Business Goals, Problems, Opportunities…
Cloud Security | A sub-domain of cloud computing, encompassing all aspects of security and cryptography related to cloud computing, whether private, public or hybrid. |
Customer support automation | Customer support automation is anything that aims to reduce or eliminate the need for human involvement in solving customer inquiries, for example by automatically answer email questions or even phone calls. It also comprises assistance for call centre agents by providing answer suggestions. |
Cybersecurity | Cybersecurity is composed of technologies, processes, and practices designed to protect networks, computers, applications, and data from attack, damage or unauthorised access. Defence against powerful and organised attackers is gaining importance. Ransomware is a worrying trend. |
Digital Identity Wallet | Digital identity wallets (DIW) enable the sharing of identity data and all kinds of attestations across any number of organisations and use cases. Through the European DIW, citizens will be able to prove their identity and share information from their DIW, while staying in control of their data. |
Explainable AI | Public sector’s business needs require any deployed AI system to be robust and explainable. To this end we investigate existing and upcoming tools that increase transparency of AI systems towards the end user. |
Generative AI | Generative AI is the technology to create new content by utilising existing text, audio files, or images. With generative AI, computers detect the underlying patterns related to the input and produce similar content. |
Personalisation | The goal of personalisation is to accomplish a relevant and individualised interaction between an organisation and her target audience in order to improve the user experience. |
Public Cloud for eGov | We see also in Belgium a tendency (or desire) of government organisations in using public cloud infrastructure and applications. But GDPR legislation, and privacy-issues can be a killjoy… |
Security & Crypto Guidance | Correct implementation of secure systems as well as the correct application of cryptographic algorithms is a complex and continuously evolving endeavour which requires expert knowledge. In order to streamline this, security & crypto guidelines are indispensable. |
Data Quality | Tools, methods and architectures to evaluate, improve and monitor data quality and to manage information, taking into account cost-benefit ratio and fitness for use (Includes Master Data Management). |
Data sovereignty | Data sovereignty is the idea that data are subject to the laws and governance structures within the nation it is collected. The concept of data sovereignty is closely linked with data security, cloud computing and technological sovereignty. |
Design Thinking | Used to improve the design from software to products and services. Empathy for users and the gathering of insight into their needs and motivations is crucial. Used for digital innovation with focus on people. Closely related to Human-Cantered Design and the uptake of (government) applications. |
Digital Transformation | By exploiting the latest technologies (like IoT, analytics, machine learning…), business models can be changed/transformed and new robust digital business models can be created. |
Event Storming | Proliferation of APIs and integrations necessitates better coordination between products/teams. Event storming, in which a business process is “stormed out” as a series of domain events, can rapidly identify key concepts in a problem space and align a variety of stakeholders. |
Knowledge Retention | When an employee leaves an organisation, so does a part of an organisation’s intellectual capital. Knowledge retention is a specific process within wider knowledge management activities concerned with persevering that intellectual capital. |
Regulatory Compliance | The number of regulations is increasing; GDPR, NIS2 and the Data Governance Act are a few notable examples. Compliance with all applicable regulations becomes increasingly challenging. |
Resilience & High Availability | High availability is a characteristic of a system, which aims to ensure an agreed level of operational performance, usually uptime, for a higher than normal period. Modernisation has resulted in an increased reliance on these systems. |
Sovereign Cloud | Sovereign cloud is the provisioning of cloud services in compliance with local laws and regulations regarding data security and privacy, so that data remains under sovereign control and jurisdiction, preventing access to data by foreign authorities. |
Sustainable IT | IT has a twofold impact on the current ecological crisis. It may reduce the ecological footprint of existing processes, but is has a considerable ecological footprint throughout its lifecycle (from mining to e-waste). Public sector should maximise the first and minimise the second. |
Unlocking Data for Secondary Purposes | Secondary use of data, including sensitive personal data, can lead to insights invaluable to society. This should happen in a controlled, privacy-friendly way. Regulation, in particular the Data Governance Act, creates a framework. Innovative technologies enable new possibilities |
Civic Engagement | The use of IT to stimulate voluntary participation and self-organisation of citizens to create societal added value. The citizen can assume one or more roles, such as data provider. |
Cloud Migration | As the pressure to move solutions to the Public Cloud increases, so does the inherent danger of vendor lock-in. Therefore, Cloud Migration strategies and techniques become a more important defensive measure to safeguard an enterprise’s flexibility in choosing Cloud Service Providers. |
Dark/Deep Web | The deep web is the part of the Web not indexed by search engines. The dark web is the deep web only accessible with specific software, configurations, or authorisation. Both are mostly used for criminal activities, such as drug fraud, illicit work, hacking preparations & trade of stolen data. |
Multiexperience | Refers to a user’s whole experience with one application across a variety of digital touchpoints—websites, apps, chatbots, AR/VR, wearables—using a combination of interaction modalities, like touch, voice, vision, and motion. Purpose: support a seamless and consistent user journey. |
Open Data | Data interoperability based on documented “open data” for citizens, enterprises, … (and in some cases based on web semantics norms). One of the most important forms of open data is open government data. Mostly there are severe data quality issues. |
Reliability of Computer Evidence | Computer systems are regularly used to provide evidence to resolve disputes. Sometimes this evidence is wrong. Isolation of high level of assurance authentication system, reasonable disclosure of development process, understanding of the generation of evidence in highly complex systems. |
Shadow AI | The phenomenon where individuals (e.g. ‘citizen data scientists’) use easy-to-use tools to develop their own AI-solutions and models. Very powerful for the business, but also dangerous for an untrained audience and in the context of ethical decisions and biased data. |
Internet of Things / Everything | With the Internet of Things (IoT), many (electromechanical) objects, along with a vast amount of sensors and actuators, become connected to the internet and generate an abundance of data, potentially impacting existing businesses while allowing new ones. |
Metaverse | A converged network of virtual-reality spaces or augmented reality where users can interact with a computer-generated environment and other users to socialise, buy (virtual) goods, perform work-related activities, etc. |