[The end of the Net as we know it? Deep packet inspection and internet governance | Location-sharing technologies - Privacy risks and controls | Where do security policies come from? | An analysis of private browsing modes in modern browsers | Cybercriminals target online banking customers | Influence and passivity in social media | Social engineering framework | Security threat report: Mid-year 2010 | Symantec 2010 Information management health check | Personal information online | Facebook privacy settings: Who cares? | Urban computing and its discontents]
A paper by Ralf Bendrath and Milton Mueller.
Ralf Bendrath and Milton Mueller: The end of the Net as we know it? Deep packet inspection and internet governance (SSRN)
[Open link in this window | Open link in new window]
Ralf Bendrath: APSA paper on deep packet inspection
[Open link in this window | Open link in new window]
More at... [10/08/27 (NL/01)]
More at... [10/08/27 (NL/02)]
A paper by Janice Y. Tsai, Patrick Gage Kelley, Lorrie Faith Cranor, Norman Sadeh.
Janice Y. Tsai, Patrick Gage Kelley, Lorrie Faith Cranor, Norman Sadeh: Location-sharing technologies - Privacy risks and controls (PDF)
[Open link in this window | Open link in new window]
Cylab Usable Privacy and Security Laboratory: Location-sharing technologies - privacy risks and controls
[Open link in this window | Open link in new window]
Office of the Privacy Commissioner of Canada: Badges? Badges? We don't need no stinkin' badges!
[Open link in this window | Open link in new window]
A paper by Dinei Florencio and Cormac Herley.
Dinei Florencio and Cormac Herley: Where do security policies come from? (PDF)
[Open link in this window | Open link in new window]
The Blog of Content Protection: Where do security policies come from?
[Open link in this window | Open link in new window]
More at... [10/08/20 (NL/01)]
More at... [10/08/20 (NL/02)]
More at... [10/08/20 (NL/03)]
A paper by Gaurav Aggarwal, Elie Burzstein, Collin Jackson and Dan Boneh.
Gaurav Aggarwal, Elie Burzstein, Collin Jackson and Dan Boneh: An analysis of private browsing modes in modern browsers (PDF)
[Open link in this window | Open link in new window]
Boneh publications: An analysis of private browsing modes in modern browsers
[Open link in this window | Open link in new window]
The Register: Private browsing modes in four biggest browsers often fail
[Open link in this window | Open link in new window]
An analysis by M86.
M86: Cybercriminals target online banking customers (PDF)
[Open link in this window | Open link in new window]
M86 Security Labs discovers customers of global financial institution hit by cybercrime
[Open link in this window | Open link in new window]
The Register: Zeus botnet raid on UK bank accounts under the spotlight
[Open link in this window | Open link in new window]
A paper by Daniel M. Romero, Wojciech Galuba, Sitaram Asur and Bernardo A. Huberman.
Daniel M. Romero, Wojciech Galuba, Sitaram Asur and Bernardo A. Huberman: Influence and passivity in social media (PDF)
[Open link in this window | Open link in new window]
BBC News: Measuring your Twitter influence
[Open link in this window | Open link in new window]
A framework from Social-Engineer.org.
Social engineering framework
[Open link in this window | Open link in new window]
DarkReading: Tech insight - building the right defense against social engineering
[Open link in this window | Open link in new window]
A report by Sophos.
Sophos: Security threat report - Mid-year 2010 (PDF)
[Open link in this window | Open link in new window]
The Register: Sophos downplays Android malware threat
[Open link in this window | Open link in new window]
Graham Cluley: Sophos security threat report mid-2010
[Open link in this window | Open link in new window]
A survey by Symantec.
Symantec: Symantec 2010 Information management health check, Global results (PDF)
[Open link in this window | Open link in new window]
Symantec: Information management survey, 2010
[Open link in this window | Open link in new window]
Symantec: Survey finds infinite data retention leading to costly information management mistakes
[Open link in this window | Open link in new window]
A code of practice by the UK Incormation Commissioner's Office (ICO).
ICO: Personal information online - code of practice
[Open link in this window | Open link in new window]
HL: UK's ICO issues code of practice on online privacy
[Open link in this window | Open link in new window]
Article by dana boyd and Eszter Hargittai.
dana boyd and Eszter Hargittai: Facebook privacy settings - Who cares?
[Open link in this window | Open link in new window]
MediaPost: Study - Dramatic rise in college students tweaking Facebook privacy settings
[Open link in this window | Open link in new window]
A conversation between Adam Greenfield and Mark Shepard in the 'Architecture and situated technologies' series.
Adam Greenfield and Mark Shepard: Urban computing and its discontents (PDF)
[Open link in this window | Open link in new window]
Situated technologies: Urban computing and its discontents
[Open link in this window | Open link in new window]
Concurring opinions: Ambient urban informatics
[Open link in this window | Open link in new window]
More at... [10/08/07 (NL/01)]
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.