April 2010

[How to use video-surveillance resposibly | A set of nasty questions to ask your security vendors | Weaknesses in IRS systems continue to jeopardize the confidentiality, integrity and availability of financial and sensitive taxpayer information | Cloud computing | Building a digital economy: the importance of saving jobs in the EU's creative industries | Detecting and defeating government interception attacks against SSL | A security analysis of the Dutch national electronic patient record system | The emerging and future risks framework | The value of behavioral targeting | Protecting the confidentiality of personally identifiable information (PII) | Internalizing identity theft | Facebook - Another breach in the wall | Intellectual property - observations on efforts to quantify the economic effects of counterfeit and pirated goods | Protecting Europe against large-scale cyber-attacks | Under surveillance | Managing re-identification risk | Security in the trenches - Comparative study of IT practitioners and executives in the U.S. federal government | The top 10 web application security risks | Application development security procurement language | Global internet security threat report - volume XV, April 2010 | How different are young adults from older adults when it comes to information privacy attitudes and policies? | Youth, privacy and reputation | Opt-in Dystopias | Promoting confidence in electronic commerce - legal issues on international use of electronic authentication and signature methods]

Spionagerisico's en de nationale veiligheid

More at... [10/04/30 (1)]

E-mail na de dood - juridische bescherming van privacybelangen

More at... [10/04/29 (1)]

Over persoonsgegevens en IP-adressen, en de toekomst van privacywetgeving

More at... [10/04/28 (1)]


More at... [10/04/27 (1)]


More at... [10/04/26 (1)]


More at... [10/04/25 (1)]


More at... [10/04/24 (1)]

Afgeschermde hyves profielen vaak toch zichtbaar

More at... [10/04/19 (1)]

Grenzen aan de aftapbaarheid?

More at... [10/04/18 (1)]


More at... [10/04/17 (1)]


More at... [10/04/16 (1)]

Tussen spionage en veiligheid

More at... [10/04/06 (1)]

Creative Commons License

All original content on this website © 2010 Rina Steenkamp. This work is licensed under a Creative Commons License. On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.