dikitale dictionary

Digitalisation has brought many new words. What do all the acronyms mean, and what is the real explanation of AI?

We have compiled an overview of the most commonly used abbreviations and concepts in the field we work in.

a

ad blocker

Ad block comes from the two English words ‘advertising’ and ‘blocker’, which means advertising blocking. An ad blocker is an app that blocks advertising content from the websites you visit.

ai

AI stands for ‘artificial intelligence’.

AI is fundamentally about the ability to acquire knowledge, perceive and understand the relationships between different phenomena, and think abstractly and solve problems.

API

API stands for ‘Application Programming Interface’. Basically, you can say that an API is the umbilical cord between two different types of software system, where data is exchanged between them in a common language.

b

behaviour patterns

A pattern of behaviour is defined as a particular way of behaving or acting.

BETA VERSION

A beta version is a version of software that has been tested internally by a select group of users.

BIG DATA

Big data often consists of a small amount of  structured data and a large amount unstructured data. The data comes from the company’s digital metrics.

There are great opportunities to leverage the data with AI. In many cases, the data sets contain business knowledge that is often not exploited.

BROWSER APP (browser extension)

A browser app is also called a browser extension. As the word suggests, it is an extension for your browser.

It is an add-on to your browser that provides new functionalities.

BROWSER HISTORY

Your browsing history is a list of sites you have visited.

c

COOKIES

A cookie is a file that is automatically generated and stored in your browser the first time you visit a website, for example. It can contain, among other things, language, location, and preferences.

When the user returns to the site, the stored cookies are loaded and can provide a personalised experience based on the user’s preferences.

Cookies are divided into four categories:

  • Necessary cookies cover the information that makes the website work.
  • Functional cookies provide the user with a tailored website according to the user’s preferences.
  • Statistical cookies measure the user’s behavior on the website.
  • Marketing cookies are used exclusively for advertising.

CYBERCRIME

Cybercrime is a criminal act against a computer, a network or device. The most common forms of cybercrime are email and Internet fraud, identity fraud and fraud involving data exchange and payment card details.

CYBERSECURITY

Cyber ​​security is a collection of different measures that act as a defense for computers, mobile devices, networks and data against external attacks.

CYBERSPACE

Cyberspace comes from English and is a concept. The word refers to the online world as a world that is separate from reality.

d

DATABASE

A database is a collection of data in which it is possible to create relationships.

DATA PROTECTION REGULATION (GDPR)

The GDPR, also known as the Personal Data Regulation, aims to strengthen the protection of personal data in the EU. The regulation is often referred to as GDPR, which stands for ‘General Data Protection Regulation’.

DATA LEAK

Data leakage means inappropriate sharing of data without consent.

DECLARATION OF CONSENT

A consent form is a legally binding agreement between two parties in a specific situation.

DIGITAL consent

Digital consent is a legally binding agreement two parties in a specific situation.

DIGITAL DECLARATIONS

Digital declarations at dikitale mean that, for example, export declarations and consent declarations are digitised

DIGITAL INFRASTRUCTURE

DIGITAL ID

A digital infrastructure is the designed and architecture that supports a digital platform.

A digital ID (e.g. dikitale) allows you to identify yourself digitally.

DIGITALIZATION

It is the transition from an analogue mode to a digital mode.

e

ENCRYPTED DATA

Data encryption is a method of securing against unwanted access by, for example, hackers.

EXPORT DECLARATION

An export declaration is used for trade between countries where duties are disregarded.

g

GDPR

GDPR stands for ‘General Data Protection Regulation’.

The legislation aims to strengthen the protection of EU citizens’ personal data.

h

HACKER

A hacker is someone who exploits any security holes in a computer system or network to gain access.

HACKER ATTACK

A hacker attack is an attack on a computer or network system that exploits possible security vulnerabilities.

HANDSHAKE

A handshake is an agreement between two parties. In dikitale, it means that the user gives his digital consent to a party in the given situation.

i

id-papers

An ID paper is a legal document containing personal data that can help identify the owner.

Examples include  passports, driving licenses or health insurance cards.

IDENTIfication data

The term covers the data that can identify a person or an object.

INcOGNITO

The word comes from the Latin word ‘incognitus’ and means ‘unknown’.

When in incognito mode, you generally do not leave digital traces.

iot

IoT stands for ‘Internet of Things’ and is in a general context all devices connected to the Internet.

k

KYC

KYC stands for ‘Know Your Customer’. A KYC is often used in a financial context where the company needs to identify the customer’s identity because it is legally binding.

l

legal name

The registered name in the CPR register is called the legal name. It is always be updated according to the public registers.

legal residence

A person’s legal address of the residence is the address registered in the CPR register. The address of residence will always be updated according to the public registers.

m

MS SQL

MS SQL stands for ‘Microsoft Structured Query Language’ and is a database system from the manufacturer Microsoft.

n

NFC-CHIP

NFC stands for ‘Near Field Communication’. NCF chips can be embedded smartphones and contactless payment cards, among other things.

The chip allows two devices to be connected without physical contact, where data can be exchanged.

NODA©

NODA© stands for ‘no data access’ and is based on Microsoft’s philosophy that all data is always encrypted for everyone.

p

PAYMENT GATEWAY

A payment gateway is a service for e.g. a webshop that enables online payments.

PDEX©-TECHNOLOGY

PDEX © technology allows websites to display relevant data to private counterparties based on their basic details such as age, gender and postcode.

PERSONAL DATA REGULATION

The GDPR is also known as the Data Protection Regulation and aims to strengthen the protection of personal data in the EU. The regulation is often referred to as GDPR, which stands for ‘General Data Protection Regulation’.

PERSONAL INFORMATION

Personal information can be many things – from your personal identity number, name, address, photo ID, fingerprint and medical record to your car number plate, shoe size and criminal record.

That is, information or a combination of data where it is possible to identify a person. This is called “personally identifiable” data. Often it is the combination of several types of data that together become sensitive data.

PUSH-notification

A push notification is a message that alerts the user with specific information.

q

QR CODE

QR stands for ‘Quick Response’ and can contain data – e.g. a link or a package number.

s

shareyourid.com

shareyourid.com is the platform that allows dikitale users to share their ID safely and securely with another party.

SSN REGISTER

SSN stands for ‘Central Person Register’. The SSN register contains, among other things, the following information about the user:

  • Legal name
  • Legal address of residence
  • Gender
  • CPR number
  • Age
  • Nationality

SYSTEM INTEGRATION

A system integration could be, among other things, an API – the umbilical cord between two different systems.

t

THIRD PARTY

A third party is a person or company that is an outside party in a given situation.

At dikitale, we refer to third parties in the connection of inappropriate sharing of personal data.

the 17 world goals

The SDGs are defined by the UN and consist of 17 goals and 169 sub-goals. The goals strive to ensure sustainable development for people and the planet.

two-factor authentication

A two-factor approval means that two approvals from two different sources are needed to approve an action.

frequently asked questions

Get your questions answered

The questions can be many: How to get started with dikitale? How is the data encrypted? What does it cost to use dikitale?

We have gathered the most frequently asked questions.