December 2010

[An empirical study of privacy-violating information flows in JavaScript web applications | Attacks by "anonymous" WikiLeaks proponents not anonymous | The billion dollar lost laptop problem | Location-based services - time for a privacy check-in | Principles for government data mining | Protecting consumer privacy in an era of rapid change - A proposed framework for businesses and policymakers | A new era of compliance - Raising the bar for organizations worldwide | Facebook tracks and traces everyone: Like this! | Stealing reality | Verizon 2010 payment card industry compliance report]

Management met informatie - Information Governance bij gemeenten - een verkenning

More at... [10/12/22 (NL/01)]

Internetfilters en veilig internetten in de bibliotheek

More at... [10/12/22 (NL/02)]



Creative Commons License

All original content on this website © 2010 Rina Steenkamp. This work is licensed under a Creative Commons License. On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.