Subscribe: Rina Steenkamp
Preview: Rina Steenkamp

Rina Steenkamp

Updates on IT, public governance and related topics, in English and Dutch.

Copyright: Copyright 2013, Rina Steenkamp

June 2015
In the spotlight this month: the General Data Protection Regulation; anti-terrorism and surveillance; big data and profiling; mobile health; freedom of expression.

The Open Internet rules and order
A publication by the FCC.

Against jawboning
An article by Derek E. Bambauer.

Manila principles on intermediary liability
An initiative by a coalition of digital rights organisations.

Americans' privacy strategies post-Snowden
A report by PewResearchCenter.

A precautionary approach to big data privacy
A paper by Arvind Narayanan, Joanna Huey and Edward W. Felten.

European cyber security perspectives 2015
A publication by KPN, NCSC, TNO and National Police.

How polymorphic warnings reduce habituation in the brain - Insights from an fMRI study
A paper by Bonnie Brinton Anderson, C. Brock Kirwan, Jeffrey L. Jenkins, David Eargle, Seth Howard, and Anthony Vance.

Data protection broken badly
A publication by EDRi, Access, Panoptykon Foundation and Privacy International.

Consumer Privacy Bill of Rights Act
An Administration Discussion Draft published at

Surreptitiously weakening cryptographic systems
A paper by Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno and Thomas Ristenpart.

Geotagging one hundred million Twitter accounts with total variation minimization
A paper by Ryan Compton, David Jurgens and David Allen.

Privacy and cyber security - Emphasizing privacy protection in cyber security activities
A report by the Office of the Privacy Commissioner of Canada.

Virtual currency schemes - a further analysis
A publication by the European Central Bank.

PowerSpy - Location tracking using mobile device power analysis
An article by Yan Michalevsky, Dan Boneh, Aaron Schulman and Gabi Nakibly.

Schrodinger's cybersecurity
An article by Derek E. Bambauer.

From social media service to advertising network - A critical analysis of Facebook's revised policies and terms
A report by Brendan van Alsenoy, Valerie Verdoodt, Rob Heyman, Jef Ausloos and Ellen Wauters (iMinds-SMIT).

Cookie sweep combined analysis - Report
A report by the Article 29 Data Protection Working Party (WP29).

Threat landscape and good pracice guide for smart home and converged media
A study by David Barnard-Wills, Louis Marinos and Silvia Portesi (ENISA).

Out of balance - Defamation law in the European Union
A report by Scott Griffen, Barbara Trionfi and Steven M. Ellis (IPI).

State of privacy report 2015
A report by Symantec.

Anonymity and encryption
Comments submitted to the United Nations by the EFF.

Big data and differential pricing
A report by the White House - Council of Economic Advisors.

DeepFace - Closing the gap to human-level performance in face verification
A paper by Yaniv Taigman, Ming Yang, Marc'Aurelio Ranzato and Lior Wolf.

The notice paradox - Secret surveillance, criminal defendants and the right to notice
An article by Patrick C. Toomey and Brett Max Kaufman.

Mass surveillance
A report by Pieter Omtzigt (Parliamentary Assembly, Council of Europe).

Global chilling - The impact of mass surveillance on international writers
Results of an international survey of writers by PEN American Center.

Privacy and data protection by design - from policy to engineering
A paper by George Danzis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Metayer, Rodica Tirtea and Stefan Schiffner (ENISA).

Unique in the shopping mall - On the reidentifiability of credit card metadata
A report by Yves-Alexandre de Montjoye, Laura Radaelli, Vivek Kumar Singh and Alex "Sandy" Pentland.

Computer-based personality judgments are more accurate than those made by humans
A paper by Wu Youyou, Michal Kosinski, and David Stillwell.

Exploit this - Evaluating the exploit skills of malware groups
A report by Gabor Szappanos (SophosLabs).

The Turn-Verizon zombie cookie
An article by Jonathan Mayer (Web Policy).