data Analytics Charts

Increasing ethics training is the answer to cyberthreats

Over 90 per cent of networks are compromised and this can happen in less than 20 minutes when exposed to...

July 3rd, 2014 Stephen Ibaraki