[Proposal for a Council Decision on the conclusion of the Agreement between the European Union and the United States of America on the processing and transfer of Financial Messaging Data from the European Union to the United States for purposes of the Terrorist Finance Tracking Program (TFTP II) | SMB (small and midsized businesses) information protection survey | 09 Piracy study | Net neutrality, investment and jobs - Assessing the potential impacts of the FCC's proposed net neutrality rules on the broadband ecosystem | Myths and Fallacies of "Personally Identifiable Information"... | Security analysis of over 48,000 Android market applications... | Privacy by design - Achieving the gold standard in data protection for the smart grid | Honeybot, your man in the middle for automated social engineering | The expanding digital universe - a forecast of worldwide information growth through 2010 | Privacy and regulatory innovation - moving beyond voluntary codes | Practical padding Oracle attacks | Youth safety on a living internet | The role of internet service providers in botnet mitigation - an empirical analysis based on spam data | Digital activism decoded | Reputation management and social media]
An opinion of the European Data Protection Supervisor (EDPS).
EDPS: Opinion (PDF)
[Open link in this window | Open link in new window]
EDPS: EU-US new draft agreement on financial data transfers - EDPS calls for further data protecion improvements
[Open link in dit venster | Open link in nieuw venster]
The Register: Watchdog questions mass US data grab
[Open link in this window | Open link in new window]
A survey by Symantec.
Symantec: 2010 SMB Information protection survey, global data, June 2010 (PDF)
[Open link in this window | Open link in new window]
Symantec: Symantec survey reveals information protection is the highest IT priority for SMBs
[Open link in dit venster | Open link in nieuw venster]
DarkReading: Small and medium-sized businesses getting serious about security, study says
[Open link in this window | Open link in new window]
Seventh annual global software piracy study by BSA/IDC.
BSA/IDC: 09 Piracy study (PDF)
[Open link in this window | Open link in new window]
Tweakers.net: Hoogleraren VS - verliezen door piraterij niet bewezen
[Open link in dit venster | Open link in nieuw venster]
BSA/IDC: Seventh annual BSA and IDC global software piracy study
[Open link in this window | Open link in new window]
A study by Charles M. Davidson and Bret T. Swanson.
Charles M. Davidson and Bret T. Swanson: Net neutrality, investment and jobs - Assessing the potential impacts of the FCC's proposed net neutrality rules on the broadband ecosystem (PDF)
[Open link in this window | Open link in new window]
Ars technica: Study - net neutrality could lead to "devastating" job losses
[Open link in dit venster | Open link in nieuw venster]
Techdirt: Propaganda masquerading as academic net neutrality 'jobs' loss assessment
[Open link in this window | Open link in new window]
...and other research on privacy and technology by Vitaly Shmatikov.
Vitaly Shmatikov
[Open link in this window | Open link in new window]
...and other research on mobile security by SMobile systems.
SMobile: Global Threat Center
[Open link in this window | Open link in new window]
CNet: Report says be aware of what your Android app does
[Open link in this window | Open link in new window]
More at... [10/06/24 (NL/01)]
More at... [10/06/24 (NL/02)]
A guide by Ann Cavoukian.
Ann Cavoukian: Privacy by design - Achieving the gold standard in data protection for the smart grid (PDF)
[Open link in this window | Open link in new window]
The Future of Privacy forum: A new "must-read" for smart grid enthusiasts
[Open link in this window | Open link in new window]
An article by Tobias Lauinger, Veikko Pankakoski, Davide Balzarotti and Engin Kirda.
Tobias Lauinger, Veikko Pankakoski, Davide Balzarotti, Engin Kirda: Honeybot, your man in the middle for automated social engineering (PDF)
[Open link in this window | Open link in new window]
DarkReading: Tool automates social engineering in man-in-the-middle attack
[Open link in this window | Open link in new window]
A report by IDC.
IDC: The expanding digital universe - a forecast of worldwide information growth through 2010 (PDF)
[Open link in this window | Open link in new window]
CIO: Cloud computing - how big is big data? IDC's answer
[Open link in this window | Open link in new window]
The Register: Can the cloud hold off data deluge?
[Open link in this window | Open link in new window]
More at... [10/06/19 (NL/01)]
A paper by Ira Rubinstein.
Ira Rubinstein: Privacy and regulatory innovation - moving beyond voluntary codes (SSRN)
[Open link in this window | Open link in new window]
The future of privacy forum: Guest blog on privacy safe harbors
[Open link in this window | Open link in new window]
A paper by Juliano Rizzo and Thai Duong.
Juliano Rizzo and Thai Duong: Practical padding Oracle attacks (PDF)
[Open link in this window | Open link in new window]
The Register: Researchers release point-and-click website exploitation tool
[Open link in this window | Open link in new window]
Report of the Online Safety and Technology Working Group (OSTWG)
OSTWG: Youth safety on a living internet (PDF)
[Open link in this window | Open link in new window]
National telecommunications and information administration: Online Safety and Technology Working Group
[Open link in this window | Open link in new window]
TLF: Online Safety and Technology Working Group (OSTWG) final report released
[Open link in this window | Open link in new window]
TLF: Kids, media, commercialism and moral panic
[Open link in this window | Open link in new window]
A paper by Michel van Eeten, Johannes M. Bauer, Hadi Asghari, Shirin Tabatabaie and Dave Rand.
Michel van Eeten, Johannes M. Bauer, Hadi Asghari, Shirin Tabatabaie and Dave Rand: The role of internet service providers in botnet mitigation - an empirical analysis based on spam data (PDF)
[Open link in this window | Open link in new window]
Computable: 'Provider pakt slechts fractie botnets aan'
[Open link in this window | Open link in new window]
More at... [10/06/11 (NL/01)]
More at... [10/06/11 (NL/02)]
More at... [10/06/11 (NL/03)]
More at... [10/06/11 (NL/04)]
More at... [10/06/11 (NL/05)]
A book edited by Mary Joyce.
Mary Joyce: Digital activism decoded - the new mechanics of change (PDF)
[Open link in this window | Open link in new window]
Meta-activism: Read the book
[Open link in this window | Open link in new window]
Light blue touchpaper: Digital activism decoded - the new mechanics of change
[Open link in this window | Open link in new window]
A report by Pew Internet.
Pew Internet: Reputation management and social media (PDF)
[Open link in this window | Open link in new window]
Pew Internet: Reputation management and social media
[Open link in this window | Open link in new window]
Office of the Privacy Commissioner: Online privacy may not be an outdated idea after all
[Open link in this window | Open link in new window]
More at... [10/06/04 (NL/01)]
More at... [10/06/04 (NL/02)]
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.