October 2010

[Targeted enforcement and shared lawmaking authority as catalysts for data protection in the United States | Can society afford to rely on security by afterthought not design? | E-Deceptive campaign practices report 2010 - Internet technology and democracy 2.0 | Unplugged | Security intelligence report | Global fraud report | Build a privacy plan for your business | Fight terror, defend freedom | iPhone applications and privacy issues - an analysis of application transmission of iPhone Unique Device Identifiers (UDIDs) | TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones | Privacy 3.0 - the principle of proportionality | A terminology for talking about privacy by data minimization - Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management | Network Accountability for the domestic intelligence apparatus | The prototype of privacy: Analysing privacy discourse through its features | Researching privacy in HIV care: An ethnographic analysis of methods | Attacks and design of image recognition CAPTCHAs | Reservoirs of danger - The evolution of public and private law at the dawn of the information age | Social media governance | Privacy and the smart grid | State of software security report - The intractable problem of insecure software | Cloud computing: Australian lessons and experiences]

Happy Landings? Het biometrisch paspoort als zwarte doos

More at... [10/10/29 (NL/01)]

Internetters bezorgd over online dreigingen

More at... [10/10/29 (NL/02)]

Het landelijk EPD als blackbox - Besluitvorming en opinies in kaart

More at... [10/10/29 (NL/03)]


More at... [10/10/22 (NL/01)]


More at... [10/10/22 (NL/02)]

Zijn foto's en beeldopnamen 'rasgegevens' in de zin van artikel 126nd SV en artikel 18 Wbp?

More at... [10/10/22 (NL/03)]

De amendementen van de Richtlijn Burgerrechten op de e-Privacyrichtlijn

More at... [10/10/22 (NL/04)]


More at... [10/10/08 (NL/01)]


More at... [10/10/08 (NL/02)]

Zwartboek Wob

More at... [10/10/08 (NL/03)]


More at... [10/10/02 (NL/01)]


More at... [10/10/02 (NL/02)]

Identity theft in de ICT - Onderzoek naar de wenselijkheid van een Belgische en / of Europese regelgeving

More at... [10/10/02 (NL/03)]

Jaarverslag 2009 en kwetsbaarheidsanalyse

More at... [10/10/02 (NL/04)]

Pentesten doe je zo

More at... [10/10/02 (NL/05)]

Creative Commons License

All original content on this website © 2010 Rina Steenkamp. This work is licensed under a Creative Commons License. On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.