[Feasibility and real-world implications of web browser history detection | Identity theft - the aftermath 2009 | The Italian Google-case - privacy, freedom of speech and responsibility of providers for user-generated contents | What you see is what they get - Protecting users from unwanted use of microphones, cameras and other sensors | I'm allowing what? Disclosing the authority applications demand of users as a condition of installation | How global organizations approach the challenge of protecting personal data | How unique is your web browser? | Experimental security analysis of a modern automobile | Digital competitiveness report | The information dividend: Can IT make you 'happier'? | Privacy regulation and online advertising | Information security breaches survey 2010 | Journal of Virtual Worlds Research | Is the internet for porn? An insight into the online adult industry | "The strategic context and the role of data protection authorities in the debate on the future of privacy" | "Data protection and cloud computing under EU law" | "Internet of things: ubiquitous monitoring in space and time" | Legal, economic and cultural aspects of file sharing | Priorities for research on current and emerging network trends | Evaluation of Directive 2006/24/EC and of national measures to combat criminal misuse and anonymous use of electronic communications | Report on the joint review of the implementation of the Agreement between the European Union and the United States of America on the processing and transfer of Passenger Name Record (PNR) data by air carriers to the United States Department of Homeland Security (DHS) | The economic and social role of internet intermediaries | Opinion on the Proposal for a Directive of the European Parliament and the Council on waste electrical and electronic equipment (WEEE) | Mobile identity management | Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT and RFID technology | Analyzing the first years of the Ticket or Click It mobilizations]
A paper by Artur Janc and Lukasz Olejnik.
Artur Janc and Lukasz Olejnik: Feasibility and real-world implications of web browser history detection (PDF)
[Open link in this window | Open link in new window]
What the internet knows about you: Real-world web browser history detection results
[Open link in this window | Open link in new window]
Schneier on security: Detecting browser history
[Open link in this window | Open link in new window]
A report by the Identity Theft Resource Center (ITRC)
ITRC: Identity theft - the aftermath 2009 (PDF)
[Open link in this window | Open link in new window]
DarkReading: ID theft victims spend less in cleanup aftermath
[Open link in this window | Open link in new window]
A paper by Giovanni Sartor and Mario Viola de Azevedo Cunha.
Giovanni Sartor and Mario Viola de Azevedo Cunha: The Italian Google-case - privacy, freedom of speech and responsibility of providers for user-generated contents (SSRN)
[Open link in this window | Open link in new window]
IGP: Light shed on the Google-Italy case
[Open link in this window | Open link in new window]
A paper by Jon Howell and Stuart Schechter.
Jon Howell and Stuart Schechter: What you see is what they get - Protecting users from unwanted use of microphones, cameras and other sensors (PDF)
[Open link in this window | Open link in new window]
Schneier on security: Alerting users that applications are using cameras, microphones, etc.
[Open link in this window | Open link in new window]
A paper by Jennifer Tam, Robert W. Reeder and Stuart Schechter.
Jennifer Tam, Robert W. Reeder and Stuart Schechter: I'm allowing what? Disclosing the authority applications demand of users as a condition of installation (PDF)
[Open link in this window | Open link in new window]
Schneier on security: Applications disclosing required authority
[Open link in this window | Open link in new window]
More at... [10/05/28 (NL/01)]
More at... [10/05/28 (NL/02)]
More at... [10/05/28 (NL/03)]
A report by Accenture.
Accenture: How global organizations approach the challenge of protecting personal data (PDF)
[Open link in this window | Open link in new window]
Accenture: Creating a culture of caring regarding data privacy and protection
[Open link in this window | Open link in new window]
A report from EFF's Panopticlick project.
Peter Eckersley: How unique is your web browser? (PDF)
[Open link in this window | Open link in new window]
EFF: Web browsers leave 'fingerprints'behind as you surf the net
[Open link in this window | Open link in new window]
The register: Most browsers leave fingerprint that can ID users
[Open link in this window | Open link in new window]
Ars technica: How your web browser rats you out online
[Open link in this window | Open link in new window]
A paper by Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham and Stefan Savage.
Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham and Stefan Savage: Experimental security analysis of a modern automobile (PDF)
[Open link in this window | Open link in new window]
Center for Automotive Embedded Systems Security: Publications
[Open link in this window | Open link in new window]
Techdirt: Wait, now I need security software for my car, too?
[Open link in this window | Open link in new window]
NetworkWorld: Car hackers can kill brakes, engine and more
[Open link in this window | Open link in new window]
A set of reports published by the European Commission (EC) covering, among other things, the social and economic impact of ICT.
EC: Digital competitiveness report
[Open link in this window | Open link in new window]
EC: The social impact of ICT (PDF)
[Open link in this window | Open link in new window]
EC: The economic impact of ICT (PDF)
[Open link in this window | Open link in new window]
A study by BCS.
BCS: The information dividend: Can IT make you 'happier'? (PDF)
[Open link in this window | Open link in new window]
Ars technica: Broadband makes women happy
[Open link in this window | Open link in new window]
A paper by Avi Goldfarb and Catherine Tucker.
Avi Goldfarb, Catherine Tucker: Privacy regulation and online advertising (SSRN)
[Open link in this window | Open link in new window]
MediaPost: Study - even moderate privacy regulation reduces ad effectiveness
[Open link in this window | Open link in new window]
More at... [10/05/21 (NL/01)]
More at... [10/05/21 (NL/02)]
A technical report by PricewaterhouseCoopers.
PwC: Information security breaches survey 2010 (PDF)
[Open link in this window | Open link in new window]
DarkReading: Breaches rise in U.K. firms along with wireless, VoIP, social networking
[Open link in this window | Open link in new window]
An on-line journal.
Journal of Virtual Worlds Research
[Open link in this window | Open link in new window]
Ars technica: Sociologists invade World of Warcraft, see humanity's future
[Open link in this window | Open link in new window]
A paper by Gilbert Wondracek, Thorsten Holz, Christian Platzer, Engin Kirda and Christopher Kruegel.
Gilbert Wondracek, Thorsten Holz, Christian Platzer, Engin Kirda and Christopher Kruegel: Is the internet for porn? An insight into the online adult industry (PDF)
[Open link in this window | Open link in new window]
Tech and law: Online porn - economics, security, cybercrime
[Open link in this window | Open link in new window]
More at... [10/05/14 (NL/01)]
More at... [10/05/14 (NL/02)]
A speech by Peter Hustinx, European Data Protection Supervisor.
Peter Hustinx: "The strategic context and the role of data protection authorities in the debate on the future of privacy" (PDF)
[Open link in this window | Open link in new window]
Tech and law: Data Protection Directive Reform - Hustinx views
[Open link in this window | Open link in new window]
A speech by Peter Hustinx, European Data Protection Supervisor.
Peter Hustinx: "Data protection and cloud computing under EU law" (PDF)
[Open link in this window | Open link in new window]
Tech and law: EU - cloud computing - data protection, security
[Open link in this window | Open link in new window]
A speech by Giovanni Buttarelli, Assistant European Data Protection Supervisor.
Giovanni Buttarelli: "Internet of things - ubiquitous monitoring in space and time" (PDF)
[Open link in this window | Open link in new window]
Tech and law: EU data protection - internet of things, RFID
[Open link in this window | Open link in new window]
A report by Nico van Eijk, Joost Poort and Paul Rutten.
Nico van Eijk, Joost Poort, Paul Rutten: Legal, economic and cultural aspects of file sharing (PDF)
[Open link in this window | Open link in new window]
Ars technica: File-sharers are content industry's "largest customers"
[Open link in this window | Open link in new window]
A report by the European Network and Information Security Agency (ENISA).
ENISA: Priorities for research on current and emerging network trends (PDF)
[Open link in this window | Open link in new window]
ENISA: Priorities for research
[Open link in this window | Open link in new window]
Tech and law: EU - cloud computing - data protection, security
[Open link in this window | Open link in new window]
More at... [10/05/07 (NL/01)]
More at... [10/05/07 (NL/02)]
A leaked version of the evaluation of the Data Retention Directive.
Evaluation fo Directive 2006/24/EC and of national measures to combat criminal misuse and anonymous use of electronic communications (Google docs, large PDF file)
[Open link in this window | Open link in new window]
Blogzilla: Government requests for internet and phone records
[Open link in this window | Open link in new window]
Tech and law: Government requests to access citizens' personal information from Google; European telcos
[Open link in this window | Open link in new window]
A report by the European Commission and the United States Department of Homeland Security.
Report on the joint review of the implementation of the Agreement between the European Union and the United States of America on the processing and transfer of Passenger Name Record (PNR) data by air carriers to the United States Department of Homeland Security (DHS) (PDF)
[Open link in this window | Open link in new window]
DHS Response to the European Commission's report on the joint review of the U.S.-EU Passenger Name Record Agreement (PDF)
[Open link in this window | Open link in new window]
Tech and law: EU-US PNR agreement - EU review report issued
[Open link in this window | Open link in new window]
A report by the Organisation for Economic Co-operation and Development (OECD).
OECD: The economic and social role of internet intermediaries (PDF)
[Open link in this window | Open link in new window]
Tech and law: Internet intermediaries - OECD report on economic and social role
[Open link in this window | Open link in new window]
An Opinion of the European Data Protection Supervisor (EDPS).
EDPS: Opinion of the European Data Protection Supervisor on the Proposal for a Directive of the European Parliament and the Council on waste electrical and electronic equipment (WEEE) (PDF)
[Open link in this window | Open link in new window]
Tech and law: Personal data on hard drives etc - EDPS opinion on waste electrical and electronic equipment
[Open link in this window | Open link in new window]
A position paper by ENISA.
ENISA: Mobile identity management (PDF)
[Open link in this window | Open link in new window]
Tech and law: Mobile identity management - ENISA report on risks, legal issues, recommendations
[Open link in this window | Open link in new window]
A report by ENISA.
ENISA: Flying 2.0 (PDF)
[Open link in this window | Open link in new window]
Tech and law: Flight security - ENISA report on RFID, internet of things
[Open link in this window | Open link in new window]
A report by the National Highway Traffic Safety Administration (NHTSA). (Seat belt use with some lessons for security awareness.)
NHTSA: Analyzing the first years of the Ticket or Click It mobilizations (PDF)
[Open link in this window | Open link in new window]
HoneyTech blog: Ticket or Click-It
[Open link in this window | Open link in new window]
Schneier on security: Seat belt use and lessons for security awareness
[Open link in this window | Open link in new window]
More at... [10/05/01 (NL/01)]
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.