April 2011

[Towards street-level client-independent IP geolocation | Bridging the gap between physical location and online social networks | Tragedy of the data commons | SANS Seventh annual log management survey report | Shadow evaluation report on the Data Retention Directive (2006/24/EC) | Evaluation report [official version] on the Data Retention Directive (Directive 2006/24/EC) | Evaluation report [leaked version] on the Data Retention Directive (Directive 2006/24/EC) | Working document 01/2011 on the current EU personal data breach framework and recommendations for future policy developments | Freedom on the Net 2011 | 2011 Data breach investigations report | In the dark - Crucial industries confront attacks | Cyber Europe 2010 - Evaluation report | Cyber security - the road ahead | Cyber-Ark snooping survey, April 2011 | Social networking, age and privacy | Anonymity loves company - usability and the network effect | National strategy for trusted identities in cyberspace | Brief of amicus curiae Professor Michael Carrier in support of defendants-appellees and urging affirmance [Google/YouTube] | Opinion 12/2011 on smart metering | Software on the witness stand - what should it take for us to trust it? | Social norms and intellectual property - Online norms and the European legal development | The failure of online social network privacy settings | Resillience of the Internet interconnection ecosystem | How to shop for free online - Security analysis of cashier-as-a-service based web stores | Tweets and trades - the information content of stock microblogs | Brief of amici curiae in support of objections of real parties in interest Jacob Appelbaum, Birgitta Jonsdottir and Rop Gonggrijp to March 11, 2011 order denying motion to vacate | 2010 full year top cyber security risks report | Resilience metrics and measurements | The weak password problem - chaos, criticality, and encrypted p-CAPTCHAs | One bad apple spoils the bunch - exploiting P2P applications to trace and profile Tor users | Can we fix the security economics of federated authentication?]

Het eindrapport - Accept or decline - Crowdsourcing

More at... [11/04/29 (NL/01)]

Steeds meer beeld - Evaluatie vijf jaar cameratoezicht op openbare plaatsen

More at... [11/04/29 (NL/02)]

Onbedoeld openen Ketelbrug - 4 oktober 2009

More at... [11/04/29 (NL/03)]

ICT Barometer over conjunctuur, bestedingen en ICT indicator, Jaargang 11

More at... [11/04/29 (NL/04)]

Pleitnotitie De Winter vs. VNG

More at... [11/04/29 (NL/05)]

Jaarverslag 2010

More at... [11/04/22 (NL/01)]

Nationale contra-terrorismestrategie 2011-2015

More at... [11/04/22 (NL/02)]

Leidraad Bedrijfsarts en privacy

More at... [11/04/22 (NL/03)]

Omarm de cloud - Een onderzoek naar de acceptatie van cloud computing onder Europese MKB's

More at... [11/04/22 (NL/04)]

Jaarverslag 2010

More at... [11/04/22 (NL/05)]

Baat het niet dan kost het wel - onderzoek naar kosten en baten van grote ICT-projecten

More at... [11/04/22 (NL/06)]

Spookrijders in de zorg

More at... [11/04/22 (NL/07)]

Jurisprudentie

More at... [11/04/15 (NL/01)]

Jurisprudentie

More at... [11/04/08 (NL/01)]

Jurisprudentie

More at... [11/04/08 (NL/02)]

De staat van informatie

More at... [11/04/01 (NL/01)]

ICT Barometer over cybercrime

More at... [11/04/01 (NL/02)]



Creative Commons License

All original content on this website © 2011 Rina Steenkamp. This work is licensed under a Creative Commons License. On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.