[The privacy dividend - the business case for investing in proactive privacy protection | The inadvertent disclosure of personal health information through peer-to-peer file sharing programs | Verizon incident sharing metrics framework | Learn more about identity theft | The evidence on DNA retention | State of enterprise security, 2010 | Depicting the UK's fraud landscape | Identity and its verification | The electronic police state | Private lives - a people's inquiry into personal information | Promoting trust in the information society by fostering data protection and privacy | The next steps for the Data Protection Directive | Standardizing privacy notices | Evaluating statistical attacks on personal knowledge questions | Side-channel leaks in web applications]
A paper by Suo Chen, Rui Wang, XiaoFeng Wang and Kehuan Zang.
Suo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zang: Side-channel leaks in web applications - a reality today, a challenge tomorrow (PDF)
[Open link in this window | Open link in new window]
FtT: Side-channel leaks in web applications
[Open link in this window | Open link in new window]
[10/03/31]
Research by Joseph Bonneau, Mike Just and Greg Matthews.
Joseph Bonneau, Mike Just, Greg Matthews: What's in a name? Evaluating statistical attacks on personal knowledge questions (PDF)
[Open link in this window | Open link in new window]
BBC News: Weak security ID questions put e-mail at risk
[Open link in this window | Open link in new window]
Light blue touchpaper: Evaluating statistical attacks on personal knowledge questions
[Open link in this window | Open link in new window]
[10/03/30]
An online study by Patrick Gage Kelley, Lucian Cesca, Joanna Bresee and Lorrie Faith Cranor.
Patrick Gage Kelley, Lucian Cesca, Joanna Bresee, Lorrie Faith Cranor: Standardizing privacy notices - an online study of the nutrition label approach (PDF)
[Open link in this window | Open link in new window]
Carnegie Mellon: Standardizing privacy notices - an online study of the nutrition label approach
[Open link in this window | Open link in new window]
Eric Diehl: Privacy notices as "nutrition" label
[Open link in this window | Open link in new window]
[10/03/29]
A speech by Viviane Reding.
Europa: Viviane Reding Vice-President of the European Commission responsible for Justice, Fundamental Rights and Citizenship Next steps for Justice, Fundamental Rights and Citizenship in the EU European Policy Centre Briefing Brussels, 18 March 2010, Brussels
[Open link in this window | Open link in new window]
Tech and law: Data Protection Directive: reform proposals due by end 2010
[Open link in this window | Open link in new window]
More at... [10/03/28 (1)]
An opinion of the European Data Protection Supervisor (EDPS).
EDPS: Opinion of the European Data Protection Supervisor on promoting Trust in the information society by fostering data protection and privacy (PDF)
[Open link in this window | Open link in new window]
Tech and law: EDPS calls for privacy by design for social networks, RFID, advertising; and accountability
[Open link in this window | Open link in new window]
More at... [10/03/27 (1)]
A report by Peter Bradwell of thinktank Demos, which was supported by the UK Information Commissioner and Consumer Focus.
Peter Bradwell: Private lives - a people's inquiry into personal information (PDF)
[Open link in this window | Open link in new window]
Demos: Private lives
[Open link in this window | Open link in new window]
Tech and law: "Private lives - a people's inquiry into personal information" - Demos report
[Open link in this window | Open link in new window]
More at... [10/03/26 (1)]
A report by Cryptohippie.
Cryptohippie: The electronic police state, 2010 national rankings (PDF)
[Open link in this window | Open link in new window]
The register: UK still lousy on electronic nosiness
[Open link in this window | Open link in new window]
[10/03/21]
An article about identity, identity verification and identity cards by Nicholas Bohm and Stephen Mason.
Nicholas Bohm and Stephen Mason: Identity and its verification (PDF)
[Open link in this window | Open link in new window]
Schneier on security: The limits of identity cards
[Open link in this window | Open link in new window]
[10/03/20]
A report by CIFAS.
CIFAS: Fraudscape - depicting the UK's fraud landscape (PDF)
[Open link in this window | Open link in new window]
CIFAS: Fraudscape - report depicts the UK's fraud landscape in 2009
[Open link in this window | Open link in new window]
View from the Bunker: UK ID fraud cases jump a third as malicious insiders turn to cybercrime
[Open link in this window | Open link in new window]
[10/03/14]
A report by Symantec.
Symantec: State of enterprise security, 2010 (PDF)
[Open link in this window | Open link in new window]
Symantec: Symantec 2010 state of enterprise security study shows frequent, effective attacks on worldwide business
[Open link in this window | Open link in new window]
More at... [10/03/13 (1)]
The effect of the UK national DNA database on crime - who to believe?
House of Commons, Home Affairs Committee: The national DNA database (PDF)
[Open link in this window | Open link in new window]
The Guardian: Alan Johnson on Tory crime policy - live
[Open link in this window | Open link in new window]
Blogzilla: The evidence on DNA retention
[Open link in this window | Open link in new window]
More at... [10/03/12 (1)]
Guidelines and fact sheets from the Office of the Privacy Commissioner of Canada.
Office of the Privacy Commissioner of Canada: Learn more about identity theft
[Open link in this window | Open link in new window]
More at... [10/03/08 (1)]
Organising, tracking and responsibly sharing information about security incidents.
Verizon: The Verizon incident sharing metrics framework, beta version one (PDF)
[Open link in this window | Open link in new window]
Verizon Business Security Blog: Verizon incident metrics framework released
[Open link in this window | Open link in new window]
DarkReading: Verizon offers up its data breach framework
[Open link in this window | Open link in new window]
More at... [10/03/07 (1)]
A research paper by Khaled El Emam, Emilio Neri, Elizabeth Jonker, Marina Sokolova, Liam Peyton, Angelica Neisa and Teresa Scassa.
Khaled El Emam, Emilio Neri, Elizabeth Jonker, Marina Sokolova, Liam Peyton, Angelica Neisa, Teresa Scassa: The inadvertent disclosure of personal health information through peer-to-peer file sharing programs (PDF)
[Open link in this window | Open link in new window]
Tech and law: File-sharing software may expose your private health & other data
[Open link in this window | Open link in new window]
More at... [10/03/06 (1)]
A report by the Information Commissioner's Office.
ICO: The privacy dividend - the business case for investing in privacy protection (PDF)
[Open link in this window | Open link in new window]
Tech and law: The Privacy Dividend - business case for privacy & data protection-friendly systems, & the financial value of personal data
[Open link in this window | Open link in new window]
More at... [10/03/05 (1)]
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.