[Privacy papers for policy makers | Token attempt - the misrepresentation of website privacy policies through the misuse of P3P compact policy tokens | Facebook and the new age of privacy | A guide to data governance for privacy, confidentiality, and compliance - part 5: Moving to cloud computing | The avoidable cost of downtime | Incentives and challenges for information sharing in the context of network and information security | The rise of apps culture | Social engineering capture the flag results | Cybercasing the joint - on the privacy implications of geo-tagging | The human impact | Internet governance in an age of cyber insecurity | Contracts for clouds - comparison and analysis of the terms and conditions of cloud computing services | Cell phones and American adults | Linking biomedical informatics, grid computing and nanomedicine | Protecting your daily in-home activity information from a wireless snooping attack]
Papers by different authors for the Future of Privacy Forum.
Future of Privacy Forum: Privacy papers for policy makers, 2009-20010 (PDF)
[Open link in this window | Open link in new window]
Future of Privacy Forum: Privacy papers for policy makers - full papers [with links to papers that aren't in the PDF version]
[Open link in this window | Open link in new window]
Future of Privacy Forum: FPF releases Privacy papers for policy makers journal
[Open link in this window | Open link in new window]
A paper by Pedro Giovanni Leon, Lorrie Faith Cranor, Aleecia M. McDonald and Robert McGuire.
Pedro Giovanni Leon, Lorrie Faith Cranor, Aleecia M. McDonald and Robert McGuire: Token attempt - the misrepresentation of website privacy policies through the misuse of P3P compact policy tokens (PDF)
[Open link in this window | Open link in new window]
MediaPost: Web sites with Truste seal of approval get second look
[Open link in this window | Open link in new window]
HL: Carnegie Mellon study claims thousands of web sites mispresent privacy settings
[Open link in this window | Open link in new window]
A report by PeopleBrowsr.
PeopleBrowsr: Facebook and the new age of privacy (Scribd)
[Open link in this window | Open link in new window]
MarketingFacts: Facebook en privacy 2.0
[Open link in this window | Open link in new window]
PrivacyNieuws: Onderzoeksresultaat; Facebook vs privacy 2.0
[Open link in this window | Open link in new window]
A guide from Microsoft.
Javier Salido and Doug Cavit: A guide to data governance for privacy, confidentiality, and compliance - part 5: Moving to cloud computing (PDF)
[Open link in this window | Open link in new window]
Roger's Security Blog: Data governance in the cloud
[Open link in this window | Open link in new window]
A research report by CA Technologies.
CA Technologies: The avoidable cost of downtime (PDF)
[Open link in this window | Open link in new window]
Arcserve: The avoidable cost of downtime
[Open link in this window | Open link in new window]
WebWereld: Herstel kost Nederland meer tijd dan downtime
[Open link in this window | Open link in new window]
A report by ENISA.
ENISA: Incentives and challenges for information sharing in the context of network and information security (PDF)
[Open link in this window | Open link in new window]
ENISA: New report - Incentives and challenges for cyber security information sharing
[Open link in this window | Open link in new window]
A report by Pew Internet.
Pew Internet: The rise of apps culture (PDF)
[Open link in this window | Open link in new window]
Pew Internet: The rise of apps culture
[Open link in this window | Open link in new window]
Techmeme: The rise of apps culture
[Open link in this window | Open link in new window]
Results of the social engineering contest at Defcon 18.
Social-engineer.org: Social engineering capture the flag results (PDF)
[Open link in this window | Open link in new window]
Social-engineer.org: DEFCON 18 Social-Engineer CTF contest findings report, summary
[Open link in this window | Open link in new window]
DarkReading: Social engineering report shows corporate America at risk
[Open link in this window | Open link in new window]
More at... [10/09/17 (NL/01)]
More at... [10/09/17 (NL/02)]
A paper by Gerald Friedland and Robin Sommer.
Gerald Friedland and Robin Sommer: Cybercasing the joint - on the privacy implications of geo-tagging (PDF)
[Open link in this window | Open link in new window]
The blog of content protection: The risk of geo-tagging
[Open link in this window | Open link in new window]
A Norton cybercrime report from Symantec.
Symantec: The Norton cybercrime report - The human impact
[Open link in this window | Open link in new window]
Norton Community: Norton's cybercrime report - The human impact reveals global cybercrime epidemic and our hidden hypocrisy
[Open link in this window | Open link in new window]
BBC News: One in four gives fake net names
[Open link in this window | Open link in new window]
A study by the Council on Foreign Relations.
Robert K. Knake: Internet governance in an age of cyber insecurity (PDF)
[Open link in this window | Open link in new window]
David Lacey's IT Security Blog: Cyber security comes of age
[Open link in this window | Open link in new window]
A paper by Simon Bradshaw, Christopher Millard and Ian Walden.
Simon Bradshaw, Christopher Millard and Ian Walden: Contracts for clouds - comparison and analysis of the terms and conditions of cloud computing services (SSRN)
[Open link in this window | Open link in new window]
David Lacey's IT Security Blog: Cloud computing contracts
[Open link in this window | Open link in new window]
A report by Pew Internet.
Pew Internet: Cell phones and American adults (PDF)
[Open link in this window | Open link in new window]
Pew Internet: Cell phones and American adults
[Open link in this window | Open link in new window]
MediaPost: Pew report - grown-ups text too
[Open link in this window | Open link in new window]
More at... [10/09/12 (NL/01)]
More at... [10/09/12 (NL/02)]
A white paper from Action-Grid.
Action-Grid: Linking biomedical informatics, grid computing and nanomedicine (PDF)
[Open link in this window | Open link in new window]
Action-grid: White paper
[Open link in this window | Open link in new window]
A paper by Vijay Srinivasan, John Stankovic and Kamin Whitehouse.
Vijay Srinivasan, John Stankovic and Kamin Whitehouse: Protecting your daily in-home activity information from a wireless snooping attack
[Open link in this window | Open link in new window]
Schneier on Security: Eavesdropping on smart homes with distributed wireless sensors
[Open link in this window | Open link in new window]
More at... [10/09/03 (NL/01)]
More at... [10/09/03 (NL/02)]
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.