2010

[January | February | March | April | May | June | July | August | September | October | November | December]

January

[Data breaches in 2009 | Quantifying IT estimation risks and quantifying requirements volatility effects | Privacy by design | Web application security trends, Q1-Q2, 2009]

February

[Security, at what cost? | Online reputation in a connected world | Online behavioral advertising "icon" study | How unique - and trackable - is your browser? | Privacy and the use of geospatial information | Cyberwar | Security threat report: 2010 | How online card security fails | Most consumers reuse banking passwords on other sites | De-anonimyzing social network users | Making privacy policies not suck | Social media and young adults | 17 golden rules for mobile social networks | Online copyright enforcement and data protection | Ensuring consent and revocation | Chip and PIN is broken | 2010 UK security breach investigations report | 2010 CWE/SANS Top 25 most dangerous programming errors | Botnets blamed for junk mail and malicious spam | The promotion and protection of human rights and fundamental freedoms while countering terrorism | Behavioural biometrics]

March

[The privacy dividend - the business case for investing in proactive privacy protection | The inadvertent disclosure of personal health information through peer-to-peer file sharing programs | Verizon incident sharing metrics framework | Learn more about identity theft | The evidence on DNA retention | State of enterprise security, 2010 | Depicting the UK's fraud landscape | Identity and its verification | The electronic police state | Private lives - a people's inquiry into personal information | Promoting trust in the information society by fostering data protection and privacy | The next steps for the Data Protection Directive | Standardizing privacy notices | Evaluating statistical attacks on personal knowledge questions | Side-channel leaks in web applications]

April

[How to use video-surveillance resposibly | A set of nasty questions to ask your security vendors | Weaknesses in IRS systems continue to jeopardize the confidentiality, integrity and availability of financial and sensitive taxpayer information | Cloud computing | Building a digital economy: the importance of saving jobs in the EU's creative industries | Detecting and defeating government interception attacks against SSL | A security analysis of the Dutch national electronic patient record system | The emerging and future risks framework | The value of behavioral targeting | Protecting the confidentiality of personally identifiable information (PII) | Internalizing identity theft | Facebook - Another breach in the wall | Intellectual property - observations on efforts to quantify the economic effects of counterfeit and pirated goods | Protecting Europe against large-scale cyber-attacks | Under surveillance | Managing re-identification risk | Security in the trenches - Comparative study of IT practitioners and executives in the U.S. federal government | The top 10 web application security risks | Application development security procurement language | Global internet security threat report - volume XV, April 2010 | How different are young adults from older adults when it comes to information privacy attitudes and policies? | Youth, privacy and reputation | Opt-in Dystopias | Promoting confidence in electronic commerce - legal issues on international use of electronic authentication and signature methods]

May

[Feasibility and real-world implications of web browser history detection | Identity theft - the aftermath 2009 | The Italian Google-case - privacy, freedom of speech and responsibility of providers for user-generated contents | What you see is what they get - Protecting users from unwanted use of microphones, cameras and other sensors | I'm allowing what? Disclosing the authority applications demand of users as a condition of installation | How global organizations approach the challenge of protecting personal data | How unique is your web browser? | Experimental security analysis of a modern automobile | Digital competitiveness report | The information dividend: Can IT make you 'happier'? | Privacy regulation and online advertising | Information security breaches survey 2010 | Journal of Virtual Worlds Research | Is the internet for porn? An insight into the online adult industry | "The strategic context and the role of data protection authorities in the debate on the future of privacy" | "Data protection and cloud computing under EU law" | "Internet of things: ubiquitous monitoring in space and time" | Legal, economic and cultural aspects of file sharing | Priorities for research on current and emerging network trends | Evaluation of Directive 2006/24/EC and of national measures to combat criminal misuse and anonymous use of electronic communications | Report on the joint review of the implementation of the Agreement between the European Union and the United States of America on the processing and transfer of Passenger Name Record (PNR) data by air carriers to the United States Department of Homeland Security (DHS) | The economic and social role of internet intermediaries | Opinion on the Proposal for a Directive of the European Parliament and the Council on waste electrical and electronic equipment (WEEE) | Mobile identity management | Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT and RFID technology | Analyzing the first years of the Ticket or Click It mobilizations]

June

[Proposal for a Council Decision on the conclusion of the Agreement between the European Union and the United States of America on the processing and transfer of Financial Messaging Data from the European Union to the United States for purposes of the Terrorist Finance Tracking Program (TFTP II) | SMB (small and midsized businesses) information protection survey | 09 Piracy study | Net neutrality, investment and jobs - Assessing the potential impacts of the FCC's proposed net neutrality rules on the broadband ecosystem | Myths and Fallacies of "Personally Identifiable Information"... | Security analysis of over 48,000 Android market applications... | Privacy by design - Achieving the gold standard in data protection for the smart grid | Honeybot, your man in the middle for automated social engineering | The expanding digital universe - a forecast of worldwide information growth through 2010 | Privacy and regulatory innovation - moving beyond voluntary codes | Practical padding Oracle attacks | Youth safety on a living internet | The role of internet service providers in botnet mitigation - an empirical analysis based on spam data | Digital activism decoded | Reputation management and social media]

July

[Study on the economic benefits of privacy-enhancing technologies (PETs) | [...] on the principle of accountability | Cisco 2010 Midyear security report | 2010 Data breach investigations report | Data breaches - a black hole | The password thicket - technical and market failures in human authentication on the web | Popularity is everything - A new approach to protecting passwords from statistical-guessing attacks | Who controls the off switch? | Information Commissioner's Annual Report 2009/10 | Fast, accurate and practical identity inference using TV remote controls | Comparative study on different approaches to new privacy challenges, in particular in the light of technological developments | 2010 Financial Services Global Security Study - The faceless threat | The future of social relations | Spying the world from your laptop - Identifying and profiling content providers and big downloaders in BitTorrent | Opinion 2/2010 on online behavioural advertising | From hype to future - KPMG's 2010 Cloud computing survey | [Online advertising] quality assurance guidelines | Innovation - a priority for growth in the aftermath of the downturn]

August

[The end of the Net as we know it? Deep packet inspection and internet governance | Location-sharing technologies - Privacy risks and controls | Where do security policies come from? | An analysis of private browsing modes in modern browsers | Cybercriminals target online banking customers | Influence and passivity in social media | Social engineering framework | Security threat report: Mid-year 2010 | Symantec 2010 Information management health check | Personal information online | Facebook privacy settings: Who cares? | Urban computing and its discontents]

September

[Privacy papers for policy makers | Token attempt - the misrepresentation of website privacy policies through the misuse of P3P compact policy tokens | Facebook and the new age of privacy | A guide to data governance for privacy, confidentiality, and compliance - part 5: Moving to cloud computing | The avoidable cost of downtime | Incentives and challenges for information sharing in the context of network and information security | The rise of apps culture | Social engineering capture the flag results | Cybercasing the joint - on the privacy implications of geo-tagging | The human impact | Internet governance in an age of cyber insecurity | Contracts for clouds - comparison and analysis of the terms and conditions of cloud computing services | Cell phones and American adults | Linking biomedical informatics, grid computing and nanomedicine | Protecting your daily in-home activity information from a wireless snooping attack]

October

[Targeted enforcement and shared lawmaking authority as catalysts for data protection in the United States | Can society afford to rely on security by afterthought not design? | E-Deceptive campaign practices report 2010 - Internet technology and democracy 2.0 | Unplugged | Security intelligence report | Global fraud report | Build a privacy plan for your business | Fight terror, defend freedom | iPhone applications and privacy issues - an analysis of application transmission of iPhone Unique Device Identifiers (UDIDs) | TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones | Privacy 3.0 - the principle of proportionality | A terminology for talking about privacy by data minimization - Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management | Network Accountability for the domestic intelligence apparatus | The prototype of privacy: Analysing privacy discourse through its features | Researching privacy in HIV care: An ethnographic analysis of methods | Attacks and design of image recognition CAPTCHAs | Reservoirs of danger - The evolution of public and private law at the dawn of the information age | Social media governance | Privacy and the smart grid | State of software security report - The intractable problem of insecure software | Cloud computing: Australian lessons and experiences]

November

[ACTA as a new kind of international IP law-making | The US Department of Commerce and international privacy activities: Indifference and neglect | (Fr)agile? Risk management and agile software development | Information security management system for Microsoft cloud infrastructure | Use of the internet in higher-income households | VERIS | The role of internet service providers in botnet mitigation: an empirical analysis based on spam data | Draft report on the impact of advertising on consumer behaviour | Opinion 7/2010 on European Commission's Communication on the global approach to transfers of Passenger Name Record (PNR) data to third countries | Enabling trade in the era of information technologies: breaking down barriers to the free flow of information | A matter of trust: Integrating privacy and public safety in the 21st century | A comprehensive approach on personal data protection in the European Union | Report to the nations on occupational fraud and abuse | Geoslavery | 4% of online Americans use location-based services]

December

[An empirical study of privacy-violating information flows in JavaScript web applications | Attacks by "anonymous" WikiLeaks proponents not anonymous | The billion dollar lost laptop problem | Location-based services - time for a privacy check-in | Principles for government data mining | Protecting consumer privacy in an era of rapid change - A proposed framework for businesses and policymakers | A new era of compliance - Raising the bar for organizations worldwide | Facebook tracks and traces everyone: Like this! | Stealing reality | Verizon 2010 payment card industry compliance report]



Creative Commons License

All original content on this website © 2005-2010 Rina Steenkamp. This work is licensed under a Creative Commons License. On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.