Volg ICTI

Blog

Compliance for AI in healthcare companies: your help needed!

Yasmine Yachou, an MSc student at the Vrije Universiteit Amsterdam, is conducting research into the impact of data laws on healthcare startups and scale-ups. If you work at a AI and healthcare company, please help by participating in the survey for this research.

Sieuwert van Otterloo

Practical bias correction in neural networks: A credit default prediction case study

Snel, P. and van Otterloo, S. 2021. Practical bias correction in neural networks: A credit default prediction case study, Computers and Society Research Journal (2022), 1 DOI: https://doi.org/10.54822/BEWO3288 Piet Snel and Sieuwert van Otterloo Email: sieuwert@ictinstitute.nl Article published online 11 May 2022. Abstract Artificial intelligence (AI) is increasingly being used for decision-making. Technological developments have…

Suzanne Atkins

Security+ explanation and practice questions

Security+ is a certification offered by CompTIA. Those who have passed the exam, keep earning Continuous Education points, and pay the annual maintenance fee may add the title to their name. I (Joost) passed this exam recently and wanted to give you an impression of Security+, why you too might want to get certified, an…

Joost Krapels

Computers and Society Research Conference – 20th May 2022

We are pleased to announce the Computers and Society Research Conference. The conference is an informal get-together for colleagues and friends, and an opportunity for our students to show off their research. The conference will take place 14.00-17.00 on 20th May 2022, on the Dotslash Campus, Europalaan 100, Utrecht.

Suzanne Atkins

Register of suppliers – free template

Suppliers come in all shapes and sizes: utilities, cloud platforms, office facilities, email providers, equipment maintenance, accountants, freelancers, PEN-testers and last but not least, information security consultants like ICT Institute. Your relationship with them should include information security considerations. The security requirements for suppliers depends on the service or product they provide. Your outsourced HR…

Suzanne Atkins