Rina Steenkamp - Privacy and technology
["You might also like:" Privacy risks of collaborative filtering | Phonotactic reconstruction of encrypted VoIP conversations - Hookt on fon-iks | Shadow [intellectual property rights] report | A single market for intellectual property rights | The future of cloud computing - Opportunities for European cloud computing beyond 2010 | Advancing cloud computing - what to do now? Priorities for industry and governments | Audit of information technology security included in health information technology standards | WikiLeaks would not qualify to claim federal reporter's privilege in any form | International strategy for cyberspace | Opinion 13/2011 on geolocation services on smart mobile devices | Digital opportunity - A review of intellectual property and growth | Security intelligence report | The story so far - What we know about the business of digital journalism | HTTPi for practical end-to-end web content integrity | ENISA ad hoc working group on national risk management preparedness | Securing personal information | Exposing the lack of privacy in file hosting services | Security of cloud computing, providers study | Security guidance for critical areas of focus in cloud computing v2.1 | Hyper-local, directions-based ranking of places | The Federal Bureau of Investigation's ability to address the national security cyber intrusion threat | Terror, security, and money - balancing the risks, benefits and costs of homeland security | Readers' copyright]
An article by Joseph A. Calandrino, Ann Kilzer, Arvind Narayanan, Edward W. Felten, and Vitaly Shmatikov.
Joseph A. Calandrino, Ann Kilzer, Arvind Narayanan, Edward W. Felten, and Vitaly Shmatikov: "You might also like:" Privacy risks of collaborative filtering (PDF)
[Open link in this window | Open link in new window]
33 Bits of Entropy: "You might also like:" privacy risks of collaborative filtering
[Open link in this window | Open link in new window]
FtT: "You might also like:" privacy risks of collaborative filtering
[Open link in this window | Open link in new window]
An article by Andrew M. White, Austin R. Matthews, Kevin Z. Snow and Fabian Monrose.
Andrew M. White, Austin R. Matthews, Kevin Z. Snow and Fabian Monrose: Phonotactic reconstruction of encrypted VoIP conversations - Hookt on fon-iks (PDF)
[Open link in this window | Open link in new window]
Security.nl: Taalkundigen "luisteren" Skype-gesprekken af
[Open link in this window | Open link in new window]
A report by EDRi.
EDRi: Shadow [intellectual property rights] report (PDF)
[Open link in this window | Open link in new window]
EDRi: Press release on EU IPR strategy
[Open link in this window | Open link in new window]
A draft report by the European Commission.
European Commission: A single market for intellectual property rights (PDF)
[Open link in this window | Open link in new window]
Techdirt: EU Commission proposes new IP rules, with more weight on enforcement & making ISPs police the internet
[Open link in this window | Open link in new window]
WebWereld: 'Geen politierol isp's in strijd tegen piraterij'
[Open link in this window | Open link in new window]
Out-law.com: EU Commission outlines changes to IP laws
[Open link in this window | Open link in new window]
An expert group report by Lutz Schubert et al..
Lutz Schubert et al.: The future of cloud computing - Opportunities for European cloud computing beyond 2010 (PDF)
[Open link in this window | Open link in new window]
Europe's Information Society: The future of cloud computing - Opportunities for European cloud computing beyond 2010
[Open link in this window | Open link in new window]
A report by the World Economic Forum.
World Economic Forum: Advancing cloud computing - what to do now? Priorities for industry and governments (PDF)
[Open link in this window | Open link in new window]
World Economic Forum: Advancing cloud computing - what to do now?
[Open link in this window | Open link in new window]
ENISA: Final World Economic Forum report on cloud computing with Agency input launched
[Open link in this window | Open link in new window]
A report by the Department of health & Human Services, Office of Inspector General.
Department of health & Human Services, Office of Inspector General: Audit of information technology security included in health information technology standards (PDF)
[Open link in this window | Open link in new window]
OIG, HHS: Audit of information technology security included in health information technolgy standards
[Open link in this window | Open link in new window]
Inside Privacy: OIG criticizes HHS oversight of the HIPAA security rule, data security controls in health IT standards
[Open link in this window | Open link in new window]
An article by Jonathan Peters.
Jonathan Peters: WikiLeaks would not qualify to claim federal reporter's privilege in any form (PDF)
[Open link in this window | Open link in new window]
Wired Threat Level: Op-ed - WikiLeaks shows need for a legal 'watchdog privilege'
[Open link in this window | Open link in new window]
More at... [11/05/28 (NL/01)]
More at... [11/05/28 (NL/02)]
More at... [11/05/28 (NL/03)]
A strategy document by the White House.
The White House: International strategy for cyberspace (PDF)
[Open link in this window | Open link in new window]
The White House Blog: Lanching the U.S. international strategy for cyberspace
[Open link in this window | Open link in new window]
The Guardian: US calls on its Nato partners to help resist cyber-attacks
[Open link in this window | Open link in new window]
Tweakers.net: VS wil wereldwijde aanpak van cybercrime
[Open link in this window | Open link in new window]
WebWereld: Amerikanen willen meer grip op het internet
[Open link in this window | Open link in new window]
Ars Technica: US warns - hack us, and we might bomb you
[Open link in this window | Open link in new window]
Naked Security: President Obama's cybersecurity plan - Part 1 updates for law enforcements
[Open link in this window | Open link in new window]
Naked Security: President Obama's cybersecurity plan - Part 2 data breach notification act
[Open link in this window | Open link in new window]
Security.nl: Obama dreigt hackers met militaire vergelding
[Open link in this window | Open link in new window]
DarkReading: Not all nations a slam dunk for U.S. global internet cybersecurity policy
[Open link in this window | Open link in new window]
The Register: Hack attacks on US could spark military action
[Open link in this window | Open link in new window]
Techmeme
[Open link in this window | Open link in new window]
An opinion by WP29.
WP29: Opinion 13/2011 on geolocation services on smart mobile devices (PDF)
[Open link in this window | Open link in new window]
FT: Apple and Android phones face tighter laws in Europe
[Open link in this window | Open link in new window]
Inside Privacy: Article 29 Working party releases opinion on geo-location data for smart mobile devices
[Open link in this window | Open link in new window]
An independent report by Professor Ian Hargreaves.
Professor Ian Hargreaves: Digital opportunity - A review of intellectual property and growth (PDF)
[Open link in this window | Open link in new window]
BBC News: Hargreaves review gives copyright law digital makeover
[Open link in this window | Open link in new window]
Techdirt: UK copyright review hardly surprising or radical; but will face opposition
[Open link in this window | Open link in new window]
The Guardian: Hargreaves report recommends overhaul of copyright laws
[Open link in this window | Open link in new window]
The Guardian: Hargreaves report - Labour urges swifter action
[Open link in this window | Open link in new window]
Reuters: UK backs revamp of 300-year-old copyright laws
[Open link in this window | Open link in new window]
Ars Technica: Copyright policy based largely on "lobbynomics", not data
[Open link in this window | Open link in new window]
A report by Microsoft.
Microsoft: Security intelligence report
[Open link in this window | Open link in new window]
Roger Halbeer on Security: Security Intelligence Report v10 released
[Open link in this window | Open link in new window]
A report by Bill Grueskin, Ava Seave and Lucas Graves.
Bill Grueskin, Ava Seave and Lucas Graves: The story so far - What we know about the business of digital journalism (PDF)
[Open link in this window | Open link in new window]
The Guardian: Dangerous blend - how lines between editorial and advertising are blurring
[Open link in this window | Open link in new window]
An article by Kapil Singh, Helen J. Wang, Alexander Moschuk, Collin Jackson, Wenke Lee.
Kapil Singh, Helen J. Wang, Alexander Moschuk, Collin Jackson, Wenke Lee: HTTPi for practical end-to-end web content integrity (PDF)
[Open link in this window | Open link in new window]
WebWereld: Microsoft maakt superveilig https-alternatief
[Open link in this window | Open link in new window]
Security.nl: Microsoft onthult HTTPi tegen WiFi-hackers
[Open link in this window | Open link in new window]
Consolidated report by ENISA.
ENISA: ENISA ad hoc working group on national risk management preparedness (PDF)
[Open link in this window | Open link in new window]
ENISA: New report on national risk management preparedness - a guideline for critical information infrastructure governance
[Open link in this window | Open link in new window]
More at... [11/05/20 (NL/01)]
More at... [11/05/20 (NL/02)]
A self-assessment tool for organizations by the Office of the Privacy Commissioner of Canada.
Office of the Privacy Commissioner of Canada: Securing personal information
[Open link in this window | Open link in new window]
Office of the Privacy Commissioner of Canada: New privacy self-assessment tool for organizations
[Open link in this window | Open link in new window]
A report by Nick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, and Davide Balzarotti.
Nick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, and Davide Balzarotti: Exposing the lack of privacy in file hosting services (PDF)
[Open link in this window | Open link in new window]
WebWereld: Filehosters lekken privébestanden van gebruikers
[Open link in this window | Open link in new window]
The Register: Think file-hosting sites guard your private data? Think again
[Open link in this window | Open link in new window]
A report by Ponemon Institute LLC.
Ponemon Institute LLC: Security of cloud computing, providers study (PDF)
[Open link in this window | Open link in new window]
CA: Security standoff in the cloud?
[Open link in this window | Open link in new window]
DarkReading: Users, service providers at odds over cloud security, study says
[Open link in this window | Open link in new window]
Guidelines by CSA.
CSA: Security guidance for critical areas of focus in cloud computing v2.1 (PDF)
[Open link in this window | Open link in new window]
CSA: Cloud Security Alliance announces key initiative in development of cloud security standards in partnership with ISO/IEC
[Open link in this window | Open link in new window]
CSA: Security guidance for critical areas of focus in cloud computing
[Open link in this window | Open link in new window]
A paper by Petros Venetis, Hector Gonzalez, Christian S. Jensen and Alon Halevy.
Petros Venetis, Hector Gonzalez, Christian S. Jensen and Alon Halevy: Hyper-local, directions-based ranking of places (PDF)
[Open link in this window | Open link in new window]
Geeking with Greg: The value of Google Maps directions logs
[Open link in this window | Open link in new window]
Techmeme
[Open link in this window | Open link in new window]
A report by the U.S. Department of Justice.
U.S. Department of Justice: The Federal Bureau of Investigation's ability to address the national security cyber intrusion threat (PDF)
[Open link in this window | Open link in new window]
Ms. Smith: FBI - surveillance "going dark" or obsessed with porn and doing a poor job?
[Open link in this window | Open link in new window]
A paper by John Mueller and Mark G. Stewart.
John Mueller and Mark G. Stewart: Terror, security, and money - balancing the risks, benefits and costs of homeland security (PDF)
[Open link in this window | Open link in new window]
The Monkey Cage: How wasteful is spending on homeland security?
[Open link in this window | Open link in new window]
Techdirt: Homeland security doesn't do cost/benefit analysis; they just do fear and bluster
[Open link in this window | Open link in new window]
A paper by Jessica Litman.
Jessica Litman: Readers' copyright (SSRN)
[Open link in this window | Open link in new window]
TLF: Jessica Litman on reclaiming copyright for readers
[Open link in this window | Open link in new window]
More at... [11/05/13 (NL/01)]
More at... [11/05/13 (NL/02)]
More at... [11/05/13 (NL/03)]