L2D79
(1.8) | L3T24 (70%): Crime prevention (14%), Information Age (12%), Information governance (11%), Security engineering (9%), Cyberspace (9%)
| L1D225
(1.8) | L3T11 (40%): Justice (13%), Government information (12%), Civil rights and liberties (10%), Social issues (9%), Government and personhood (9%)
L3T31 (20%): Law (26%), Government (23%), Politics (17%), Public sphere (15%)
| - Use of facial recognition technology for migrant disembarkation in Italy (1970) (1970) [+]
- CEPOL cooperation with Algeria and other North African states (1970) (1970) [+]
- Standard on privacy and web analytics . (2002) (2002) [+]
- Data Mining and Data Analysis for Counterterrorism (2004) (2004) [+]
- Des Landesbeauftragten für den Datenschutz (2005) (2005) [+]
- Vernehmlassungsverfahren zum Bundesgesetz über die Unternehmens- Identifikationsnummer (UIDG) (2009) (2009) [+]
- Protection of biometric information: guidance for schools and further education institutions (2009) (2009) [+]
- Consolato Generale D’italia (2010) (2010) [+]
- No Longer A Nameless Face In the Crowd (2011) (2011) [+]
- Government Opportunities to Harness “Big Data” (2011) (2011) [+]
- Banca d'Italia - Il Cloud Computing nel sistema finanziario. Standard, regolamentazione e controlli (2012) (2012) [+]
- EDICOM Finance s. r. l. con socio unico (2013) (2013) [+]
- Avis 12-224 (2013) (2013) [+]
- Big Data and Privacy Frameworks: Perspectives from Government, Industry and Policy Experts (2014) (2014) [+]
- Surveillance camera code of practice (2014) (2014) [+]
- 36. Jahresbericht der Landesbeauftragten für Datenschutz (2014) (2014) [+]
- Data Protection and Big Data - Datenschutz und Big Data (2015) (2015) [+]
- Finding Privacy in the Global Cloud (2015) (2015) [+]
- Big Data zur Gefahrenabwehr und Strafverfolgung : Risiken und Nebenwirkungen beachten (2015) (2015) [+]
- Datenschutzrechtliche Kernpunkte für die Trilogverhandlungen zur Datenschutz-Grundverordnung (2015) (2015) [+]
- 37. Jahresbericht der Landesbeauftragten für Datenschutz (2015) (2015) [+]
- The German NSA Affair and the Need for Reform in Berlin (2015) (2015) [+]
- Memorandum (2015) (2015) [+]
- Can Americans Trust the Privacy and Security of their Information on HealthCare.gov? (2015) (2015) [+]
- Big Data zur Gefahrenabwehr und Strafverfolgung : Risiken und Nebenwirkungen beachten (2015) (2015) [+]
- Tätigkeitsbericht der LfDI Saarland (2015) (2015) [+]
- Datenschutzrechtliche Kernpunkte für die Trilogverhandlungen zur Datenschutz-Grundverordnung (2015) (2015) [+]
- Rfa Dsg (2016) (2016) [+]
- WD 3 - 168/16 Fragen zum Datenschutz im vernetzten Auto (2016) (2016) [+]
- Big Data - Big Privacy (2016) (2016) [+]
- Digital privacy in Asia: Setting the agenda (2016) (2016) [+]
- Smart Government (2016) (2016) [+]
- Unterrichtung (2016) (2016) [+]
- Vernehmlassungsverfahren Stärkung des Datenschutzes: Stellungnahmen der Kantone (2017) (2017) [+]
- Oral evidence - 1 Feb 2017 (2017) (2017) [+]
- Vernehmlassungsverfahren Stärkung des Datenschutzes: Stellungnahmen der Organisationen S - Z (2017) (2017) [+]
- Bringing the data privacy debate to the high street (2017) (2017) [+]
- The Equifax data breach is the national wake-up moment we expected (2017) (2017) [+]
- Sichere Kommunikation (2017) (2017) [+]
- 39. Jahresbericht Datenschutz (2017) (2017) [+]
- Pitch session template - Horizon 2020 security (2017) (2017) [+]
- Digitalisierung und Vernetzung (2017) (2017) [+]
- Earelate By wll WORyY (2017) (2017) [+]
- Zentrum Saarland (2017) (2017) [+]
- Das Ende der Privatsphäre? – zum Wettlauf von Recht und Technik oder : Mensch oder Maschine – hat Privatsphäre eine Zukunft? (2018) (2018) [+]
- It's your data – take control : a citizen's guide to data protection in the EU. (2018) (2018) [+]
- Proof Of Sponsorship And / Or Private Accommodation (2018) (2018) [+]
- Baghdad (2018) (2018) [+]
- Servizio di“ Newsletter ” (2018) (2018) [+]
- Informativa sulla protezione delle persone fisiche con riguardo al trattamento dei dati personali (Regolamento Generale sulla Protezione dei Dati (UE) 2016 / 679, art. 13) (2018) (2018) [+]
- Consolato Generale d’Italia (2018) (2018) [+]
- Services Cotswold Centre (2018) (2018) [+]
- Silicon Valley says AI will curb disinformation -- but it might make things worse (2018) (2018) [+]
- Informativa sulla protezione delle persone fisiche con riguardo al trattamento dei dati personali (Regolamento Generale sulla Protezione dei Dati (UE) 2016 / 679, art. 13) (2018) (2018) [+]
- Facial Recognition Scanning in Schools Has Arrived (2018) (2018) [+]
- Relaretae (2018) (2018) [+]
- Informativa sulla protezione delle persone fisiche Con riguardo al trattamento dei dati personali (Regolamento Generale sulla Protezione dei Dati (UE) 2016 / 679, art. 13) (2018) (2018) [+]
- A new era for data protection in the EU : what changes after May 2018. (2018) (2018) [+]
- Domanda Di Attribuzione Di Codice Fiscale (2018) (2018) [+]
- 40. Jahresbericht Datenschutz (2018) (2018) [+]
- Code of practice for the secondary use of mobile network big data (2018) (2018) [+]
- A User Guide to Data Protection in the European Union – Your Rights and How to Exercise Them (2018) (2018) [+]
- Creating a data protection framework: A do’s and don’ts guide for lawmakers (2018) (2018) [+]
- Internet users whose personal data is collected online [What Europe does for you] (2018) (2018) [+]
- Antrag Auf Ausstellung Eines Personalausweises (2018) (2018) [+]
- 10 ethical guidelines for the digitalisation of companies - 10 ethische Leitlinien fr die Digitalisierung von Unternehmen (2018) (2018) [+]
- GUIDANCE DOCUMENT Commission guidance on the application of Union data protection law in the electoral context A contribution from the European Commission to the Leaders' meeting in Salzburg on 19-20 September 2018 (2018) (2018) [+]
- European Commission's contribution to the Informal Leaders' meeting, Sofia, Bulgaria (16 May 2018) (2018) (2018) [+]
- Möglichkeit der Einführung eines Datenportabilitätsrechts im schweizerischen Recht und zur Rechtslage bei Personal Information Management Systems (PIMS) (2018) (2018) [+]
- European Commission's contribution to the Informal Leaders' meeting, Sofia, Bulgaria (16 May 2018) (2018) (2018) [+]
- Explaining the EU's General Data Protection Regulation (2018) (2018) [+]
- Nutzung von Verkehrsdaten durch Mobilfunkbetreiber – Endbericht. Bericht-Nr. ITA 2018-03; Institut für Technikfolgen-Abschätzung der Österreichischen Akademie der Wissenschaften: Wien; im Auftrag von: Bundesarbeitskammer. (2018) (2018) [+]
- European Commission's contribution to the Informal Leaders' meeting, Sofia, Bulgaria (16 May 2018) (2018) (2018) [+]
- FTC Announces Historic, Yet Insufficient, Settlement with Facebook for Privacy Violations (2019) (2019) [+]
- Beantwoording Kamervragen over kredietwaardigheidsonderzoeken (2019) (2019) [+]
- Ethan Frome (2019) (2019) [+]
- Task Force on Financial Technology: Banking on Your Data: the Role of Big Data in Financial Services (2019) (2019) [+]
- 27. Tätigkeitsbericht (2019) (2019) [+]
- Regione Friuli-venezia Giulia (2019) (2019) [+]
- Kamerbrief met reactie op artikel over secundair gebruik data (2019) (2019) [+]
- Translation: China's New Draft 'Data Security Management Measures' (2019) (2019) [+]
- Fiche 1 : Mededeling gegevensbeschermingsregels 1 (2019) (2019) [+]
- Vernehmlassungsverfahren Stärkung des Datenschutzes: Stellungnahmen von Privatpersonen (2019) (2019) [+]
- Cyber Chronix Episode 1 : finding data. (2019) (2019) [+]
- Aanbiedingsbrief over het verslag van de Telecomraad 3 december 2019 (2019) (2019) [+]
- Hambacher Erklärung zur Künstlichen Intelligenz (2019) (2019) [+]
- Consolato Generale d’Italia (2019) (2019) [+]
- Cyber Chronix - Episodio 1 - Alla ricerca dei dati (2019) (2019) [+]
- "Protecting Consumer Privacy in the Era of Big Data" (2019) (2019) [+]
- "Protecting Consumer Privacy in the Era of Big Data" (2019) (2019) [+]
- "Protecting Consumer Privacy in the Era of Big Data" (2019) (2019) [+]
- "Protecting Consumer Privacy in the Era of Big Data" (2019) (2019) [+]
- 1. Jahresbericht Datenschutz nach der Datenschutzgrundverordnung (2019) (2019) [+]
- Richiesta Di Appuntamento Per Emissione Del Passaporto (2019) (2019) [+]
- FOI responses released by MOD: week commencing 14 January 2019 (2019) (2019) [+]
- FOI responses released by MOD: week commencing 27 May 2019 (2019) (2019) [+]
- Digital ID and the Data Protection Challenge : Practitioner's Note (2019) (2019) [+]
- Orientierungshilfe zum Gesundheitsdatenschutz (2019) (2019) [+]
- Transparenz von Algorithmen und Künstlicher Intelligenz (KI) in der Verwaltung (2019) (2019) [+]
- – Nova Scotia ’ s Information and Privacy (2019) (2019) [+]
- Di non essere titolare di cariche in enti di diritto privato regolati o finanziati dalla pubblica (2019) (2019) [+]
- ADVIES COMMISSIE GOVERNANCE VAN KWALITEITSREGISTRATIES (2019) (2019) [+]
- Vrachtwagenheffing Nederlan.d Privacy impact assessment (2019) (2019) [+]
- Cyberluws. I { et (2019) (2019) [+]
- Hambacher Erklärung zur Künstlichen Intelligenz (2019) (2019) [+]
- TK Beantwoording feitelijke vragen over de kabinetsreactie op drie onderzoeken naar algoritmen (2020) (2020) [+]
- WD 3 - 018/20 Datenbank-Analysen durch die Polizei. Grundrechte und Datenschutzrecht (2020) (2020) [+]
- Antwoorden Kamervragen over het bericht over persoonlijke gegevens op LinkedIn en Lusha (2020) (2020) [+]
- Open letter: Nintendo’s commitment to privacy on Augmented Reality developments (2020) (2020) [+]
- Facial recogni (2020) (2020) [+]
- Bijlage 3 ICT-vernieuwing binnen politieportefeuilles (2020) (2020) [+]
- PBS0053 - The future UK-EU relationship on professional and business services (2020) (2020) [+]
- Anonymisierung im Datenschutz als Chance für Wirtschaft und Innovationen (2020) (2020) [+]
- DENUNCIA DI SMARRIMENTO / FURTO DOCUMENTI STOLEN / LOST DOCUMENT REPORT Dichiarazione sostitutiva di certificazioni (Art. 46 D. P. R. 445 del 28 / 12 / 2000) (Art. 13 Legge 21 novembre 1967 n. 1185) (2020) (2020) [+]
- Kamerbrief wijziging Uitvoeringswet AVG en andere wetten (2020) (2020) [+]
- FOI responses released by MOD: week commencing 28 September 2020 (2020) (2020) [+]
- 2. Jahresbericht Datenschutz nach der Datenschutzgrundverordnung (2020) (2020) [+]
- Leveraging GDPR to Become a Trusted Data Steward (2020) (2020) [+]
- Antwoorden Kamervragen over het bericht dat politie en COA persoonlijke data asielzoekers delen (2020) (2020) [+]
- Kamerbrief met reactie op rapporten Amnesty en VN rapporteur en beantwoording Kamervraag gezichtsherkenning (2020) (2020) [+]
- CONSOLATO GENERALE D'ITALIA Hannover Freundallee 27, 30173 Hannover ci _ conhann @ esteri. it (2020) (2020) [+]
- WD 3 - 180/20 Digitales-Versorgungs-Gesetz â Datentransparenz (§§ 303a ff. SGB V). Recht auf informationelle Selbstbestimmung und Datenschutz (2020) (2020) [+]
- Atlantic Information and Privacy Commissioners highlight implications of facial recognition technology (2020) (2020) [+]
- 20190507 - Entwurf Anhörungg (2020) (2020) [+]
- Data Delivery Group meeting: July 2020 (2020) (2020) [+]
- Fortschritt oder Risiko? (2020) (2020) [+]
- Kamerbrief Fraude Signalering Voorziening (FSV) (2020) (2020) [+]
- Proposition 24 Would Weaken Consumer Data Privacy (2020) (2020) [+]
- FOI responses released by MOD: week commencing 8 February 2021 (2021) (2021) [+]
- Jaarverslag 2020 Functionaris Gegevensbescherming (2021) (2021) [+]
- Gutachten zur Umsetzung der BMWi-Strategie „Reallabore als Testräume für Innovation und Regulierung": Hürden und Gestaltungsspielräume im deutschen und europäischen Datenschutzrecht für die Erprobung digitaler Innovationen (2021) (2021) [+]
- Written answer : Shenzhen Zhenhua Data Information Technology (2021) (2021) [+]
- Answer for question E-007026/20 - Annex (2021) (2021) [+]
- The Island Communities Impact Assessments (Publication and Review of Decisions) (Scotland) Regulations 2020: DPIA (2021) (2021) [+]
- National Data Privacy and Data Security Legislation (2021) (2021) [+]
|
L1D226
(2.1) | L3T24 (71%): Cybercrime (7%), Security engineering (7%), Crime prevention (7%), Security technology (6%), Secure communication (6%)
| - Privacy and cyber security : emphasizing privacy protection in cyber security activities. (2002) (2002) [+]
- The dark space project / [by] Dave McMahon, Rafal Rohozinski . (2002) (2002) [+]
- National cyber security strategy : Canada’s vision for security and prosperity in the digital age. (2002) (2002) [+]
- Cyber Security Assessment and Management (CSAM) (2007) (2007) [+]
- Influences on the Adoption of Multifactor Authentication (2011) (2011) [+]
- Raising the Bar for Cybersecurity (2013) (2013) [+]
- The Economics of Cyberwar (2014) (2014) [+]
- EC3 - European Cybercrime Centre : products & services. (2014) (2014) [+]
- Cyber Threat and Response (2014) (2014) [+]
- Online Voting: Rewards and Risks (2014) (2014) [+]
- House Hearing, 113th Congress — CAN TECHNOLOGY PROTECT AMERICANS FROM INTERNATIONAL CYBERCRIMINALS? (2014) (2014) [+]
- The Challenges Facing Computer Security Incident Response Teams (2015) (2015) [+]
- In Search of Better Data Security? It’s Not Where, But How (2015) (2015) [+]
- Cyber Operations Rapid Assessment Questionnaire (2015) (2015) [+]
- Can Americans Trust the Privacy and Security of their Information on HealthCare.gov? (2015) (2015) [+]
- Assessing Cyber Security (2015) (2015) [+]
- Digital Security in Aid and Development (2015) (2015) [+]
- Germany Needs an Independent Digital Emergency Response Team (2016) (2016) [+]
- Industry Observations (2016) (2016) [+]
- Cyber Operations Rapid Assessment (CORA): A Guide to Best Practices for Threat-Informed Cyber Security Operations (2016) (2016) [+]
- Deutschland braucht ein unabhängiges digitales Notfallteam (2016) (2016) [+]
- Your Baby Monitor Is Attacking The Government (2016) (2016) [+]
- Think beyond the checkbox: Effective cybersecurity risk measures to reduce healthcare system liability (2016) (2016) [+]
- Protecting Data Privacy With User-Friendly Software (2016) (2016) [+]
- House Hearing, 114th Congress — CYBERSECURITY: WHAT THE FEDERAL GOVERNMENT CAN LEARN FROM THE PRIVATE SECTOR (2016) (2016) [+]
- Documenting Cyber Security Incidents (2016) (2016) [+]
- Mitchell v. USA - Exhibit 122 to the Declaration of Ann E. Querns (2017) (2017) [+]
- Cybersecurity : what the federal government can learn from the private sector : joint hearing before the Subcommittee on Research and Technology & Subcommittee on Oversight, Committee on Science, Space, and Technology, House of Representatives, One Hundred Fourteenth Congress, first session, January 8, 2016. (2017) (2017) [+]
- NATIONAL ENGAGEMENT FOR THE NATIONAL INCIDENT MANAGEMENT SYSTEM (NIMS) RESOURCE MANAGEMENT SUPPLEMENTAL GUIDANCE AND TOOLS - Cybersecurity (2017) (2017) [+]
- Opening of the Exhibit Hall Welcome Address : Robert H. Samson, New York State CIO Keynote : Reg Harnish, CEO, GreyCastle Security (2017) (2017) [+]
- Defensible and Beyond (2017) (2017) [+]
- Encryption Policy 2.0: Securing India's Digital Economy | ORF (2017) (2017) [+]
- Internet of Things Device Security and Supply Chain Management (2017) (2017) [+]
- Oversight of the Equifax Data Breach: Answers for Consumers (2017) (2017) [+]
- “Empty Threat or Serious Danger: Assessing North Korea’s Risk to the Homeland”. (2017) (2017) [+]
- A Simple Security Update Could Have Prevented Ransomware Attack (2017) (2017) [+]
- Noboru Nakatani Presentation (2017) (2017) [+]
- Cyber Security 2018 Roundup (2018) (2018) [+]
- “Examining the Current Data Security And Breach Notification Regulatory Regime” (2018) (2018) [+]
- DHS Election Infrastructure Security Funding Considerations (2018) (2018) [+]
- Preparing for Cybersecurity Threats to the 2020 Olympics (2018) (2018) [+]
- Cyber Security Skills in the UK Labour Market (2018) (2018) [+]
- Pitch session template - Horizon 2020 security (2018) (2018) [+]
- Cybersecurity in Retail (2018) (2018) [+]
- The Magnitude of the Cyber Threat Facing America (2018) (2018) [+]
- Tuesday June 5, 2018 (2018) (2018) [+]
- Cyber resilience in the financial sector (2018) (2018) [+]
- United States v. Zhu Hua Indictment (2018) (2018) [+]
- Ransomware Is Coming. It'll Make You Wannacry. (2018) (2018) [+]
- Tuesday June 5, 2018 (2018) (2018) [+]
- What Does the Teddy Bear Say? (2018) (2018) [+]
- IT-Sicherheit und Recht (2018) (2018) [+]
- NEWS (2018) (2018) [+]
- Stratégie nationale en matière de cybersécurité III (2018) (2018) [+]
- 12 Days of Christmas - Highlights from British Columbia Information Security Branch (2018) (2018) [+]
- Security News Digest May 15th, 2018 (2018) (2018) [+]
- May is Password Protection Month Take our monthly quiz and test your knowledge (2018) (2018) [+]
- September 11th, 2018 (2018) (2018) [+]
- CO18013 | Cyber Threats: 2018 and Beyond (2018) (2018) [+]
- IISS Cyber Report: 22 to 28 June (2018) (2018) [+]
- IISS Cyber Report: 6 to 12 July (2018) (2018) [+]
- IISS Cyber Report: 5 to 11 October (2018) (2018) [+]
- IISS Cyber Report: 28 September to 4 October (2018) (2018) [+]
- Security While Traveling (2019) (2019) [+]
- Spotting a Fake (2019) (2019) [+]
- Tuesday June 4, 2019 (2019) (2019) [+]
- Have Consumers Already Lost the Online Privacy War? (2019) (2019) [+]
- March is (2019) (2019) [+]
- Security While Traveling (2019) (2019) [+]
- 2018 12 20 United States v. Zhu Hua Indictment (2019) (2019) [+]
- Secure Delaware 2019 Workshop Agenda (2019) (2019) [+]
- April 2 nd, 2019 (2019) (2019) [+]
- Security By The Numbers (2019) (2019) [+]
- Try our June quiz (2019) (2019) [+]
- Summer Phishing (2019) (2019) [+]
- Dark Web 2.0? (2019) (2019) [+]
- Try our April quiz - (2019) (2019) [+]
- The Rise of Municipal Ransomware (2019) (2019) [+]
- AI in Cybersecurity is the way ahead (2019) (2019) [+]
- February 19 th, 2019 (2019) (2019) [+]
- January 22 nd, 2019 (2019) (2019) [+]
- May Newsletter (2019) (2019) [+]
- Get Ready for (2019) (2019) [+]
- Horizon 2020 Cyber Security (2019) (2019) [+]
- Security and Project Management (2019) (2019) [+]
- July Newsletter (2019) (2019) [+]
- Try our July quiz (2019) (2019) [+]
- Summer Phishing (2019) (2019) [+]
- IISS Cyber Report: 18 to 24 January (2019) (2019) [+]
- Cyber Security: Beware the Human Factor (2019) (2019) [+]
- IISS Cyber Report: 4 to 10 January (2019) (2019) [+]
- January 8 th, 2019 (2019) (2019) [+]
- New Zealand’s cyber security strategy 2019 (2019) (2019) [+]
- Try our September quiz (2019) (2019) [+]
- Advanced technologies for industry, policy brief : cybersecurity : more investment and better skills. (2020) (2020) [+]
- Encryption: finding the balance between privacy, security and lawful data access (2020) (2020) [+]
- Personal data security technical guide for online education platforms (2020) (2020) [+]
- Oltre al coronavirus: i nostri dati sanitari sono sempre più appetibili (2020) (2020) [+]
- Catálogos / folletos de ferias e institucionales (2020) (2020) [+]
- A cyber wish list at a ‘moment of reckoning’ (2020) (2020) [+]
- How is your smart device listening to you?: D97-1/70-013-2020E-PDF Publications - Canada.ca (2020) (2020) [+]
- Global Health Security: COVID-19 and Its Impacts – Pandemic and Beyond: Phishing in a Larger Pond (2020) (2020) [+]
- A Safe Wireless Future: Securing our Networks and Supply Chains (2021) (2021) [+]
- SolarWinds and Beyond: Improving the Cybersecurity of Software Supply Chains (2021) (2021) [+]
- TechTank Podcast Episode 12: How to protect yourself from cybersecurity attacks (2021) (2021) [+]
|
L1D227
(1.7) | L3T17 (31%): Federal Information Security Management Act of 2002 (12%), Biometrics (10%), Audit (8%), Identity document (7%)
L3T24 (30%): Access control (10%), Crime prevention (8%), Security technology (7%), Data laws (6%), Authentication (6%)
| - Cyber trust and crime prevention (2004) (2004) [+]
- DRAFT paper on RFID (2006) (2006) [+]
- Privacy Impact Assessment for the (2006) (2006) [+]
- Contact Point (2006) (2006) [+]
- Privacy Impact Assessment for P&O Ports (2006) (2006) [+]
- Privacy Impact Assessment for the (2007) (2007) [+]
- Bomb and Arson Tracking System BATS (2007) (2007) [+]
- Privacy Impact Assessment for the (2007) (2007) [+]
- Personal Identity Verification (PIV) Card System (2007) (2007) [+]
- Privacy Impact Assessment for the Department of Justice Blog - Office of Public Affairs (2009) (2009) [+]
- STATE OF HAWAI ‘I INFORMATION PRIVACY AND SECURITY COUNCIL (2009) (2009) [+]
- Privacy Impact Assessment for the Personal Identity Verification (PIV) Card System (2011) (2011) [+]
- Privacy Impact Assessment (2012) (2012) [+]
- Employee Assistance Program Case Tracking System (EAP Tracking) (2012) (2012) [+]
- Privacy: Federal Law Should Be Updated to Address Changing Technology Landscape (2012) (2012) [+]
- Air Entry / Exit Re-engineering (AEER) Project (2014) (2014) [+]
- DHS/ALL/PIA-046(c) - DHS Data Framework – External Sharing (2016) (2016) [+]
- Summary of Audit Findings Cyber Aware School Audits (2016) (2016) [+]
- Cyber security: protection of personal data online report (2016) (2016) [+]
- PDP Digest 2017 (e-version) (2017) (2017) [+]
- Home Office biometrics (HOB) programme privacy impact assessments (2018) (2018) [+]
- Privacy Impact Assessment (2018) (2018) [+]
- Privacy by Design : Current Practices in Estonia, India, and Austria (2018) (2018) [+]
- Home Office biometrics (HOB) programme privacy impact assessments (2018) (2018) [+]
- Consolato Generale D’italia (2018) (2018) [+]
- INTERAGENCY DATA SHARING AGREEMENT between the STATE OF WASHINGTON Office of the Chief Information Officer and Agencies in the Technology Business Management( TBM) Program (2018) (2018) [+]
- Chiede / Requests (2018) (2018) [+]
- How Facial Recognition Technology Keeps Children Safe (2018) (2018) [+]
- What if blockchain offered a way to reconcile privacy with transparency? (2018) (2018) [+]
- CONSOLATO GENERALE D'ITALIA Hannover Freundallee 27, 30173 Hannover anagrafe. hannover @ esteri. it (2018) (2018) [+]
- Privacy Impact Assessment (2019) (2019) [+]
- Commercial Requester Information Handbook (2019) (2019) [+]
- ACLU v. DOJ- Exhibit D (2019) (2019) [+]
- Neue Anwendungsfelder biometrischer Identifikationsverfahren (2019) (2019) [+]
- February 26 th, 2019 (2019) (2019) [+]
- Indiana Intelligence Fusion Center (2019) (2019) [+]
- Privacy by Design : Current Practices in Estonia, India, and Austria (2019) (2019) [+]
- Exposed Data Highlights Law Enforcement Use of Selected Technologies (2019) (2019) [+]
- Privacy Impact Assessment (2019) (2019) [+]
- Privacy Impact Assessment (2019) (2019) [+]
- Briefing: Data Stewardship Principles (2019) (2019) [+]
- Privacy Impact Assessment (2019) (2019) [+]
- Privacy Impact Assessment (2019) (2019) [+]
- "Protecting Consumer Privacy in the Era of Big Data" (2019) (2019) [+]
- COR0154 - Home Office preparedness for Covid-19 (Coronavirus) (2020) (2020) [+]
- The Data Protection (Civil Registration) Regulations, 2020 (2020) (2020) [+]
- The Facts About Facial Recognition (2020) (2020) [+]
- Identity Crisis: What Digital Driver’s Licenses Could Mean for Privacy, Equity, and Freedom (2021) (2021) [+]
|
L1D228
(1.8) | L3T24 (42%): Cryptography (6%), Encryption (6%), Espionage techniques (5%), Key (cryptography) (5%), Public-key cryptography (4%)
L3T11 (25%): Crime (6%), Government information (6%), Police (6%), Justice (6%), Freedom of speech (5%)
| - H. Rept. 106-117 - SECURITY AND FREEDOM THROUGH ENCRYPTION (SAFE) ACT (1999) (1999) [+]
- Cyber assault : it should keep you up at night / The Honourable Doug Black Q.C., chair ; The Honourable Carolyn Stewart Olsen, deputy chair. (2002) (2002) [+]
- Frequently Asked Questions about Cybersecurity and Privacy (2012) (2012) [+]
- Big Data für Bond 2.0: Sammlung, Auswertung - und der Datenschutz? (2014) (2014) [+]
- House Hearing, 114th Congress — ENCRYPTION TECHNOLOGY AND POTENTIAL U.S. POLICY RESPONSES (2015) (2015) [+]
- Draft Investigatory Powers Bill (2015) (2015) [+]
- ACLU Letter to House Oversight Committee Supporting Opposing Law Enforcement Back Doors to Encryption (2015) (2015) [+]
- A democratic licence to operate (2015) (2015) [+]
- A Democratic Licence to Operate: Report of the Independent Surveillance Review (2015) (2015) [+]
- Investigatory Powers Bill: technology issues (2016) (2016) [+]
- A brief history of U.S. encryption policy (2016) (2016) [+]
- 'Going Dark' in India: The legal and security dimensions of encryption | ORF (2016) (2016) [+]
- Human rights and encryption (2016) (2016) [+]
- How Europe Can Get Encryption Right (2016) (2016) [+]
- The Encryption Debate We Need (2016) (2016) [+]
- The law enforcement challenges of cybercrime : are we really playing catch-up? (2016) (2016) [+]
- Encryption: a matter of human rights (2016) (2016) [+]
- Surveillance versus privacy, with international companies caught in between - AEI (2016) (2016) [+]
- Encryption technology and potential U.S. policy responses : hearing before the Subcommittee on Information Technology of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Fourteenth Congress, first session, April 29, 2015. (2017) (2017) [+]
- DBS privacy impact assessments for Release 1 services (2017) (2017) [+]
- Counterterrorism, counterintelligence, and the challenges of "going dark" : hearing before the Select Committee on Intelligence of the United States Senate, One Hundred Fourteenth Congress, first session, Wednesday, July 8, 2015. (2018) (2018) [+]
- EWI Advocates for Balanced Encryption Policy (2018) (2018) [+]
- EWI Advocates for Balanced Encryption Policy (2018) (2018) [+]
- The Encryption Debate in Brazil (2019) (2019) [+]
- The Encryption Debate in Germany (2019) (2019) [+]
- The Encryption Debate in India (2019) (2019) [+]
- AG Barr Fails to Recognize that Encryption Protects Against Real-World Harms in Re-Packaged Call for Encryption Back Doors (2019) (2019) [+]
- An overview on enhancing technical cooperation between CSIRTS and LE. (2020) (2020) [+]
|
L1D229
(2.1) | L3T24 (80%): Malware (5%), Botnet (4%), Cybercrime (4%), Phishing (4%), Ransomware (3%)
| - Information Security: Emerging Cybersecurity Issues Threaten Federal Information Systems (2005) (2005) [+]
- CYBERSECURITY: PROTECTING AMERICA'S CRITICAL INFRASTRUCTURE, ECONOMY, AND CONSUMERS (2006) (2006) [+]
- Incentivizing Comprehensive Cybersecurity Solutions by Matching Accountability to Capability (2006) (2006) [+]
- Government response to the House of Representatives Parliamentary Committee report on cyber crime (2010) (2010) [+]
- Cyber Security Primer (2011) (2011) [+]
- Cybersecurity: Threats Impacting the Nation (2012) (2012) [+]
- Sten (2012) (2012) [+]
- Microsoft Word - S&T Ctte Virtual volume HC 1537.docx (2012) (2012) [+]
- House Hearing, 112th Congress — CYBERSECURITY: THREATS TO COMMUNICATIONS NETWORKS AND PRIVATE SECTOR RESPONSES (2012) (2012) [+]
- A global study conducted by the Verizon RISK Team with cooperation from : (2013) (2013) [+]
- Data and Security Breaches and Cyber-Security Strategies in the EU and its International Counterparts (2013) (2013) [+]
- Analysis and Detection of Malicious Insiders (2013) (2013) [+]
- House Hearing, 113th Congress — CYBERSECURITY RESEARCH AND DEVELOPMENT: CHALLENGES AND SOLUTIONS (2013) (2013) [+]
- S.Hrg. 113-407 — ONLINE ADVERTISING AND HIDDEN HAZARDS TO CONSUMER SECURITY AND DATA PRIVACY (2014) (2014) [+]
- S.Hrg. 113-407 — ONLINE ADVERTISING AND HIDDEN HAZARDS TO CONSUMER SECURITY AND DATA PRIVACY (2014) (2014) [+]
- Data and security breaches and cyber-security strategies in the EU and its international counterparts. (2014) (2014) [+]
- Black Markets for Hackers Are Increasingly Sophisticated, Specialized, and Maturing (2014) (2014) [+]
- S.Hrg. 113-531 — PROTECTING PERSONAL CONSUMER INFORMATION FROM CYBER ATTACKS AND DATA BREACHES (2014) (2014) [+]
- eID authentication methods in e-Finance and e-Payment services : current practices and recommendations, December 2013. (2014) (2014) [+]
- S.Hrg. 113-891 — TAKING DOWN BOTNETS: PUBLIC AND PRIVATE EFFORTS TO DISRUPT AND DISMANTLE CYBERCRIMINAL NETWORKS (2014) (2014) [+]
- S.Hrg. 113-531 — PROTECTING PERSONAL CONSUMER INFORMATION FROM CYBER ATTACKS AND DATA BREACHES (2014) (2014) [+]
- S.Hrg. 113-891 — TAKING DOWN BOTNETS: PUBLIC AND PRIVATE EFFORTS TO DISRUPT AND DISMANTLE CYBERCRIMINAL NETWORKS (2014) (2014) [+]
- Exploring Cybersecurity Threats and Policy Responses in the EU and Beyond (2015) (2015) [+]
- Global Cyberspace Is Safer than You Think: Real Trends in Cybercrime (2015) (2015) [+]
- Protecting personal consumer information from cyber attacks and data breaches : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, second session, March 26, 2014. (2015) (2015) [+]
- The Deep Web and the Darknet: A Look Inside the Internet's Massive Black Box (2015) (2015) [+]
- ENISA threat landscape 2014 : overview of current and emerging cyber-threats. (2015) (2015) [+]
- Cybersecurity in the European Union and Beyond: Exploring the Threats and Policy Responses (2015) (2015) [+]
- Australian Cyber Security Centre threat report 2016 (2016) (2016) [+]
- ENISA threat landscape 2013 : overview of current and emerging cyber-threats. (2016) (2016) [+]
- Cybersecurity in the European Union and beyond : exploring the threats and policy responses. (2016) (2016) [+]
- Emerging cyber threats to the United States : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, second session, February 25, 2016. (2016) (2016) [+]
- 2016 Data Breach Investigations Report (2016) (2016) [+]
- Internet Organised Crime Threat Assessment : (IOCTA) 2016. (2016) (2016) [+]
- What is Cyber Security ? Status and Challenges: India (2016) (2016) [+]
- The internet Organised Crime Threat Assessment (iOCTA) : 2014. (2016) (2016) [+]
- House Hearing, 114th Congress — EMERGING CYBER THREATS TO THE UNITED STATES (2016) (2016) [+]
- Spam and criminal activity (2016) (2016) [+]
- 2017 Data Breach Investigations Report (2017) (2017) [+]
- ENISA threat landscape report 2016 : 15 top cyber-threats and trends. (2017) (2017) [+]
- Internet Organised Crime Threat Assessment (IOCTA) : 2015. (2017) (2017) [+]
- Security News Digest July 04, 2017 (2017) (2017) [+]
- Promoting security in wireless technology : hearing before the Subcommittee on Communications and Technology of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, first session, June 13, 2017. (2017) (2017) [+]
- Security News Digest August 15, 2017 (2017) (2017) [+]
- Security News Digest February 28, 2017 (2017) (2017) [+]
- Internet Organised Crime Threat Assessment : IOCTA 2017. (2017) (2017) [+]
- Top Ten Scams Quiz (2017) (2017) [+]
- Security News Digest February 07, 2017 (2017) (2017) [+]
- Cyber Security in a Volatile World (2017) (2017) [+]
- Dark Web (2017) (2017) [+]
- Securing Consumers’ Credit Data in the Age of Digital Commerce (2017) (2017) [+]
- House Hearing, 115th Congress — IDENTITY VERIFICATION IN A POST-BREACH WORLD (2017) (2017) [+]
- Security of mobile payments and digital wallets. (2017) (2017) [+]
- "After the Breach: the Monetization and Illicit Use of Stolen Data” (2018) (2018) [+]
- ENISA threat landscape report 2017 : 15 top cyber-threats and trends. (2018) (2018) [+]
- After the breach: the monetization and illicit use of stolen data : hearing before the Subcommittee on Terrorism and Illicit Finance of the Committee on Financial Services, U.S. House of Representatives, One Hundred Fifteenth Congress, second session, March 15, 2018. (2018) (2018) [+]
- Security News Digest (2018) (2018) [+]
- Identity verification in a post-breach world: hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, first session, November 30, 2017. (2018) (2018) [+]
- Cyber threats facing America : an overview of the cybersecurity threat landscape : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Fifteenth Congress, first session, May 10, 2017. (2018) (2018) [+]
- NEWS (2018) (2018) [+]
- United States District Court (2018) (2018) [+]
- COURT for the District ofAlaska (2018) (2018) [+]
- S.Hrg. 115-656 — DATA SECURITY AND BUG BOUNTY PROGRAMS: LESSONS LEARNED FROM THE UBER BREACH AND SECURITY RESEARCHERS (2018) (2018) [+]
- A Close Look at Data Thieves (2018) (2018) [+]
- Application For A Search Warrant (2018) (2018) [+]
- Security News Digest March 20, 2018 (2018) (2018) [+]
- "After the Breach: the Monetization and Illicit Use of Stolen Data” (2018) (2018) [+]
- United States District Court (2018) (2018) [+]
- Security News Digest January 23, 2018 (2018) (2018) [+]
- United States District Court (2018) (2018) [+]
- U Nited States District (2018) (2018) [+]
- ENISA threat landscape report 2018 : 15 top cyber-threats and trends. (2019) (2019) [+]
- Cybersecurity Call: Defining Threats, Applying Solutions - ik.org.pl (2019) (2019) [+]
- Iocta, Internet Organised Crime Threat Assessment : 2018. (2019) (2019) [+]
- September Newsletter (2019) (2019) [+]
- Internet Society global Internet report 2016: the economics of building trust online - preventing data breaches (2019) (2019) [+]
- 2019 Cyber Threatscape Report Executive Summary I Accenture (2019) (2019) [+]
- Data security and bug bounty programs : lessons learned from the Uber breach and security researchers : hearing before the Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fifteenth Congress, second session, February 6, 2018. (2019) (2019) [+]
- Why Facebook Is the Best Hope for Cryptocurrencyâs Future - by Arthur Herman (2019) (2019) [+]
- In The United States Distrjct Court For The Western Distrjct Of Pennsylvania (2019) (2019) [+]
- Privacy Enhancing Technologies (2019) (2019) [+]
- Cybersecurity: le sfide tecnologiche per la filiera produttiva (2019) (2019) [+]
- Malware in spam email: risks and trends in the Australian Spam Intelligence Database (2020) (2020) [+]
- "Consumers Beware: Increased Risks During the COVID-19 Pandemic" (2020) (2020) [+]
- Cresce il rischio cyber: che fare? (2020) (2020) [+]
- ASEAN Cyberthreat Assessment 2021 (2021) (2021) [+]
|
L2D80
(1.6) | L3T26 (55%): Advertising (11%), Communication (10%), Facebook (9%), Internet privacy (9%), Privacy (8%)
| L1D230
(1.7) | L3T24 (41%): Password (7%), Authentication (6%), Information Age (6%), Malware (6%), Phishing (4%)
L3T26 (18%): Social media (8%), Identity theft (7%), Privacy (5%), Personal data (4%)
| - Survey of Internet users regarding cyber security : final report / prepared for Public Safety Canada; supplier: Ekos Research Associates Inc. (2002) (2002) [+]
- Automated facial recognition in the public and private sectors . (2002) (2002) [+]
- Ro 2007 6719 (2007) (2007) [+]
- Anonymous in Context: The Politics and Power behind the Mask (2013) (2013) [+]
- Managing Online Identity (2013) (2013) [+]
- Trend report : information security in Sweden 2012 (2013) (2013) [+]
- Canadian Global Affairs Institute (2014) (2014) [+]
- Living Room Connected Devices: Opportunities, Security Challenges, and Privacy Implications (2014) (2014) [+]
- Achieving Higher-Fidelity Conjunction Analyses Using Cryptography to Improve Information Sharing (2014) (2014) [+]
- Study on t he economic benefits of privacy-enhancing technologies (PETs) : final report. (2014) (2014) [+]
- House Hearing, 114th Congress — DISRUPTER SERIES: WEARABLE DEVICES (2016) (2016) [+]
- Security News Digest September 26, 2017 (2017) (2017) [+]
- Security News Digest October 03, 2017 (2017) (2017) [+]
- Security News Digest January 16, 2018 (2018) (2018) [+]
- Security News Digest January 02, 2018 (2018) (2018) [+]
- A day in the life of Catalina, a forty-year-old cis woman living in Bogota (2018) (2018) [+]
- European cyber security month 2017 : deployment report. (2018) (2018) [+]
- August is“ (2018) (2018) [+]
- Why Cyber Matters in Elections (2019) (2019) [+]
- Monitoring and surveillance technologies shift power dynamics in the workplace (2019) (2019) [+]
- Study on the impact of predictive technologies and AI on the audiovisual sector, including possible specific measures to put into place in order to ensure freedom of expression and cultural diversity (2019) (2019) [+]
- Identity crime and misuse in Australia: results of the 2018 online survey (2020) (2020) [+]
- Protecting the age of innocence (2020) (2020) [+]
- Deepfakes and Synthetic Media in the Financial System: Assessing Threat Scenarios (2020) (2020) [+]
- Malicious Use and Abuse of Artificial Intelligence (2020) (2020) [+]
- Directory of UK Safety Tech Providers (2020) (2020) [+]
- Data Brokers and Security (2021) (2021) [+]
- Regulating consumer smart product cyber security - government response (2021) (2021) [+]
- Banning Facial Recognition Technology: Baltimore’s Bad Idea (2021) (2021) [+]
|
L1D231
(1.7) | L3T26 (29%): Privacy and Electronic Communications Directive 2002 (12%), Data Protection Directive (10%), Information privacy (7%), Data retention (6%)
L3T15 (26%): Directive (European Union) (12%), European Single Market (11%), European Commission (10%), European Union (10%), European Union law (9%)
| - ICT and privacy in Europe - Teknologirådet (2006) (2006) [+]
- Review of the European Data Protection Directive (2009) (2009) [+]
- House Hearing, 111th Congress — DO-NOT-TRACK LEGISLATION: IS NOW THE RIGHT TIME? (2010) (2010) [+]
- Does it Help or Hinder ? - Promotion of Innovation on the Internet and Citizens’ Right to Privacy (2011) (2011) [+]
- House Hearing, 112th Congress — INTERNET PRIVACY: THE VIEWS OF THE FTC, THE FCC, AND NTIA (2011) (2011) [+]
- Ethical aspects of information and communication technologies (2012) (2012) [+]
- Reforming the Data Protection Package (2012) (2012) [+]
- OrtungstechnologieTA 57A/2012 (2012) (2012) [+]
- Ethical aspects of information and communication technologies : proceedings of the round-table debate. (2012) (2012) [+]
- Reforming the data protection package. (2013) (2013) [+]
- 24. Tätigkeitsbericht für die Jahre 2011 und 2012 (2013) (2013) [+]
- Reforming the data protection package. (2013) (2013) [+]
- Study of case law on the circumstances in which IP addresses are considered personal data : final report. (2014) (2014) [+]
- Privacy and trust in the ubiquitous information society : analysis of the impact of convergent and pervasive ICT on privacy and data protection and needs and options for development of the legal framework : final study report. (2014) (2014) [+]
- EU study on the legal analysis of a single market for the information society : new rules for a new age? (2014) (2014) [+]
- Digital footprint in a mobile environment. (2014) (2014) [+]
- Big Data and Smart Devices and their Impact on Privacy (2015) (2015) [+]
- A comparison of privacy and trust policies in the area of ICT : final report. (2015) (2015) [+]
- Big Data and smart devices and their impact on privacy. (2015) (2015) [+]
- Fifteenth report of the Article 29 working party on data protection : covering the year 2011, adopted on 3.12.2013. (2015) (2015) [+]
- Opinion 01 / 2017 on the Proposed Regulation for the ePrivacy Regulation (2002 / 58 / EC) (2017) (2017) [+]
- The protection of privacy and personal data on the Internet and online media (2017) (2017) [+]
- Høyring – EU-kommisjonens forslag til kommunikasjonsvernforordning (2017) (2017) [+]
- An assessment of the Commission's proposal on privacy and electronic communications (2017) (2017) [+]
- An assessment of the Commission's proposal on privacy and electronic communications. (2017) (2017) [+]
- The proposal for an ePrivacy Regulation - a BusinessEurope position paper (2017) (2017) [+]
- COMMISSION STAFF WORKING DOCUMENT Ex-post REFIT evaluation of the ePrivacy Directive 2002/58/EC Accompanying the document Proposal for a Regulation of the European Parliament and the Council on the protection of privacy and confidentiality in relation to (2017) (2017) [+]
- COMMISSION STAFF WORKING DOCUMENT IMPACT ASSESSMENT Accompanying the document Proposal for a Regulation of the European Parliament and of the Council concerning the respect for private life and the protection of personal data in electronic communications (2017) (2017) [+]
- Høyring – EU-kommisjonens forslag til kommunikasjonsvernforordning (2017) (2017) [+]
- Why Stronger Privacy Regulations Do Not Spur Increased Internet Use (2018) (2018) [+]
- COMMISSION STAFF WORKING DOCUMENT IMPACT ASSESSMENT Accompanying the document Proposal for a Regulation of the European Parliament and of the Council on European Production and Preservation Orders for electronic evidence in criminal matters and Proposal for a Directive of the European Parliament and of the Council laying down harmonised rules on the appointment of legal representatives for the purpose of gathering evidence in criminal proceedings (2018) (2018) [+]
- COMMISSION STAFF WORKING DOCUMENT IMPACT ASSESSMENT Accompanying the document Proposal for a Regulation of the European Parliament and of the Council on European Production and Preservation Orders for electronic evidence in criminal matters and Proposal f (2018) (2018) [+]
- COMMISSION STAFF WORKING DOCUMENT IMPACT ASSESSMENT Accompanying the document Proposal for a Regulation of the European Parliament and of the Council on European Production and Preservation Orders for electronic evidence in criminal matters and Proposal for a Directive of the European Parliament and of the Council laying down harmonised rules on the appointment of legal representatives for the purpose of gathering evidence in criminal proceedings (2018) (2018) [+]
- Privacy Considerations in Higher Education Online Learning (2020) (2020) [+]
- Study on the retention of electronic communications non-content data for law enforcement purposes : final report. (2020) (2020) [+]
- Study on the retention of electronic communications non-content data for law enforcement purposes : final report. (2020) (2020) [+]
- Letter to Wyoming’s House Corporations Committee Regarding Protection and Privacy of Online Customer Information (2020) (2020) [+]
|
L1D232
(2.0) | L3T26 (69%): Advertising (5%), Communication (5%), Facebook (5%), Mass media (4%), Online advertising (4%)
| - INFORMATION PRIVACY: INDUSTRY BEST PRACTICES AND TECHNOLOGICAL SOLUTIONS (2001) (2001) [+]
- Online behavioural advertising (OBA) follow up research project . (2002) (2002) [+]
- Tagging (2007) (2007) [+]
- D1gital Territ0ries: Towards the Protection of Public and Private Space in a Digital and Ambient Intelligence Environment (2007) (2007) [+]
- S.Hrg. 110-1179 — PRIVACY IMPLICATIONS OF ONLINE ADVERTISING (2008) (2008) [+]
- Social Media, Libraries, and Web 2.0: How American Libraries are Using New Tools for Public Relations and to Attract New Users (2009) (2009) [+]
- Web 2.0: Where does Europe stand? (2009) (2009) [+]
- Weiter knüpfen am Netz der NetzeTA P13/2009 (2009) (2009) [+]
- Change at hand: Web 2.0 for development (2010) (2010) [+]
- Reputation Management and Social Media (2010) (2010) [+]
- Coalition Letter to the Federal Trade Commission Urging Requesting an Investigation of Facebook Secret Tracking Use (2011) (2011) [+]
- Web 2.0 : where does Europe stand? (2012) (2012) [+]
- OSCE Media Regulation 2.0 in a Web 3.0 World (2013) (2013) [+]
- The Shift to Digital Advertising: Industry Trends and Policy Issues for Congress (2013) (2013) [+]
- S.Hrg. 113-550 — A STATUS UPDATE ON THE DEVELOPMENT OF VOLUNTARY DO-NOT-TRACK STANDARDS (2013) (2013) [+]
- Mission Creep-y: How Google Is Quietly Becoming One of the Nation’s Most Powerful Political Forces While Expanding Its Information-Collection Empire (2014) (2014) [+]
- Mission Creep-y: How Google Is Quietly Becoming One of the Nation’s Most Powerful Political Forces While Expanding Its Information-Collection Empire (2014) (2014) [+]
- Social Media and Big Data (2014) (2014) [+]
- News Curation vs. Aggregation: Emergence of Editor’s Choices Features (2014) (2014) [+]
- Gerichte advertenties, concurrentie tussen websites en privacy (2014) (2014) [+]
- Kinder & Jugend (2016) (2016) [+]
- The Impact of Digital Content: Opportunities and Risks of Creating and Sharing Information Online (2016) (2016) [+]
- Dealer Talk (2016) (2016) [+]
- Child Safety Online: Age Verification for Pornography (2016) (2016) [+]
- New Trends in Social Media (2016) (2016) [+]
- Russia Investigative Task Force Hearing with Social Media Companies (Open) (2017) (2017) [+]
- Connected Cars: What Happens To Our Data On Rental Cars? (2017) (2017) [+]
- Nitin Agarwal, et.al. Examining the use of botnets and their evolution in propaganda dissemination. (2017) (2017) [+]
- Ett reklamlandskap i förändring - konsumentskydd och tillsyn i en digitaliserad värld Statens offentliga utredningar 2018:1 (2017) (2017) [+]
- Digital Hydra: Security Implications of False Information Online (2017) (2017) [+]
- Using “public interest algorithms” to tackle the problems created by social media algorithms (2017) (2017) [+]
- Microsoft Word - DamienCollins_24Nov2017.docx (2017) (2017) [+]
- Microsoft Word - Written Representation 138.docx (2018) (2018) [+]
- Digitalisering van het nieuws (2018) (2018) [+]
- Damian Collins Chair, Digital, Culture, Media and Sport Committee House of Commons London SWlAOAA (2018) (2018) [+]
- Explainer: What You Should Know About Facebook CEO Mark Zuckerberg’s Senate Hearings (2018) (2018) [+]
- Technology as Enabler of Fake News and a Potential Tool to Combat It (2018) (2018) [+]
- The West is ill-prepared for the wave of “deep fakes” that artificial intelligence could unleash (2018) (2018) [+]
- Filtering Practices of Social Media Platforms (2018) (2018) [+]
- Facebook: Transparency and Use of Consumer Data (2018) (2018) [+]
- Executive Summary – doteveryone (2018) (2018) [+]
- Behavioural study on advertising and marketing practices in online social media : annex 1.1.3 provider fiches desktop. (2018) (2018) [+]
- Behavioural study on advertising and marketing practices in online social media : annex 1.1.2 OSM providers selection for desk research. (2018) (2018) [+]
- Online dispute resolution : web-scraping of EU traders' websites : final report. (2018) (2018) [+]
- House Hearing, 115th Congress — UNDERSTANDING THE DIGITAL ADVERTISING ECOSYSTEM (2018) (2018) [+]
- S.Hrg. 115-683 — FACEBOOK, SOCIAL MEDIA PRIVACY, AND THE USE AND ABUSE OF DATA (2018) (2018) [+]
- Nitin Agarwal, Kiran Kumar Bandeli. Examining Strategic Integration of Social Media Platforms in Disinformation Campaign Coordination. (2018) (2018) [+]
- Why Data Privacy Is a Controversy That Shouldn’t Exist (2018) (2018) [+]
- 180521 Chair to Rebecca Stimson Facebook (2018) (2018) [+]
- Digital platforms inquiry: issues paper (2018) (2018) [+]
- Digital deceit: the technologies behind precision propaganda on the internet (2018) (2018) [+]
- Behavioural study on advertising and marketing practices in online social media : annex 1.1.1 country fiches. (2018) (2018) [+]
- Blocking the data stalkers (2018) (2018) [+]
- Data craft: the manipulation of social media metadata (2018) (2018) [+]
- Facebook, social media privacy, and the use and abuse of data : joint hearing before the Committee on Commerce, Science, and Transportation and the Committee on the Judiciary, United States Senate, One Hundred Fifteenth Congress, second session, April 10, 2018. (2019) (2019) [+]
- Disinformation and ‘fake news’: final report (2019) (2019) [+]
- The Cairncross Review: a sustainable future for journalism (2019) (2019) [+]
- Mark Zuckerberg’s call for internet rules only goes part way (2019) (2019) [+]
- National Data Strategy Call For Evidence (2019) (2019) [+]
- Protection before profit (2019) (2019) [+]
- Audiovisual Media Services (2019) (2019) [+]
- Understanding the digital advertising ecosystem : hearing before the Subcommittee on Digital Commerce and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, second session, June 14, 2018. (2019) (2019) [+]
- Oversight of Bankruptcy Law and Legislative Proposals (2019) (2019) [+]
- Online Platforms and Market Power, Part 1: The Free and Diverse Press (2019) (2019) [+]
- Mapping the Jihadist Information Ecosystem: Towards the Next Generation of Disruption Capability (2019) (2019) [+]
- Disinformation and ‘fake news’ (2019) (2019) [+]
- Data Voids (2019) (2019) [+]
- Data voids: where missing data can easily be exploited (2019) (2019) [+]
- Online Platforms and Market Power, Part 2: Innovation and Entrepreneurship (2019) (2019) [+]
- Online Platforms and Market Power, Part 2: Innovation and Entrepreneurship (2019) (2019) [+]
- Online Platforms and Market Power, Part 2: Innovation and Entrepreneurship (2019) (2019) [+]
- Landscape summaries commissioned by the Centre for Data Ethics and Innovation (2019) (2019) [+]
- The Hidden Costs of Free Social Media (2019) (2019) [+]
- FOJ0108 - The future of journalism (2020) (2020) [+]
- ZDA0085 - Democracy and Digital Technologies (2020) (2020) [+]
- 23 June 2020 (2020) (2020) [+]
- Google Is Not a Monopoly (2020) (2020) [+]
- Raport "To Track or Not to Track? Towards Privacy-Friendly and Sustainable Online Advertising" (2020) (2020) [+]
- Online Platforms and Market Power, Part 6: Examining the Dominance of Amazon, Apple, Facebook, and Google (2020) (2020) [+]
- FOJ0103 - The future of journalism (2020) (2020) [+]
- The 101 of Disinformation Detection - ISD (2020) (2020) [+]
- Comments to the Australian Competition and Consumer Commission Regarding Its Draft Mandatory Bargaining Code for News Media and Digital Platforms (2020) (2020) [+]
- Pivot online : a toolkit for artists and nonprofit organizations (2020) (2020) [+]
- Special Delivery (2020) (2020) [+]
- FOJ0003 - The future of journalism (2020) (2020) [+]
- Response to the Chair from Tom Morrison-Bell, Government Affairs and Public Policy Manager, Google, 3 July 2020 (2020) (2020) [+]
- FOJ0097 - The future of journalism (2020) (2020) [+]
- FOJ0112 - The future of journalism (2020) (2020) [+]
- Digitale dreigingen voor de democratie (2020) (2020) [+]
- FOJ0114 - The future of journalism (2020) (2020) [+]
- Letter from Derek Slater, Google, and Leslie Miller, YouTube, re evidence follow-up, 19 June 2020 (2020) (2020) [+]
- Technology as enabler of fake news and a potential tool to combat it. (2020) (2020) [+]
- How Internet Platforms Are Combating Disinformation and Misinformation in the Age of COVID-19 (2020) (2020) [+]
- Revised response to the Chair from Tom Morrison-Bell, Government Affairs and Public Policy Manager, Google, 8 July 2020 (2020) (2020) [+]
- CMA-ICO joint statement on competition and data protection law (2021) (2021) [+]
- Social Media Monitoring: A Primer (2021) (2021) [+]
- Online advertising, the impact of targeted advertising on advertisers, market access and consumer choice. (2021) (2021) [+]
- Reviving Competition, Part 2: Saving the Free and Diverse Press (2021) (2021) [+]
- “Disinformation Nation: Social Media's Role in Promoting Extremism and Misinformation” (2021) (2021) [+]
- Consultation on proposed commitments in respect of Google’s ‘Privacy Sandbox’ browser changes (2021) (2021) [+]
- Online advertising: the impact of targeted advertising on advertisers, market access and consumer choice (2021) (2021) [+]
- Guidelines for API Access to Social Media (2021) (2021) [+]
- Regulating targeted and behavioural advertising in digital services. How to ensure users’ informed consent. (2021) (2021) [+]
|
L1D233
(2.1) | L3T2 (60%): Android (operating system) (6%), Mobile app (6%), Smartphone (5%), Apple Inc. (5%), IOS (5%)
| - Digital platform services inquiry: interim report no. 2 – app marketplaces (1970) (1970) [+]
- Prospects of Mobile Search (2009) (2009) [+]
- Ethics of information and communication technologies. (2012) (2012) [+]
- Aktuelle Fragen der Geodaten-Nutzung auf mobilen Geräten – Endbericht. Bericht-Nr. ITA-PB A63; Institut für Technikfolgen-Abschätzung (ITA): Wien; im Auftrag von: Österreichische Bundesarbeitskammer. (2012) (2012) [+]
- Prospects of mobile search. (2012) (2012) [+]
- Étude mondiale sur le respect de la vie privée sur l'Internet et la liberté d'expression (2013) (2013) [+]
- Tagungsband Bamberger Verbraucherrechtstage 2013 – Mobile Commerce (2014) (2014) [+]
- A Design Space for Effective Privacy Notices (2015) (2015) [+]
- Durchleuchtet, analysiert und einsortiert (2015) (2015) [+]
- Economic study on consumer digital content products : final report. (2016) (2016) [+]
- Study on future trends and business models in communication services : final report. (2016) (2016) [+]
- Player Beware: Pokemon Go Can Place Your Personal Data at Risk (2016) (2016) [+]
- GOVERNOR ’S COUNCIL ON BLINDNESS AND VISUAL IMPAIRMENT( GCBVI) Assistive Technology( AT) Committee Meeting Minutes April 19, 2017 (2017) (2017) [+]
- COMMISSION STAFF WORKING DOCUMENT IMPACT ASSESSMENT Accompanying the document Proposal for a Regulation of the European Parliament and of the Council concerning the respect for private life and the protection of personal data in electronic communications (2017) (2017) [+]
- Høyring – EU-kommisjonens forslag til kommunikasjonsvernforordning (2017) (2017) [+]
- Śledzenie i profilowanie w sieci. W czym problem? Co się zmieni w prawie? Jak może wyglądać przyszłość? (2017) (2017) [+]
- January 2018 (2018) (2018) [+]
- Access to data, consent and the impact of the Proposal for an ePrivacy Regulation (2018) (2018) [+]
- Janvier 2018 (2018) (2018) [+]
- Users of wearable sensors [What Europe does for you] (2018) (2018) [+]
- EVital : (2018) (2018) [+]
- Accès aux données, consentement, l'impact du projet de règlement e-privacy (2018) (2018) [+]
- 平成 30 年度 (2019) (2019) [+]
- Industria y Comercio / Unidad de Prácticas Comerciales Internacionales / EstadÃsticas de la UPCI (2019) (2019) [+]
- Digitale Assistenten – Endbericht. Institut für Technikfolgen-Abschätzung (ITA): Wien; im Auftrag von: Österreichische Bundesarbeitskammer. (2019) (2019) [+]
- Lego Educational Robotics And Computer Literacy Technical Training And Ref Robotics Cup For School Year 2019 (2019) (2019) [+]
- Cloud Based CPE Migration | Digital Video Services (2019) (2019) [+]
- 2019 Tech Trends and the 50+ (2019) (2019) [+]
- CDEI publishes its first series of three snapshot papers on ethical issues in AI (2019) (2019) [+]
- "Protecting Consumer Privacy in the Era of Big Data" (2019) (2019) [+]
- Online Platforms and Market Power, Part 2: Innovation and Entrepreneurship (2019) (2019) [+]
- 2019 Tech Trends and the 50+ (2019) (2019) [+]
- Improving Customer Service in Health and Human Services Through Technology (2019) (2019) [+]
- EDPS TechDispatch : smart speakers and virtual assistant. Issue 1 - July 2019. (2019) (2019) [+]
- Competition on the Edge of the Internet (2020) (2020) [+]
- House Hearing, 116th Congress — ONLINE PLATFORMS AND MARKET POWER, PART 6: EXAMINING THE DOMINANCE OF AMAZON, APPLE, FACEBOOK, AND GOOGLE (2020) (2020) [+]
- Livre blanc - Assistants vocaux (2020) (2020) [+]
- The Google Antitrust Lawsuit: Initial Observations (2020) (2020) [+]
- Google and Competition: Concerns Beyond the DOJ’s Lawsuit (2020) (2020) [+]
- TK Voorafgaande raadpleging inzake Google (2021) (2021) [+]
- Dataveiligheid en privacy bij het gebruik van fysiologische wearables in de justitiële context (2021) (2021) [+]
- COMMISSION STAFF WORKING DOCUMENT PRELIMINARY REPORT - SECTOR INQUIRY INTO CONSUMER INTERNET OF THINGS (2021) (2021) [+]
- COMMISSION STAFF WORKING DOCUMENT PRELIMINARY REPORT - SECTOR INQUIRY INTO CONSUMER INTERNET OF THINGS (2021) (2021) [+]
- TK Bijlage Google Workspace DPIA for Dutch DPA v18 Feb 2021 (2021) (2021) [+]
|