Business Goals, Problems, Opportunities…
|“The creation of new business designs by blurring the boundaries between the digital and physical worlds due to the convergence of people, business and things” (Gartner). New technologies like IoT, analytics, machine learning, … are used to realize the digital transformation.
|The concept of disintermediation has been popularized by bitcoin en blockchain. The idea is that in many processes the reliance upon intermediary entities, as well as upon authorities can be severely reduced. This can increase the overall efficiency of the process.
|Technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access (e.g. in the context of cyber warfare).
|The GDPR enters into force in May 2018. What measures should be taken at Smals and within the sector in order to improve the privacy of the citizens?
|Privacy by design
|Privacy by Design is an approach to systems engineering which takes privacy into account throughout the whole engineering process.
|Privacy of Big Data
|Truly anonymizing personal identifiable information (PII) is hard. Therefore, analytics on PII or data derivation from PII should be done with utmost care. What measures can we take and what technologies exist to protect PII, while still allowing analytics?
|Strategic Business Analytics
|Driven by corporate strategy, make use of state-of-the-art Analytics (techniques and platforms) to drive processes and support (informed, measured, evaluated) policy-making in strategic domains. Transcends what is possible with classical Statistics or BI. Should be related to AI.
|Uptake eGov Applications
|Methods and techniques for a better use (uptake) of eGov applications by citizens and other users. User-centric design is an important element of this approach.
|The use of IT to stimulate voluntary participation and self-organization of citizens to create societal added value.
|Sub-domain of Cloud Computing, encompassing all aspects related to the security of and cryptography in the cloud, whether private, public or hybrid.
|Cloud Service Brokerage
|Providing support with added value, such as security and integration, to help customers of Smals use cloud services efficiently and correctly.
|Tools, methods and architectures to evaluate, improve and monitor data quality and to manage information, taking into account cost-benefit ratio and fitness for use. (Includes Master Data Management)
|Internet of Things / Everything
|With the Internet of Things (IoT), many (electromechanical) objects, along with a vast amount of sensors and actuators, become connected to the internet and generate an abundance of data, allowing all kinds of new business.
|Data interoperability based on documented “open data” for citizens, enterprises, … (and in some cases based on web semantics norms)
|Users can interact with an application in a multistep sequence that may last through an extended period of time. The experience seamlessly flows across multiple devices and interaction channels, including non-digital and analog ones, that fulfill the customer journey.