Rina Steenkamp - Privacy en technologie

Weblog

2014

Januari

[Wifi-tracking - winkels volgen je voetsporen | Intieme technologie - de slag om ons lichaam en gedrag | Glazen privacy - Knelpuntenonderzoek uitvoering Wet politiegegevens (Wpg) | SMART Privacy]

Connecting the dots - Analysis of the efectiveness of bulk phone records collection

[Read more]

Obama's NSA speech has little impact on skeptical public

[Read more]

What secrets your phone is sharing about you - Businesses use sensors to track customers, build shopper profiles

[Read more]

Transaction costs, privacy and trust - The laudable goals and ultimate failure of notice and choice to respect privacy online

[Read more]

Big data for development - Challenges and opportunities

[Read more]

FTC settles with twelve companies falsely claiming to comply with international Safe Harbor privacy framework

[Read more]

On the security, privacy and usability of online seals - An overview

[Read more]

Do NSA's bulk surveillance programs stop terrorists?

[Read more]

Tiny constables and the cost of surveillance - Making cents out of United States v. Jones

[Read more]

How law enforcement tracks cellular phones

[Read more]

How the NSA almost killed the internet

[Read more]

Twenty privacy bills to watch in 2014

[Read more]

Use of sensitive health information for targeting of Google ads raises privacy concerns

[Read more]

Relational Big Data

[Read more]

Social media for selection? Validity and adverse impact potential of a Facebook-based assessment

[Read more]

What happens in the hospital doesn't stay in the hospital

[Read more]

Mr. Wemmick's condition - or, privacy as a disposition, complete with skeptical observations regarding various regulatory enthusiasms

[Read more]

Privacy and cloud computing in public schools

[Read more]

The hidden truth behind shadow IT - Six trends impacting your security posture

[Read more]

Privacy in mobile apps - Guidance for app developers

[Read more]

In-car location-based services - Companies are taking steps to protect privacy, but some risks may not be clear to consumers

[Read more]

Information security - Agency responses to breaches of personally identifiabe information need to be more consistent

[Read more]

How to forget passwords (Many faces of passwords)

[Read more]