Rina Steenkamp - Privacy and technology

Weblog

2015

[January | February | March | April | May | June | July | August | September | October | November | December]

January

[n/a]

February

[Anonymity and encryption | ACLU Submission to the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression | Big data and differential pricing | Tracking and hacking - Security and privacy gaps put American drivers at risk | DeepFace - Closing the gap to human-level performance in face verification | The notice paradox - Secret surveillance, criminal defendants and the right to notice | Mass surveillance | Global chilling - The impact of mass surveillance on international writers | Privacy and data protection by design - from policy to engineering | The collection, linking and use of data in biomedical research and health care - ethical issues | Unique in the shopping mall - On the reidentifiability of credit card metadata | Internet of things - Privacy and security in a connected world | Promoting investment and innovation in the Internet of Things - Summary of responses and next steps | Computer-based personality judgments are more accurate than those made by humans | Exploit this - Evaluating the exploit skills of malware groups | 2014 Year-end review of class actions (and what tot expect in 2015) | ENISA Threat landscape 2014 - Overview of current and emerging cyber-threats | The Turn-Verizon zombie cookie]

March

[The Open Internet rules and order | Against jawboning | Manila principles on intermediary liability | Americans' privacy strategies post-Snowden | A precautionary approach to big data privacy | European cyber security perspectives 2015 | How polymorphic warnings reduce habituation in the brain - Insights from an fMRI study | Data protection broken badly | Consumer Privacy Bill of Rights Act | Surreptitiously weakening cryptographic systems | Geotagging one hundred million Twitter accounts with total variation minimization | Privacy and cyber security - Emphasizing privacy protection in cyber security activities | Virtual currency schemes - a further analysis | PowerSpy - Location tracking using mobile device power analysis | Schrödinger's cybersecurity | From social media service to advertising network - A critical analysis of Facebook's revised policies and terms | Privacy implications of health information seeking on the web | Cookie sweep combined analysis - Report | Threat landscape and good pracice guide for smart home and converged media | Internet of Things security study - Home security systems report | Careless whispers - How speech is policed by outdated communications legislation | Out of balance - Defamation law in the European Union | State of privacy report 2015]

April

[n/a]

May

[n/a]

June

In the spotlight this month:

[Read more]

July

[n/a]

August

[n/a]

September

[n/a]

October

[n/a]

November

[n/a]

December

[n/a]