[Study on the economic benefits of privacy-enhancing technologies (PETs) | [...] on the principle of accountability | Cisco 2010 Midyear security report | 2010 Data breach investigations report | Data breaches - a black hole | The password thicket - technical and market failures in human authentication on the web | Popularity is everything - A new approach to protecting passwords from statistical-guessing attacks | Who controls the off switch? | Information Commissioner's Annual Report 2009/10 | Fast, accurate and practical identity inference using TV remote controls | Comparative study on different approaches to new privacy challenges, in particular in the light of technological developments | 2010 Financial Services Global Security Study - The faceless threat | The future of social relations | Spying the world from your laptop - Identifying and profiling content providers and big downloaders in BitTorrent | Opinion 2/2010 on online behavioural advertising | From hype to future - KPMG's 2010 Cloud computing survey | [Online advertising] quality assurance guidelines | Innovation - a priority for growth in the aftermath of the downturn]
Final report to the European Commission DG Justice, Freedom and Security.
London Economics: Study on the economic benefits of privacy-enhancing technologies (PETs) (PDF)
[Open link in this window | Open link in new window]
Tech and Law: Privacy enhancing technologies (PETs): final study on economic benefits for Commission
[Open link in this window | Open link in new window]
An opinion of WP29.
WP29: Opinion 3/2010 on the principle of accountability (PDF)
[Open link in this window | Open link in new window]
A report by CISCO.
Cisco: Cisco 2010 Midyear security report (PDF)
[Open link in this window | Open link in new window]
Cisco: Rethinking global security for borderless networks
[Open link in this window | Open link in new window]
DarkReading: Cybercrime gets social
[Open link in this window | Open link in new window]
A study conducted by the Verizon RISK Team in cooperation with the United States Secret Service.
Verizon: 2010 Data breach investigations report (PDF)
[Open link in this window | Open link in new window]
Verizon security blog: 2010 Data breach investigations report released
[Open link in this window | Open link in new window]
DarkReading: Breaches down, insider attacks up, Verizon Business / Secret Service study says
[Open link in this window | Open link in new window]
Ms. Smith: Verizon's 2010 DBIR - Rise in misuse, malware and social engineering
[Open link in this window | Open link in new window]
Security.nl: Georganiseerde misdaad achter meeste data-lekken
[Open link in this window | Open link in new window]
Data breaches 1H 2010 by the Identity Theft Resource Center (ITRC).
ITRC: Data breaches - a black hole
[Open link in this window | Open link in new window]
DarkReading: ITRC - Why so many data breaches don't see light of day
[Open link in this window | Open link in new window]
A paper by Joseph Bonneau and Sören Preibusch.
Joseph Bonneau and Sören Preibusch: The password thicket - technical and market failures in human authentication on the web (PDF)
[Open link in this window | Open link in new window]
Light Blue Touchpaper: Passwords in the wild, part I - the gap between theory and implementation
[Open link in this window | Open link in new window]
Light Blue Touchpaper: Passwords in the wild, part II - failures in the market
[Open link in this window | Open link in new window]
A paper by Stuart Schechter, Cormac Herley and Michael Mitzenmacher.
Stuart Schechter, Cormac Herley and Michael Mitzenmacher: Popularity is everything - A new approach to protecting passwords from statistical-guessing attacks (PDF)
[Open link in this window | Open link in new window]
Microsoft Research: Popularity is everything - A new approach to protecting passwords from statistical-guessing attacks
[Open link in this window | Open link in new window]
Security.nl: Microsoft - Niemand mag hetzelfde wachtwoord
[Open link in this window | Open link in new window]
A paper about smart grid security by Ross Anderson and Shailendra Fuloria.
Ross Anderson and Shailendra Fuloria: Who controls the off switch? (PDF)
[Open link in this window | Open link in new window]
The Register: Smart meters pose hacker kill-switch risk, warn boffins - Who turned off the lights?
[Open link in this window | Open link in new window]
Light blue touchpaper: Who controls the off switch?
[Open link in this window | Open link in new window]
A report from the Information Commissioner's Office (ICO) of the UK.
ICO: Information Commissioner's Annual Report 2009/10 (PDF)
[Open link in this window | Open link in new window]
Tech and Law: UK Information Commissioner's annual report out
[Open link in this window | Open link in new window]
The Register: ICO repeats jail call as complaints soar
[Open link in this window | Open link in new window]
Outlaw.com: Information Commissioner reiterates jail call as complaints soar
[Open link in this window | Open link in new window]
A report by Mariano Phielipp, Magdiel Galan, Richard Lee, Branislav Kveton and Jeffrey Hightower.
Mariano Phielipp, Magdiel Galan, Richard Lee, Branislav Kveton and Jeffrey Hightower: Fast, accurate and practical identity inference using TV remote controls (PDF)
[Open link in this window | Open link in new window]
Tweakers.net: Systeem identificeert tv-gebruikers via gebruik afstandsbediening
[Open link in this window | Open link in new window]
More at... [10/07/30 (NL/01)]
More at... [10/07/30 (NL/02)]
More at... [10/07/30 (NL/03)]
More at... [10/07/30 (NL/04)]
A report from the European Commission.
European Commission: Comparative study on different approaches to new privacy challenges, in particular in the light of technological developments (PDF)
[Open link in this window | Open link in new window]
European Commission: Comparative study on different approaches to new privacy challenges, in particular in the light of technological developments
[Open link in this window | Open link in new window]
Tech and Law: Privacy - technology and other challenges - comparative study of EU, US etc for Commission
[Open link in this window | Open link in new window]
A study by Deloitte.
Deloitte: 2010 Financial Services Global Security Study - The faceless threat (PDF)
[Open link in this window | Open link in new window]
Deloitte: 2010 Global Financial Services Security Survey
[Open link in this window | Open link in new window]
A report by Pew Research.
Pew Research: The future of social relations (PDF)
[Open link in this window | Open link in new window]
Pew Research: The future of social relations
[Open link in this window | Open link in new window]
Pew Research: The future of online socializing
[Open link in this window | Open link in new window]
The Register: Web 2.0 to bring about world peace
[Open link in this window | Open link in new window]
An article by Stevens Le Blond, Arnaud Legout, Fabrice Lefessant, Walid Dabbous and Mohamed Ali Kaafar.
Stevens Le Blond, Arnaud Legout, Fabrice Lefessant, Walid Dabbous and Mohamed Ali Kaafar: Spying the world from your laptop (PDF)
[Open link in this window | Open link in new window]
INRIA: Spying the world from your laptop
[Open link in this window | Open link in new window]
The blog of content protection: Identifying providers and downloader in BitTorrent
[Open link in this window | Open link in new window]
More at... [10/07/09 (NL/01)]
More at... [10/07/09 (NL/02)]
More at... [10/07/09 (NL/03)]
An opinion of WP29.
WP29: Opinion 2/2010 on online behavioural advertising (PDF)
[Open link in this window | Open link in new window]
WP29: Documents adopted by the Data Protection Working Party 2010
[Open link in this window | Open link in new window]
Tech and law: Behavioral advertising - developments and links
[Open link in this window | Open link in new window]
The Register: Privacy watchdogs - silence isn't cookie consent
[Open link in this window | Open link in new window]
SOLV: Opinie Artikel 29-Werkgroep - meestal opt-in vereist voor cookies
[Open link in this window | Open link in new window]
Out-law.com: Cookie consent can't be implied from browser settings, say privacy watchdogs
[Open link in this window | Open link in new window]
A survey by KPMG.
KPMG: From hype to future - KPMG's 2010 Cloud computing survey (PDF)
[Open link in this window | Open link in new window]
KPMG: From hype to future - KPMG's 2010 Cloud computing survey
[Open link in this window | Open link in new window]
Accountant.nl: Nederlandse organisaties kiezen steeds vaker voor coud computing
[Open link in this window | Open link in new window]
Accountancynieuws: KPMG - steeds meer ondernemingen maken gebruik van cloud computing
[Open link in this window | Open link in new window]
Guidelines by the Interactive Advertising Bureau (IAB).
IAB: Networks and exchanges quality assurance guidelines (PDF)
[Open link in this window | Open link in new window]
The Register: Online ads need standards
[Open link in this window | Open link in new window]
Out-law.com: US ad body publishes good practice guidelines for online ads
[Open link in this window | Open link in new window]
A report by Accenture.
Accenture: Innovation - a priority for growth in the aftermath of the downturn (PDF)
[Open link in this window | Open link in new window]
Frankwatching: Succesvol innoveren is weten wat de klant wil
[Open link in this window | Open link in new window]
More at... [10/07/02 (NL/01)]
More at... [10/07/02 (NL/02)]
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.