[Draft "Commercial Privacy Bill of Rights Act of 2011" | Misplaced confidences - privacy and the control paradox | Being vulnerable to the threat of confusing threats with vulnerabilities | The cloud - Understanding the security, privacy and trust challenges | ISSA-UK 5173 Information security for small and medium sized enterprises | Trust and security in the cloud - The myths and realities of hosted applications | Electricity grid modernization - Progress being made on cybersecurity guidelines, but key challenges remain to be addressed | 2010 Annual study - U.S. cost of a data breach | Consumer Sentinel Network data book for January - December 2010 | Identifying 'anonymous' email authors | Botnets - 10 tough questions | Solid state drives - the beginning of the end for current practice in digital forensics recovery? | Do not track | 2010 Internet crime report | System error - Fixing the flaws in government IT]
A draft by Senator John Kerry (D-MA) and Senator John McCain (R-AZ).
Senator John Kerry (D-MA) and Senator John McCain (R-AZ): Draft "Commercial Privacy Bill of Rights Act of 2011" (PDF)
[Open link in this window | Open link in new window]
HL: Draft "Commercial Privacy Bill of Rights Act of 2011" published
[Open link in this window | Open link in new window]
An article by Laura Brandimarte, Alessandro Acquisti and George Loewenstein.
Laura Brandimarte, Alessandro Acquisti and George Loewenstein: Misplaced confidences - privacy and the control paradox (PDF)
[Open link in this window | Open link in new window]
Office of the Privacy Commissioner of Canada: To err is human - some thoughts about online privacy
[Open link in this window | Open link in new window]
A viewpoint paper by Roger G. Johnston.
Roger G. Johnston: Being vulnerable to the threat of confusing threats with vulnerabilities (PDF)
[Open link in this window | Open link in new window]
Schneier on Security: Threats vs. vulnerabilities
[Open link in this window | Open link in new window]
More at... [11/03/25 (NL/01)]
More at... [11/03/25 (NL/02)]
More at... [11/03/25 (NL/03)]
More at... [11/03/25 (NL/04)]
A report by RAND Europe, time.lex, University of Warwick.
RAND Europe, time.lex, University of Warwick: The cloud - Understanding the security, privacy and trust challenges (PDF)
[Open link in this window | Open link in new window]
time.lex: Study on cloud computing and challenges to security, privacy and trust published
[Open link in this window | Open link in new window]
A draft standard by the UK Information Systems Security Association (ISSA).
ISSA: ISSA-UK 5173 Information security for small and medium sized enterprises (PDF)
[Open link in this window | Open link in new window]
ISSA: ISSA 5173 - A new, draft for information security standard for SMEs
[Open link in this window | Open link in new window]
David Lacey: A security standard for small and medium sized enterprises
[Open link in this window | Open link in new window]
A report by The Register.
The Register: Trust and security in the cloud - The myths and realities of hosted applications (PDF)
[Open link in this window | Open link in new window]
The Register: The reality of SaaS security and privacy
[Open link in this window | Open link in new window]
A report by the US Government Accountability Office (GAO).
GAO: Electricity grid modernization - Progress being made on cybersecurity guidelines, but key challenges remain to be addressed (PDF)
[Open link in this window | Open link in new window]
The Smart Grid Security Blog: The smart grid security truth - you can't do what you can't measure
[Open link in this window | Open link in new window]
More at... [11/03/18 (NL/01)]
More at... [11/03/18 (NL/02)]
More at... [11/03/18 (NL/03)]
More at... [11/03/18 (NL/04)]
More at... [11/03/18 (NL/05)]
More at... [11/03/18 (NL/06)]
A benchmark study by Ponemon Institute, LLC.
Ponemon Institute, LLC: 2010 Annual study - U.S. cost of a data breach (PDF)
[Open link in this window | Open link in new window]
Symantec: Ponemon study indicates organization data breach costs hit $7.2 million and show no sign of leveling off
[Open link in this window | Open link in new window]
Tweakers.net: 'Nalatigheid is belangrijkste oorzaak verlies persoonsgegevens'
[Open link in this window | Open link in new window]
AG: Steeds hogere kosten door dataverlies
[Open link in this window | Open link in new window]
A report by FTC.
FTC: Consumer Sentinel Network data book for January - December 2010 (PDF)
[Open link in this window | Open link in new window]
FTC: FTC releases list of top consumer complaints in 2010; identity theft tops the list again
[Open link in this window | Open link in new window]
Privacy Lives: FTC - Identity theft tops list of consumer complaints again
[Open link in this window | Open link in new window]
An article by Farkhund Iqbal, Rachid Hadjidj, Benjamin C.M. Fung and Mourad Debbabi.
Farkhund Iqbal, Rachid Hadjidj, Benjamin C.M. Fung and Mourad Debbabi: Identifying 'anonymous' email authors (PDF)
[Open link in this window | Open link in new window]
Concordia University: Identifying 'anonymous' email authors
[Open link in this window | Open link in new window]
Nu.nl: Techniek achterhaalt anonieme auteurs e-mail
[Open link in this window | Open link in new window]
A report by ENISA.
ENISA: Botnets - 10 tough questions (PDF)
[Open link in this window | Open link in new window]
ENISA: Facing the cyber-zombies - EU Agency gets tough on Botnets
[Open link in this window | Open link in new window]
Roger Halbeer on Security: 10 tough botnet questions
[Open link in this window | Open link in new window]
The Register: Security agency calls time on botnet FUD
[Open link in this window | Open link in new window]
Security.nl: ENISA - Botnetcijfers ernstig overdreven
[Open link in this window | Open link in new window]
An article by Graeme B. Bell and Richard Boddington.
Graeme B. Bell and Richard Boddington: Solid state drives - the beginning of the end for current practice in digital forensics recovery? (PDF)
[Open link in this window | Open link in new window]
Computer Forensics: Digital forensic case leads [etc.]
[Open link in this window | Open link in new window]
More at... [11/03/11 (NL/01)]
Research by Stanford University.
Stanford University: Do not track
[Open link in this window | Open link in new window]
Jonathan Mayer, Arvind Narayanan, Ph.D: Re - Protecting Consumer Privacy in an Era of Rapid Change - A Proposed Framework for Businesses and Policymakers (PDF)
[Open link in this window | Open link in new window]
BoF: Do-not-track - een brievenbussticker tegen online tracking
[Open link in this window | Open link in new window]
A report by Internet Crime Complaint Center (IC3).
Internet Crime Complaint Center (IC3): 2010 Internet crime report (PDF)
[Open link in this window | Open link in new window]
NW3C: 2010 IC2 Annual report
[Open link in this window | Open link in new window]
DarkReading: Internet crime is on the rise again, Feds say
[Open link in this window | Open link in new window]
A report by Justine Stephen, James Page, Jerrett Myers, Adrian Brown David Watson and Sir Ian Magee.
Justine Stephen, James Page, Jerrett Myers, Adrian Brown David Watson and Sir Ian Magee: System error - Fixing the flaws in government IT (PDF)
[Open link in this window | Open link in new window]
Institute for Government: Fixing the flaws in government IT
[Open link in this window | Open link in new window]
BBC News: Government IT 'must change'
[Open link in this window | Open link in new window]
More at... [11/03/04 (NL/01)]
More at... [11/03/04 (NL/02)]
More at... [11/03/04 (NL/03)]
More at... [11/03/04 (NL/04)]
More at... [11/03/04 (NL/05)]
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.