[Targeted enforcement and shared lawmaking authority as catalysts for data protection in the United States | Can society afford to rely on security by afterthought not design? | E-Deceptive campaign practices report 2010 - Internet technology and democracy 2.0 | Unplugged | Security intelligence report | Global fraud report | Build a privacy plan for your business | Fight terror, defend freedom | iPhone applications and privacy issues - an analysis of application transmission of iPhone Unique Device Identifiers (UDIDs) | TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones | Privacy 3.0 - the principle of proportionality | A terminology for talking about privacy by data minimization - Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management | Network Accountability for the domestic intelligence apparatus | The prototype of privacy: Analysing privacy discourse through its features | Researching privacy in HIV care: An ethnographic analysis of methods | Attacks and design of image recognition CAPTCHAs | Reservoirs of danger - The evolution of public and private law at the dawn of the information age | Social media governance | Privacy and the smart grid | State of software security report - The intractable problem of insecure software | Cloud computing: Australian lessons and experiences]
A paper by Christopher Wolf.
Christopher Wolf: Targeted enforcement and shared lawmaking authority as catalysts for data protection in the United States (PDF)
[Open link in this window | Open link in new window]
HL: Hogan Lovells presents to world privacy authorities in Jerusalem
[Open link in this window | Open link in new window]
Status report and recommendations of the ISA (EURIM) Subgroup on Security by Design.
ISA (EURIM): Can society afford to rely on security by afterthought not design? (PDF)
[Open link in this window | Open link in new window]
ISA (EURIM): What is EURIM?
[Open link in this window | Open link in new window]
Philip Virgo: Can society afford to rely on security by afterthought not design?
[Open link in this window | Open link in new window]
A report by EPIC.
EPIC: E-Deceptive campaign practices report 2010 - Internet technology and democracy 2.0 (PDF)
[Open link in this window | Open link in new window]
EPIC: EPIC releases 2010 E-Deceptive campaign practices report
[Open link in this window | Open link in new window]
A global media experiment.
Science Daily: 'Unplugged' experiment detaches students from the media
[Open link in this window | Open link in new window]
Bournemouth University: Unplugged (blog)
[Open link in this window | Open link in new window]
ZDNet: Studenten gefrustreerd na dag offline
[Open link in this window | Open link in new window]
SOLV: Internet als verslaving
[Open link in this window | Open link in new window]
More at... [10/10/29 (NL/01)]
More at... [10/10/29 (NL/02)]
More at... [10/10/29 (NL/03)]
An evaluation of the evolving threat landscape and trends, by Microsoft.
Microsoft: Security intelligence report
[Open link in this window | Open link in new window]
Roger's Security Blog: Security intelligence report v9 is online
[Open link in this window | Open link in new window]
A report by Kroll.
Kroll: Global fraud report, Annual edition 2010/11 (PDF)
[Open link in this window | Open link in new window]
DarkReading: Incidence of cybertheft surpasses incidence of physical theft for the first time, study says
[Open link in this window | Open link in new window]
De AutomatiseringGids: Datadiefstal overtreft fysieke fraude
[Open link in this window | Open link in new window]
A 'privacy for small business online tool' by the Office of the Privacy Commissioner of Canada.
The Office of the Privacy Commissioner of Canada: Build a privacy plan for your business
[Open link in this window | Open link in new window]
The Office of the Privacy Commissioner of Canada: Size doesn't matter, privacy does - a tool for small businesses
[Open link in this window | Open link in new window]
A booklet by Dominic Raab MP.
Dominic Raab MP: Fight terror, defend freedom (PDF)
[Open link in this window | Open link in new window]
Jerry Fishenden: Fight terror, defend freedom
[Open link in this window | Open link in new window]
More at... [10/10/22 (NL/01)]
More at... [10/10/22 (NL/02)]
More at... [10/10/22 (NL/03)]
More at... [10/10/22 (NL/04)]
A paper by Eric Smith.
Eric Smith: iPhone applications and privacy issues - an analysis of application transmission of iPhone Unique Device Identifiers (UDIDs) (PDF)
[Open link in this window | Open link in new window]
PSKL: iPhone applications and privacy issues - an analysis of application transmission of iPhone Unique Device Identifiers (UDIDs) - Executive summary
[Open link in this window | Open link in new window]
Techmeme: iPhone applications and privacy issues
[Open link in this window | Open link in new window]
A paper by William Enck, Peter Gilbert, Byung-Gon Chon, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel and Anmol N. Sheth.
William Enck, Peter Gilbert, Byung-Gon Chon, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel and Anmol N. Sheth: TaintDroid - An information-flow tracking system for realtime privacy monitoring on smartphones (PDF)
[Open link in this window | Open link in new window]
Security.nl: "66% Android apps misbruikt privégegevens"
[Open link in this window | Open link in new window]
A paper by Andrew B. Serwin.
Andrew B. Serwin: Privacy 3.0 - the principle of proportionality (Google docs)
[Open link in this window | Open link in new window]
Privacy and Security Source: Privacy 3.0 Survey
[Open link in this window | Open link in new window]
A paper by Andreas Pfitzmann and Marit Hansen.
Andreas Pfitzmann and Marit Hansen: A terminology for talking about privacy by data minimization - Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (PDF)
[Open link in this window | Open link in new window]
Kim Cameron: Remembering Andreas Pfitzmann
[Open link in this window | Open link in new window]
A paper by Danielle Keats Citron and Frank A. Pasquale III.
Danielle Keats Citron and Frank A. Pasquale III: Network Accountability for the domestic intelligence apparatus (SSRN)
[Open link in this window | Open link in new window]
Concurring Opinions: Surveillance state accelarates - fusion centers and beyond
[Open link in this window | Open link in new window]
A paper by Asimina Vasalou, Alastair Gill, Fadhila Mazanderani, Chrysanthi Papoutsi, Anne-Marie Oostveen and Sacha Brostoff.
Asimina Vasalou, Alastair Gill, Fadhila Mazanderani, Chrysanthi Papoutsi, Anne-Marie Oostveen, Sacha Brostoff: The prototype of privacy - Analysing privacy discourse through its features (SSRN)
[Open link in this window | Open link in new window]
Privacy Value Networks: Papers presented at the Privacy and Usability Methods (PUMP) Workshop, British HCI Conference 2010
[Open link in this window | Open link in new window]
A paper by Chrysanthi Papoutsi, Fadhila Mazanderani and Ian Brown.
Chrysanthi Papoutsi, Fadhila Mazanderani and Ian Brown: Researching privacy in HIV care - An ethnographic analysis of methods (SSRN)
[Open link in this window | Open link in new window]
Privacy Value Networks: Papers presented at the Privacy and Usability Methods (PUMP) Workshop, British HCI Conference 2010
[Open link in this window | Open link in new window]
A paper by Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Liu, Ning Xu, Meng Yi and Kaiwei Cai.
Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Liu, Ning Xu, Meng Yi, Kaiwei Cai: Attacks and design of image recognition CAPTCHAs (PDF)
[Open link in this window | Open link in new window]
Schneier on Security: Analyzing CAPTCHAs
[Open link in this window | Open link in new window]
More at... [10/10/08 (NL/01)]
More at... [10/10/08 (NL/02)]
More at... [10/10/08 (NL/03)]
A paper by Danielle Keats Citron.
Danielle Keats Citron: Reservoirs of danger - The evolution of public and private law at the dawn of the information age (SSRN)
[Open link in this window | Open link in new window]
Concurring Opinions: Are people really harmed by a data security breach?
[Open link in this window | Open link in new window]
A site aimed at providing tools and resources to help organisations improve their use of social media.
Social media governance
[Open link in this window | Open link in new window]
DarkReading: For small businesses, social networking poses new security risks
[Open link in this window | Open link in new window]
Volume 2 in NIST's Guidelines for smart grid.
NIST: Guidelines for smart grid cyber security - Vol. 2, Privacy and the smart grid (PDF)
[Open link in this window | Open link in new window]
EPIC: NIST publishes smart grid privacy guidelines
[Open link in this window | Open link in new window]
A report by Veracode.
Veracode: State of software security report, executive summary (PDF)
[Open link in this window | Open link in new window]
DarkReading: Most third-party software fails security tests
[Open link in this window | Open link in new window]
A report by KPMG.
KPMG: Cloud computing - Australian lessons and experiences (PDF)
[Open link in this window | Open link in new window]
KPMG: Cloud computing - Australian lessons and experiences
[Open link in this window | Open link in new window]
Roger's Security Blog: Customer experience study - security improves in the cloud
[Open link in this window | Open link in new window]
More at... [10/10/02 (NL/01)]
More at... [10/10/02 (NL/02)]
More at... [10/10/02 (NL/03)]
More at... [10/10/02 (NL/04)]
More at... [10/10/02 (NL/05)]
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.