Rina Steenkamp - Privacy and technology

Weblog

2015

March

[The Open Internet rules and order | Against jawboning | Manila principles on intermediary liability | Americans' privacy strategies post-Snowden | A precautionary approach to big data privacy | European cyber security perspectives 2015 | How polymorphic warnings reduce habituation in the brain - Insights from an fMRI study | Data protection broken badly | Consumer Privacy Bill of Rights Act | Surreptitiously weakening cryptographic systems | Geotagging one hundred million Twitter accounts with total variation minimization | Privacy and cyber security - Emphasizing privacy protection in cyber security activities | Virtual currency schemes - a further analysis | PowerSpy - Location tracking using mobile device power analysis | Schrödinger's cybersecurity | From social media service to advertising network - A critical analysis of Facebook's revised policies and terms | Privacy implications of health information seeking on the web | Cookie sweep combined analysis - Report | Threat landscape and good pracice guide for smart home and converged media | Internet of Things security study - Home security systems report | Careless whispers - How speech is policed by outdated communications legislation | Out of balance - Defamation law in the European Union | State of privacy report 2015]

Toezichtsrapport inzake de toepassing van biologische forensische onderzoeksmethoden door de AIVD

[Lees verder]

Het gebruik van drones - Een verkennend onderzoek naar onbemande luchtvaartuigen

[Lees verder]

Suwinet - Privacy impact assessment

[Lees verder]

ECLI:NL:RBAMS:2015:716

[Lees verder]