May 2010

[Feasibility and real-world implications of web browser history detection | Identity theft - the aftermath 2009 | The Italian Google-case - privacy, freedom of speech and responsibility of providers for user-generated contents | What you see is what they get - Protecting users from unwanted use of microphones, cameras and other sensors | I'm allowing what? Disclosing the authority applications demand of users as a condition of installation | How global organizations approach the challenge of protecting personal data | How unique is your web browser? | Experimental security analysis of a modern automobile | Digital competitiveness report | The information dividend: Can IT make you 'happier'? | Privacy regulation and online advertising | Information security breaches survey 2010 | Journal of Virtual Worlds Research | Is the internet for porn? An insight into the online adult industry | "The strategic context and the role of data protection authorities in the debate on the future of privacy" | "Data protection and cloud computing under EU law" | "Internet of things: ubiquitous monitoring in space and time" | Legal, economic and cultural aspects of file sharing | Priorities for research on current and emerging network trends | Evaluation of Directive 2006/24/EC and of national measures to combat criminal misuse and anonymous use of electronic communications | Report on the joint review of the implementation of the Agreement between the European Union and the United States of America on the processing and transfer of Passenger Name Record (PNR) data by air carriers to the United States Department of Homeland Security (DHS) | The economic and social role of internet intermediaries | Opinion on the Proposal for a Directive of the European Parliament and the Council on waste electrical and electronic equipment (WEEE) | Mobile identity management | Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT and RFID technology | Analyzing the first years of the Ticket or Click It mobilizations]

Log me niet!

More at... [10/05/28 (NL/01)]

Toezicht op de AIVD

More at... [10/05/28 (NL/02)]

Onderzoek vijf privacy-intrusive toepassingen

More at... [10/05/28 (NL/03)]

Jurisprudentie

More at... [10/05/21 (NL/01)]

Verzoek om inzage persoonsgegevens mobiele telefonie

More at... [10/05/21 (NL/02)]

Jurisprudentie

More at... [10/05/14 (NL/01)]

Dagvaarding BZK wegens vingerafdrukken in database

More at... [10/05/14 (NL/02)]

"Hoe stabiel wilt u het hebben?" - De Eenduidige Loonaangifte en de Polisadministratie

More at... [10/05/07 (NL/01)]

Nieuws en opinie: Stichting Brein

More at... [10/05/07 (NL/02)]

Hoe je vooral niet moet omgaan met kritiek op internet

More at... [10/05/01 (NL/01)]



Creative Commons License

All original content on this website © 2010 Rina Steenkamp. This work is licensed under a Creative Commons License. On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.