-
2
-
-
0037701063
-
-
Ambient Intelligence”, in P. Denning, McGraw-Hill, New York
-
Aarts, E., R. Harwig and M. Schuurmans, “Ambient Intelligence”, in P. Denning, The Invisible Future: The Seamless Integration of Technology in Everyday Life, McGraw-Hill, New York, 2002.
-
(2002)
The Invisible Future: The Seamless Integration of Technology in Everyday Life
-
-
Aarts, E.1
Harwig, R.2
Schuurmans, M.3
-
3
-
-
0742293904
-
-
Aarts, E., and S. Marzano (eds.), Uitgeverij 010 Publishers, Rotterdam
-
Aarts, E., and S. Marzano (eds.), The New Everyday: Views on Ambient Intelligence, Uitgeverij 010 Publishers, Rotterdam, 2003.
-
(2003)
The New Everyday: Views on Ambient Intelligence
-
-
-
4
-
-
33745837482
-
Usage and Development Scenarios for the Tangible Toolbox
-
Swedish Institute of Computer Science, Kista
-
Åkesson, K.-P., J. Humble, A. Crabtree and A. Bullock, Usage and Development Scenarios for the Tangible Toolbox, ACCORD Deliverable D1.3, Swedish Institute of Computer Science, Kista, 2001.
-
(2001)
ACCORD Deliverable D1
, vol.3
-
-
Åkesson, K.-P.1
Humble, J.2
Crabtree, A.3
Bullock, A.4
-
5
-
-
85098196137
-
-
Tekes, Helsinki
-
Alahuhta, P., M. Jurvansuu and H. Pentikäinen, “Roadmap for network technologies and service”, Tekes Technology Review 162/2004, Tekes, Helsinki, 2004.
-
(2004)
Roadmap for Network Technologies and Service, Tekes Technology Review 162/2004
-
-
Alahuhta, P.1
Jurvansuu, M.2
Pentikäinen, H.3
-
6
-
-
0038271926
-
Supermarket Cards: The Tip of the Retail Surveillance Iceberg
-
, No., pp
-
Albrecht, K., “Supermarket Cards: The Tip of the Retail Surveillance Iceberg”, Denver University Law Review, No. 79, 2002, pp. 534–539, 558–565.
-
(2002)
Denver University Law Review
, vol.534-539
, Issue.79
, pp. 558-565
-
-
Albrecht, K.1
-
7
-
-
85098145672
-
The applicability of the EU Product Liability Directive to Software”, The Comparative and International
-
, Vol., No
-
Alheit, K., “The applicability of the EU Product Liability Directive to Software”, The Comparative and International Law Journal of South Africa, Vol. 3, No. 2, 2001.
-
(2001)
Law Journal of South Africa
, vol.3
, Issue.2
-
-
Alheit, K.1
-
8
-
-
85098104946
-
-
Andrews, S., Privacy and Human Rights 2002, produced by the Electronic Privacy Information Center (EPIC), Washington, DC, and Privacy International, London, 2002. http://www. privacyinternational.org/survey/phr2002/
-
Andrews, S., Privacy and Human Rights 2002, produced by the Electronic Privacy Information Center (EPIC), Washington, DC, and Privacy International, London, 2002. http://www. privacyinternational.org/survey/phr2002/
-
-
-
-
9
-
-
85098144779
-
-
March
-
ARTEMIS Strategic Research Agenda, First Edition, March 2006. http://www.artemis-office.org/DotNetNuke/PressCorner/tabid/89/Default.aspx
-
(2006)
-
-
-
10
-
-
85098119881
-
-
Article 29 Data Protection Working Party, Recommendation 3/97: anonymity on the Internet (WP 6), adopted on 3 December 1997, available through http://ec.europa.eu/justice:home/fsj/privacy/
-
Article 29 Data Protection Working Party, Recommendation 3/97: anonymity on the Internet (WP 6), adopted on 3 December 1997, available through http://ec.europa.eu/justice:home/fsj/privacy/
-
-
-
-
11
-
-
85098208365
-
-
Article 29 Data Protection Working Party, Opinion on more harmonised information provisions (11987/04/EN – WP 100), adopted on 25 November 2004, available through http://ec.europa. eu/justice:home/fsj/privacy/
-
Article 29 Data Protection Working Party, Opinion on more harmonised information provisions (11987/04/EN – WP 100), adopted on 25 November 2004, available through http://ec.europa. eu/justice:home/fsj/privacy/
-
-
-
-
12
-
-
85098142067
-
-
Article 29 Data Protection Working Party, Working document on the surveillance of electronic communications in the workplace (5401/01/EN/Final – WP 55), adopted 29 May 2002, available through http://ec.europa.eu/justice:home/fsj/privacy/
-
Article 29 Data Protection Working Party, Working document on the surveillance of electronic communications in the workplace (5401/01/EN/Final – WP 55), adopted 29 May 2002, available through http://ec.europa.eu/justice:home/fsj/privacy/
-
-
-
-
13
-
-
85098162510
-
-
Article 29 Data Protection Working Party, Working document on determining the international application of EU data protection law to personal data processing on the Internet by non-EU based web sites (5035/01/EN/Final WP 56), 30 May 2002. http://ec.europa.eu/justice: home/fsj/privacy/docs/wpdocs/2002/wp56_en.pdf
-
Article 29 Data Protection Working Party, Working document on determining the international application of EU data protection law to personal data processing on the Internet by non-EU based web sites (5035/01/EN/Final WP 56), 30 May 2002. http://ec.europa.eu/justice: home/fsj/privacy/docs/wpdocs/2002/wp56_en.pdf
-
-
-
-
14
-
-
85098150244
-
-
Article 29 Data Protection Working Party in Working document on the processing of personal data by means of video surveillance (11750/02/EN – WP 67), adopted 25 November 2002, available through http://ec.europa.eu/justice:home/fsj/privacy/
-
Article 29 Data Protection Working Party in Working document on the processing of personal data by means of video surveillance (11750/02/EN – WP 67), adopted 25 November 2002, available through http://ec.europa.eu/justice:home/fsj/privacy/
-
-
-
-
15
-
-
85098182784
-
-
Article 29 Data Protection Working Party, Working document on biometrics (12168/02/EN – WP 80), adopted on 1 August 2003, available through http://ec.europa.eu/justice:home/fsj/privacy/
-
Article 29 Data Protection Working Party, Working document on biometrics (12168/02/EN – WP 80), adopted on 1 August 2003, available through http://ec.europa.eu/justice:home/fsj/privacy/
-
-
-
-
16
-
-
85098173100
-
-
Article 29 Data Protection Working Party, Working document on data protection issues related to intellectual property rights (WP 104), adopted on 18 January 2005. http://ec.europa.eu/justice: home/fsj/privacy/
-
Article 29 Data Protection Working Party, Working document on data protection issues related to intellectual property rights (WP 104), adopted on 18 January 2005. http://ec.europa.eu/justice: home/fsj/privacy/
-
-
-
-
17
-
-
85098150801
-
-
Article 29 Data Protection Working Party, Working document on data protection issues related to RFID technology (10107/05/EN – WP 105), 19 January 2005. http://ec.europa.eu/justice:home/fsj/privacy/
-
Article 29 Data Protection Working Party, Working document on data protection issues related to RFID technology (10107/05/EN – WP 105), 19 January 2005. http://ec.europa.eu/justice:home/fsj/privacy/
-
-
-
-
18
-
-
85098106321
-
-
Article 29 Working Party, Opinion 4/2005 on the Proposal for a Directive on the retention of Data processed in connection with the Provision of Public Electronic Communications Services and Amending Directive 2002/58/EC. http://ec.europa.eu/justice:home/fsj/privacy/workinggroup/index_en.htm
-
Article 29 Working Party, Opinion 4/2005 on the Proposal for a Directive on the retention of Data processed in connection with the Provision of Public Electronic Communications Services and Amending Directive 2002/58/EC. http://ec.europa.eu/justice:home/fsj/privacy/workinggroup/index_en.htm
-
-
-
-
19
-
-
85098208519
-
-
Article 29 Data Protection Working Party, Opinion 5/2007 on the follow-up agreement between the European Union and the United States of America on the processing and transfer of passenger name record (PNR) data by air carriers to the United States Department of Homeland Security concluded in July 2007 (01646/07/EN-WP138). http://ec.europa.eu/justice:home/fsj/privacy/docs/wp138_en.pdf
-
Article 29 Data Protection Working Party, Opinion 5/2007 on the follow-up agreement between the European Union and the United States of America on the processing and transfer of passenger name record (PNR) data by air carriers to the United States Department of Homeland Security concluded in July 2007 (01646/07/EN-WP138). http://ec.europa.eu/justice:home/fsj/privacy/docs/wp138_en.pdf
-
-
-
-
20
-
-
85098113948
-
-
Enschede
-
Aschmoneit, P., and M. Höbig, Context-Aware Collaborative Environments for Next Generation Business Networks: Scenario Document, COCONET deliverable D 2.2, Telematica Institute, Enschede, 2002. http://www.mosaic-network.org/library/scenarios.html
-
(2002)
Context-Aware Collaborative Environments for Next Generation Business Networks: Scenario Document, COCONET Deliverable D 2.2, Telematica Institute
-
-
Aschmoneit, P.1
Höbig, M.2
-
22
-
-
33745855808
-
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks
-
, pp
-
Becher, A., Z. Benenson and M. Dornseif, “Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks”, Third International Conference on Security in Pervasive Computing, York, UK, April 2006, pp. 104–118.
-
(2006)
Third International Conference on Security in Pervasive Computing, York, UK, April
, pp. 104-118
-
-
Becher, A.1
Benenson, Z.2
Dornseif, M.3
-
23
-
-
70349775380
-
Digital Territory: Bubbles”
-
in P.T. Kidd (ed.), Cheshire Henbury, Macclesfield, UK
-
Beslay, L., and H. Hakala, “Digital Territory: Bubbles”, in P.T. Kidd (ed.), European Visions for the Knowledge Age: A Quest for New Horizons in the Information Society, Cheshire Henbury, Macclesfield, UK, 2007. http://cybersecurity.jrc.es/docs/DigitalTerritoryBubbles.pdf
-
(2007)
European Visions for the Knowledge Age: A Quest for New Horizons in the Information Society
-
-
Beslay, L.1
Hakala, H.2
-
24
-
-
85098123178
-
-
July
-
Beslay, L., and Y. Punie, “The Virtual Residence: Identity, Privacy and Security”, Security and Privacy for the Citizen in the Post-September 11 Digital Age: a Prospective Overview, IPTS Report to the European Parliament Committee on Citizens’ Freedoms and Rights, Justice and Home Affairs (LIBE), July 2003. http://www.jrc.es/pages/iptsreport/vol67/english/IPT3E676.html
-
(2003)
The Virtual Residence: Identity, Privacy and Security”, Security and Privacy for the Citizen in the Post-September 11 Digital Age: A Prospective Overview, IPTS Report to the European Parliament Committee on Citizens’ Freedoms and Rights, Justice and Home Affairs (LIBE)
-
-
Beslay, L.1
Punie, Y.2
-
25
-
-
85098135701
-
-
Seville
-
Bianchi, A., S. Barrios, M. Cabrera et al., Revisiting elnclusion: from Vision to Action, EC Directorate-General Joint Research Centre, Institute for Prospective Technological Studies (IPTS), Seville, 2006.
-
(2006)
Revisiting Elnclusion: From Vision to Action, EC Directorate-General Joint Research Centre, Institute for Prospective Technological Studies (IPTS)
-
-
Bianchi, A.1
Barrios, S.2
Cabrera, M.3
-
28
-
-
10044297649
-
-
Springer, New York
-
Bolle, R.M., J.H. Connell, S. Pankanti, N.K. Ratha and A.W. Senior, Guide to Biometrics, Springer, New York, 2004.
-
(2004)
Guide to Biometrics
-
-
Bolle, R.M.1
Connell, J.H.2
Pankanti, S.3
Ratha, N.K.4
Senior, A.W.5
-
29
-
-
34547698786
-
-
Royal Institute of Technology, Stockholm
-
Börjeson, L., M. Höjer, K.-H. Dreborg, T. Ekvall and G. Finnveden, “Towards a user’s guide to scenarios – a report on scenario types and scenario techniques”, Version 1.1b, Department of Urban Studies,Royal Institute of Technology, Stockholm, 2005. http://www.infra.kth.se/fms/pdf/Scenario RapportVer1_1b.pdf
-
(2005)
Towards a user’s Guide to Scenarios – a Report on Scenario Types and Scenario techniques”, Version 1.1B, Department of Urban Studies
-
-
Börjeson, L.1
Höjer, M.2
Dreborg, K.-H.3
Ekvall, T.4
Finnveden, G.5
-
30
-
-
85098167548
-
-
Brussels, May 2006
-
Borking, J., “RFID Security, Data Protection & Privacy, Health and Safety Issues”, presentation made during European Commission Consultation on RFID, Brussels, 17 May 2006.
-
Data Protection & Privacy, Health and Safety Issues”, Presentation Made during European Commission Consultation on RFID
-
-
Borking, J.1
Security, “.R.F.I.D.2
-
31
-
-
33646907615
-
Freedom and privacy in Ambient Intelligence
-
, Vol., No
-
Brey, P., “Freedom and privacy in Ambient Intelligence”, Ethics and Information Technology, Vol. 7, No. 3, 2005.
-
(2005)
Ethics and Information Technology
, vol.7
, Issue.3
-
-
Brey, P.1
-
32
-
-
84929899694
-
Code, Control, and Choice: Why East is East and West is West
-
, Vol., No. , March, pp
-
Brownsword, R., “Code, Control, and Choice: Why East is East and West is West”, Legal Studies, Vol. 25, No. 1, March 2005, pp. 1–21.
-
(2005)
Legal Studies
, vol.25
, Issue.1
, pp. 1-21
-
-
Brownsword, R.1
-
33
-
-
85098164590
-
Handbuch für die sichere Anwendung der Informationstechnik, Version 1.0
-
Bundesamt für Sicherheit in der Informationstechnik [Federal Office for Information Security], Bonn, März
-
BSI, IT-Sicherheitshandbuch: Handbuch für die sichere Anwendung der Informationstechnik, Version 1.0, BSI 7105, Bundesamt für Sicherheit in der Informationstechnik [Federal Office for Information Security], Bonn, März 1992.
-
(1992)
BSI
, vol.7105
-
-
-
35
-
-
38349058999
-
The role of Ambient Intelligence in the Social Integration of the Elderly
-
in G. Riva, F. Vatalaro et al. (eds.), pp
-
Cabrera Giráldez, M., and C. Rodríguez Casal, “The role of Ambient Intelligence in the Social Integration of the Elderly” in G. Riva, F. Vatalaro et al. (eds.), Ambient Intelligence: The Evolution of Technology, Communication and Cognition Towards the Future of Human-Computer Interaction, IOS Press (Studies in New Technologies and Practices in Communication, 6), Amsterdam, 2005, pp. 265–280.
-
(2005)
Ambient Intelligence: the Evolution of Technology, Communication and Cognition Towards the Future of Human-Computer Interaction, IOS Press (Studies in New Technologies and Practices in Communication, 6), Amsterdam
, pp. 265-280
-
-
Cabrera Giráldez, M.1
Rodríguez Casal, C.2
-
36
-
-
85098140974
-
-
First Annual Research Report, PRIME Deliverable D16.1, 2005
-
Camenisch, J. (ed.), First Annual Research Report, PRIME Deliverable D16.1, 2005. http://www. prime-project.eu.org/public/prime_products/deliverables/rsch/pub_del_D16.1.a_ec_wp16.1_ V1_final.pdf
-
-
-
Camenisch, J.1
-
37
-
-
85098159203
-
-
Carr, S., “Wireless Tagging in Hospitals is ‘Inevitable’: Prepare to be chipped …”, silicon.com, 7 December 2004. http://hardware.silicon.com/storage/0,39024649,39126387,00.htm
-
Carr, S., “Wireless Tagging in Hospitals is ‘Inevitable’: Prepare to be chipped …”, silicon.com, 7 December 2004. http://hardware.silicon.com/storage/0,39024649,39126387,00.htm
-
-
-
-
38
-
-
17444413736
-
Privacy in Pervasive Computing Environments – A Contradiction in Terms?
-
, Vol., Issue , Spring, pp
-
Čas, J., “Privacy in Pervasive Computing Environments – A Contradiction in Terms?”, Technology and Society Magazine, IEEE, Vol. 24, Issue 1, Spring 2005, pp. 24–33.
-
(2005)
Technology and Society Magazine, IEEE
, vol.24
, Issue.1
, pp. 24-33
-
-
Čas, J.1
-
39
-
-
85098225271
-
-
Working Group on RFID: Privacy Best Practices for Deployment of RFID Technology, Interim Draft, 1 May 2006
-
CDT (Centre for democracy and technology) Working Group on RFID: Privacy Best Practices for Deployment of RFID Technology, Interim Draft, 1 May 2006, http://www.cdt.org/privacy/20060501rfid-best-practices.php
-
-
-
-
40
-
-
34248656127
-
-
(eds.), Intersentia, Antwerp/ Oxford
-
Claes, E., A. Duff and S. Gutwirth (eds.), Privacy and the Criminal Law, Intersentia, Antwerp/ Oxford, 2006.
-
(2006)
Privacy and the Criminal Law
-
-
Claes, E.1
Duff, A.2
Gutwirth, S.3
-
41
-
-
0024011426
-
Information Technology and Dataveillance
-
, Vol., No. , May, pp
-
Clarke, R., “Information Technology and Dataveillance”, Communications of the ACM, Vol. 31, No. 5, May 1988, pp. 498–512.
-
(1988)
Communications of the ACM
, vol.31
, Issue.5
, pp. 498-512
-
-
Clarke, R.1
-
42
-
-
2942561885
-
Authentication in Pervasive Computing
-
March, pp
-
Creese, S., M. Goldsmith and I. Zakiuddin, “Authentication in Pervasive Computing”, First International Conference on Security in Pervasive Computing, Boppard, Germany, 12–14 March 2003, pp. 116–129.
-
(2003)
First International Conference on Security in Pervasive Computing, Boppard, Germany
, vol.12-14
, pp. 116-129
-
-
Creese, S.1
Goldsmith, M.2
Zakiuddin, I.3
-
43
-
-
34548478538
-
-
Wolf Legal Publishers, Nijmegen
-
Custers, B., The Power of Knowledge, Ethical, Legal and Technological Aspects of Data Mining and Group Profiling in Epidemiology, Wolf Legal Publishers, Nijmegen, 2004.
-
(2004)
The Power of Knowledge, Ethical, Legal and Technological Aspects of Data Mining and Group Profiling in Epidemiology
-
-
Custers, B.1
-
44
-
-
14044265519
-
Science and Technology Roadmapping from Industry to Public Policy
-
Da Costa, O., M. Boden, Y. Punie and M. Zappacosta, “Science and Technology Roadmapping from Industry to Public Policy”, in The IPTS Report, 73, 2003.
-
(2003)
The IPTS Report
, vol.73
-
-
da Costa, O.1
Boden, M.2
Punie, Y.3
Zappacosta, M.4
-
45
-
-
85098150125
-
Iris Recognition: Anti-spoofing Liveness Testing
-
Paris, August
-
Daugman, J., “Iris Recognition: Anti-spoofing Liveness Testing, Stable Biometric Keys, and Further Research Directions”, BioSecure 1st Residential Workshop, Paris, August 2005.
-
(2005)
Stable Biometric Keys, and Further Research Directions”, Biosecure 1St Residential Workshop
-
-
Daugman, J.1
-
46
-
-
84892338843
-
European Data Protection and E-Commerce: Trust Enhancing?
-
in J.E.J. Prins, P. M.A. Ribbers, H.C.A. Van Tilborg, A.F.L. Veth and J.G.L. Van Der Wees (eds.), Kluwer Law International, The Hague, pp
-
De Hert, P., “European Data Protection and E-Commerce: Trust Enhancing?”, in J.E.J. Prins, P. M.A. Ribbers, H.C.A. Van Tilborg, A.F.L. Veth and J.G.L. Van Der Wees (eds.), Trust in Electronic Commerce, Kluwer Law International, The Hague, 2002, pp. 190–199.
-
(2002)
Trust in Electronic Commerce
, pp. 190-199
-
-
de Hert, P.1
-
47
-
-
85098212122
-
De soevereiniteit van de mensenrechten: Aantasting door de uitlevering en het bewijsrecht” [Sovereignty of human rights: Threats created by the law of extradition and by the law of evidence], Panopticon, Tijdschrift voor strafrecht
-
, Vol., No., pp
-
De Hert, P., “De soevereiniteit van de mensenrechten: aantasting door de uitlevering en het bewijsrecht” [Sovereignty of human rights: threats created by the law of extradition and by the law of evidence], Panopticon, Tijdschrift voor strafrecht, criminologie en forensisch welzijnswerk, Vol. 25, No. 3, 2004, pp. 229–238.
-
(2004)
Criminologie En Forensisch Welzijnswerk
, vol.25
, Issue.3
, pp. 229-238
-
-
de Hert, P.1
-
48
-
-
37049022513
-
-
EC – JRC, Seville, January
-
De Hert, P., Biometrics: Legal Issues and Implications, Background paper for the Institute of Prospective Technological Studies, EC – JRC, Seville, January 2005. http://cybersecurity.jrc. es/docs/LIBE%20Biometrics%20March%2005/LegalImplications_Paul_de_Hert.pdf
-
(2005)
Biometrics: Legal Issues and Implications, Background Paper for the Institute of Prospective Technological Studies
-
-
de Hert, P.1
-
49
-
-
85098119709
-
What are the risks and what guarantees need to be put in place in a view of interoperability of the databases?”, Standard Briefing Note “JHA & Data Protection
-
January
-
De Hert, P., “What are the risks and what guarantees need to be put in place in a view of interoperability of the databases?”, Standard Briefing Note “JHA & Data Protection”, No. 1. January 2006, http://www.vub.ac.be/LSTS/pub/Dehert/006.pdf
-
(2006)
No
, pp. 1
-
-
de Hert, P.1
-
50
-
-
79957984613
-
-
Seville, July, pp
-
De Hert, P., and S. Gutwirth, “Making sense of privacy and data protection. A prospective overview in the light of the future of identity, location based services and the virtual residence” in Security and Privacy for the Citizen in the Post-September 11 Digital Age: A Prospective Overview, Report to the European Parliament Committee on Citizens’ Freedoms and Rights, Justice and Home Affairs (LIBE), Institute for Prospective Technological Studies – Joint Research Centre, Seville, July 2003, pp. 111–162. ftp://ftp.jrc.es/pub/ EURdoc/eur20823en.pdf
-
(2003)
Making Sense of Privacy and Data Protection. A Prospective Overview in the Light of the Future of Identity, Location Based Services and the Virtual residence” in Security and Privacy for the Citizen in the Post-September 11 Digital Age: A Prospective Overview, Report to the European Parliament Committee on Citizens’ Freedoms and Rights, Justice and Home Affairs (LIBE), Institute for Prospective Technological Studies – Joint Research Centre
, pp. 111-162
-
-
de Hert, P.1
Gutwirth, S.2
-
51
-
-
85098166789
-
“Interoperability of police databases: An accountable political choice”, International Review of Law Computers & Technology, Vol
-
, pp
-
De Hert, P., and S. Gutwirth, “Interoperability of police databases: an accountable political choice”, International Review of Law Computers & Technology, Vol. 20/no. 1–2, 2006, pp. 21–35.
-
(2006)
20/No.
, vol.1-2
, pp. 21-35
-
-
de Hert, P.1
Gutwirth, S.2
-
52
-
-
34147170728
-
Privacy, data protection and law enforcement. Opacity of the individual and transparency of power
-
E. Claes, A. Duff and S. Gutwirth (eds.), pp
-
De Hert, P., and S. Gutwirth, “Privacy, data protection and law enforcement. Opacity of the individual and transparency of power” in E. Claes, A. Duff and S. Gutwirth (eds.), Privacy and the Criminal Law, Intersentia, Antwerp/Oxford, 2006, pp. 61–104.
-
(2006)
Privacy and the Criminal Law, Intersentia, Antwerp/Oxford
, pp. 61-104
-
-
de Hert, P.1
Gutwirth, S.2
-
53
-
-
84892230685
-
Camera Surveillance and Workplace Privacy in Belgium”
-
in S. Nouwt, B.R. de Vries and C. Prins (eds.), TMC Asser Press, The Netherlands
-
De Hert, P., and M. Loncke, “Camera Surveillance and Workplace Privacy in Belgium”, in S. Nouwt, B.R. de Vries and C. Prins (eds.), Reasonable Expectations of Privacy? Eleven Country Reports on Camera Surveillance and Workplace Privacy, TMC Asser Press, The Netherlands, 2005.
-
(2005)
Reasonable Expectations of Privacy? Eleven Country Reports on Camera Surveillance and Workplace Privacy
-
-
de Hert, P.1
Loncke, M.2
-
54
-
-
85098205410
-
-
De Hert, P., and F.P. Ölcer, “Het onschadelijk gemaakte Europees privacybegrip. Implicaties voor de Nederlandse strafrechtspleging” [The notion of privacy made innocent. Implications for criminal procedure], Strafblad. Het nieuwe tijdschrift voor strafrecht, Vol. 2, No. 2, 2004, pp. 115–134
-
De Hert, P., and F.P. Ölcer, “Het onschadelijk gemaakte Europees privacybegrip. Implicaties voor de Nederlandse strafrechtspleging” [The notion of privacy made innocent. Implications for criminal procedure], Strafblad. Het nieuwe tijdschrift voor strafrecht, Vol. 2, No. 2, 2004, pp. 115–134.
-
-
-
-
55
-
-
79955931945
-
Information Technology Litigation and Software Failure
-
Law & Technology, Vol
-
Desai, M.S., J. Oghen and T.C. Richards, “Information Technology Litigation and Software Failure”, The Journal of Information, Law & Technology, Vol. 2, 2002. http://www2.warwick. ac.uk/fac/soc/law/elj/jilt/2002_2/desai/
-
(2002)
The Journal of Information
, vol.2
-
-
Desai, M.S.1
Oghen, J.2
Richards, T.C.3
-
56
-
-
18844413057
-
Designing Mediation for Context-Aware Applications
-
, Vol., Issue , March, pp
-
Dey, A., and J. Mankoff, “Designing Mediation for Context-Aware Applications”, ACM Transactions on Computer-Human Interaction, Special issue on Sensing-Based Interactions, Vol. 12, Issue 1, March 2005, pp. 53–80.
-
(2005)
ACM Transactions on Computer-Human Interaction, Special Issue on Sensing-Based Interactions
, vol.12
, Issue.1
, pp. 53-80
-
-
Dey, A.1
Mankoff, J.2
-
57
-
-
85098181708
-
Civil liberties debate leaves much of America cold”, Reuters, published in
-
May 2006
-
Drees, C., “Civil liberties debate leaves much of America cold”, Reuters, published in The Washington Post, 18 May 2006.
-
The Washington Post
-
-
Drees, C.1
-
58
-
-
34548018515
-
A Typology for Scenarios
-
, Vol. , February
-
Ducot, C., and G.J. Lubben, “A Typology for Scenarios”, Futures, Vol. 12, February 1980.
-
(1980)
Futures
, vol.12
-
-
Ducot, C.1
Lubben, G.J.2
-
59
-
-
85098117034
-
Politikbenchmarking Nachfrageorientierte Innovationspolitik
-
Edler, J. (ed.), Office for Technology Assessment at the German Parliament, Berlin
-
Edler, J. (ed.), “Politikbenchmarking Nachfrageorientierte Innovationspolitik”, Progress report No. 99, Office for Technology Assessment at the German Parliament, Berlin, 2006.
-
(2006)
Progress Report
, vol.99
-
-
-
61
-
-
23744439570
-
Universal access to ambient intelligence environments: Opportunities and challenges for people with disabilities
-
, Vol., No., pp
-
Emiliani, P.L., and C. Stephanidis, “Universal access to ambient intelligence environments: opportunities and challenges for people with disabilities”, IBM Systems Journal, Vol. 44, No. 3, 2005, pp. 605–619.
-
(2005)
IBM Systems Journal
, vol.44
, Issue.3
, pp. 605-619
-
-
Emiliani, P.L.1
Stephanidis, C.2
-
62
-
-
85098232691
-
Empowerment and Context Security as the route to Growth and Security”
-
Brussels, March
-
Engberg, S., “Empowerment and Context Security as the route to Growth and Security”, SWAMI Final Conference, Brussels, 21–22 March 2006.
-
(2006)
SWAMI Final Conference
, pp. 21-22
-
-
Engberg, S.1
-
63
-
-
29144443310
-
-
Eriksen, E.O., J.E. Fossum and A.J. Menéndez (eds.), Nomos Verlag, Baden-Baden
-
Eriksen, E.O., J.E. Fossum and A.J. Menéndez (eds.), The Chartering of Europe: The European Charter of Fundamental Rights and its Constitutional Implications, Nomos Verlag, Baden-Baden, 2003.
-
(2003)
The Chartering of Europe: The European Charter of Fundamental Rights and Its Constitutional Implications
-
-
-
64
-
-
85098179002
-
Philips unfurls prototype flexible display
-
Espiner, T., “Philips unfurls prototype flexible display”, ZDNet UK. http://news.zdnet.co.uk/hardware/emergingtech/0,39020357,39216111,00.htm
-
Zdnet UK
-
-
Espiner, T.1
-
65
-
-
85098211999
-
Viruses cause most security breaches
-
February 2006
-
Espiner, T., “Viruses cause most security breaches”, ZDNet UK, 28 February 2006. http://news. zdnet.co.uk/0,39020330,39254929,00.htm
-
Zdnet UK
-
-
Espiner, T.1
-
66
-
-
85098222108
-
-
September
-
Espiner, T., “Philips unfurls prototype flexible display”, ZDNet UK, 2 September 2005. http://news.zdnet.co.uk/hardware/emergingtech/0,39020357,39216111,00.htm
-
(2005)
Philips Unfurls Prototype Flexible Display, Zdnet UK, 2
-
-
Espiner, T.1
-
67
-
-
0003530564
-
-
National Academy Press, Washington, DC
-
Estrin, D. (ed.), Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers, National Academy Press, Washington, DC, 2001.
-
(2001)
Embedded, Everywhere: A Research Agenda for Networked Systems of Embedded Computers
-
-
Estrin, D.1
-
70
-
-
85098185253
-
-
European Commission, Science and Technology, the Key to Europe’s Future – Guidelines for Future European Union Policy to Support Research, COM(2004) 353 final, Brussels, 2004. ftp://ftp.cordis.lu/pub/era/docs/com2004_353_en.pdf
-
European Commission, Science and Technology, the Key to Europe’s Future – Guidelines for Future European Union Policy to Support Research, COM(2004) 353 final, Brussels, 2004. ftp://ftp.cordis.lu/pub/era/docs/com2004_353_en.pdf
-
-
-
-
71
-
-
85098110272
-
-
European Commission, Communication from the Commission to the Council and the European Parliament. The Hague Programme – Ten priorities for the next five years. The Partnership for European renewal in the field of Freedom, Security and Justice, COM(2005) 184 final
-
European Commission, Communication from the Commission to the Council and the European Parliament. The Hague Programme – Ten priorities for the next five years. The Partnership for European renewal in the field of Freedom, Security and Justice, COM(2005) 184 final.
-
-
-
-
74
-
-
85098226162
-
Communication to the Council and the European Parliament on improved effectiveness, enhanced interoperability and synergies among European databases in the area of Justice and Home Affairs, COM (2005) 597 final
-
November
-
European Commission, Communication to the Council and the European Parliament on improved effectiveness, enhanced interoperability and synergies among European databases in the area of Justice and Home Affairs, COM (2005) 597 final, Brussels, 24 November 2005.
-
(2005)
Brussels
, pp. 24
-
-
-
76
-
-
85098231095
-
-
Office for Official Publications of the European Communities, Luxembourg, May
-
European Commission, European Technology Platforms: Moving to Implementation, Second Status Report, Office for Official Publications of the European Communities, Luxembourg, May 2006. ftp://ftp.cordis.europa.eu/pub/technology-platforms/docs/ki7305429ecd.pdf
-
(2006)
European Technology Platforms: Moving to Implementation, Second Status Report
-
-
-
77
-
-
85098122516
-
-
May
-
European Commission, A strategy for a Secure Information Society – “Dialogue, Partnership and Empowerment”, Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions, Brussels, COM(2006) 251, Brussels, 31 May 2006. http://ec.europa.eu/information_society/doc/com2006251.pdf
-
(2006)
A Strategy for a Secure Information Society – “Dialogue, Partnership and Empowerment”, Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions, Brussels, COM(2006) 251, Brussels, 31
-
-
-
78
-
-
85098151284
-
-
European Commission, Impact Assessment: Commission Staff Working Document, Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions on the Review of the EU Regulatory Framework for electronic communications networks and services, SEC(2006) 817, Brussels, 28 June 2006. http://ec.europa.eu/information_society/policy/ecomm/doc/info_centre/public_ consult/review/impactassessment_final.pdf
-
European Commission, Impact Assessment: Commission Staff Working Document, Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions on the Review of the EU Regulatory Framework for electronic communications networks and services, SEC(2006) 817, Brussels, 28 June 2006. http://ec.europa.eu/information_society/policy/ecomm/doc/info_centre/public_ consult/review/impactassessment_final.pdf
-
-
-
-
79
-
-
85098152908
-
-
European Commission, Communication from the Commission to the European Parliament and the Council on Promoting Data Protection by Privacy Enhancing Technologies (PETs), COM (2007) 228 final, Brussels, 2 May 2007
-
European Commission, Communication from the Commission to the European Parliament and the Council on Promoting Data Protection by Privacy Enhancing Technologies (PETs), COM (2007) 228 final, Brussels, 2 May 2007.
-
-
-
-
80
-
-
85098110153
-
-
European Data Protection Supervisor (EDPS), Opinion on the Proposal for a Regulation of the European Parliament and of the Council Concerning the Visa Information System (VIS) and the Exchange of Data between Member States on Short Stay-visas, COM (2004) 835 final, Official Journal C 181/27, 23 July 2005
-
European Data Protection Supervisor (EDPS), Opinion on the Proposal for a Regulation of the European Parliament and of the Council Concerning the Visa Information System (VIS) and the Exchange of Data between Member States on Short Stay-visas, COM (2004) 835 final, Official Journal C 181/27, 23 July 2005.
-
-
-
-
81
-
-
85098158900
-
-
European Data Protection Supervisor (EDPS), Annual Report 2005. http://www.edps.eu.int/publications/annual_report_en.htm
-
European Data Protection Supervisor (EDPS), Annual Report 2005. http://www.edps.eu.int/publications/annual_report_en.htm
-
-
-
-
82
-
-
85098165211
-
-
European Data Protection Supervisor (EDPS), Comments on the Communication of the Commission on Interoperability of European Databases, 10 March 2006. http://www.edps. eu.int/legislation/Comments/06-03-10_Comments_interoperability_EN.pdf
-
European Data Protection Supervisor (EDPS), Comments on the Communication of the Commission on Interoperability of European Databases, 10 March 2006. http://www.edps. eu.int/legislation/Comments/06-03-10_Comments_interoperability_EN.pdf
-
-
-
-
85
-
-
85098139569
-
-
(eds.), July 2006
-
Friedewald, M., R. Lindner and D. Wright (eds.), Threats, Vulnerabilities and Safeguards in Ambient Intelligence, Deliverable D3, A report of the SWAMI consortium to the European Commission, 3 July 2006.
-
Threats, Vulnerabilities and Safeguards in Ambient Intelligence, Deliverable D3, a Report of the SWAMI Consortium to the European Commission
-
-
Friedewald, M.1
Lindner, R.2
Wright, D.3
-
86
-
-
33745850721
-
The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues
-
in J. A. Clark et al. (eds.), Springer, Berlin
-
Friedewald, M., E. Vildjiounaite, Y. Punie and D. Wright, “The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues”, in J. A. Clark et al. (eds.), Security in Pervasive Computing: Proceedings of the Third International Conference, SPC 18–21 April 2006, York, UK, Springer, Berlin, 2006.
-
(2006)
Security in Pervasive Computing: Proceedings of the Third International Conference, SPC 18–21 April 2006, York, UK
-
-
Friedewald, M.1
Vildjiounaite, E.2
Punie, Y.3
Wright, D.4
-
87
-
-
85098146592
-
Report on the Final Conference, Brussels, 21–22
-
March
-
Friedewald, M., and D. Wright (eds.), Report on the Final Conference, Brussels, 21–22 March 2006, SWAMI Deliverable D5, 2006.
-
(2006)
SWAMI Deliverable D5
, pp. 2006
-
-
Friedewald, M.1
Wright, D.2
-
88
-
-
77952304712
-
-
Deliverable D1, A report of the SWAMI consortium to the European Commission under contract 006507, June
-
Friedewald, M., E. Vildjiounaite and D. Wright, The Brave New World of Ambient Intelligence, Deliverable D1, A report of the SWAMI consortium to the European Commission under contract 006507, June 2005.
-
(2005)
The Brave New World of Ambient Intelligence
-
-
Friedewald, M.1
Vildjiounaite, E.2
Wright, D.3
-
90
-
-
85098151059
-
Privacy Made Public: Will National Security Be the End of Individualism?
-
, Vol., No
-
Fujawa, J.M., “Privacy Made Public: Will National Security Be the End of Individualism?” Computers and Society, Vol. 35, No. 2, 2005.
-
(2005)
Computers and Society
, vol.35
, Issue.2
-
-
Fujawa, J.M.1
-
91
-
-
34548221015
-
Detecting Privacy and Ethical Sensitivity in Data Mining Results
-
in V. Estivill-Castro (ed.), pp
-
Fule, P., and J.F. Roddick, “Detecting Privacy and Ethical Sensitivity in Data Mining Results” in V. Estivill-Castro (ed.), Computer Science 2004, Twenty-Seventh Australasian Computer Science Conference (ACSC2004), Dunedin, New Zealand, January 2004, Australian Computer Society (CRPIT, 26), 2004, pp. 159–166.
-
(2004)
Computer Science 2004, Twenty-Seventh Australasian Computer Science Conference (ACSC2004), Dunedin, New Zealand, January 2004, Australian Computer Society (CRPIT, 26)
, pp. 159-166
-
-
Fule, P.1
Roddick, J.F.2
-
92
-
-
85098214148
-
Ambient Intelligence Technologies for Home Automation and Entertainment”
-
Garate, A., I. Lucas, N. Herrasti and A. Lopez, “Ambient Intelligence Technologies for Home Automation and Entertainment”, in EUSAI 2004, Workshop “Ambient Intelligence Technologies for Well-Being at Home”, 2004.
-
(2004)
EUSAI 2004, Workshop “Ambient Intelligence Technologies for Well-Being at Home”
-
-
Garate, A.1
Lucas, I.2
Herrasti, N.3
Lopez, A.4
-
93
-
-
85098205242
-
-
García, R.A., “The General Provisions of the Charter of Fundamental Rights of the European Union”, Jean Monnet Working Paper 4/02. http://www.jeanmonnetprogram.org
-
García, R.A., “The General Provisions of the Charter of Fundamental Rights of the European Union”, Jean Monnet Working Paper 4/02. http://www.jeanmonnetprogram.org
-
-
-
-
94
-
-
0348183205
-
Project Aura: Toward Distraction-Free Pervasive Computing
-
Garlan, D., D. Siewiorek, A. Smailagic and P. Steenkiste, “Project Aura: Toward Distraction-Free Pervasive Computing” in IEEE Pervasive Computing, Vol. 21, No. 2, 2002.
-
(2002)
IEEE Pervasive Computing, Vol. 21, No. 2
-
-
Garlan, D.1
Siewiorek, D.2
Smailagic, A.3
Steenkiste, P.4
-
96
-
-
0347275892
-
A practical guide to Regional Foresight
-
(eds.), EN, IPTS, Seville, December
-
Gavigan, J.P., F. Scapolo, M. Keenan, I. Miles, F. Farhi, D. Lecoq, M. Capriati, T. Di Bartolomeo (eds.), “A practical guide to Regional Foresight”, EUR 20128 EN, IPTS, Seville, December 2001.
-
(2001)
EUR
, vol.20128
-
-
Gavigan, J.P.1
Scapolo, F.2
Keenan, M.3
Miles, I.4
Farhi, F.5
Lecoq, D.6
Capriati, M.7
Di Bartolomeo, T.8
-
97
-
-
33751575545
-
Software Development, Intellectual Property, and IT Security
-
Gehring, R.A., “Software Development, Intellectual Property, and IT Security”, The Journal of Information, Law and Technology, 1/2003. http://elj.warwick.ac.uk/jilt/03-1/gehring.html
-
(2003)
The Journal of Information, Law and Technology
, vol.1
-
-
Gehring, R.A.1
-
99
-
-
84923472399
-
Liability for Defective Products and Services: The Netherlands”
-
, pp
-
Giensen, I., and M.B.M. Loos, “Liability for Defective Products and Services: The Netherlands”, Netherlands Comparative Law Association, 2002, pp. 75–79. http://www.ejcl.org/64/art64-6. html
-
(2002)
Netherlands Comparative Law Association
, pp. 75-79
-
-
Giensen, I.1
Loos, M.B.M.2
-
100
-
-
0009321155
-
The art of scenario and strategic planning: Tools and pitfalls
-
, Vol., pp
-
Godet, M., “The art of scenario and strategic planning: tools and pitfalls”, Technological Forecasting and Social Change, Vol. 65, 2000, pp. 3–22.
-
(2000)
Technological Forecasting and Social Change
, vol.65
, pp. 3-22
-
-
Godet, M.1
-
101
-
-
85098122352
-
Privacy and individual empowerment in the interactive age
-
in Y. Poullet, C. De Terwangne and P. Turner (eds.), Story-Scientia, Diegem
-
Goldman, J., “Privacy and individual empowerment in the interactive age” in Y. Poullet, C. De Terwangne and P. Turner (eds.), Privacy: New Risk and Opportunities, Story-Scientia, Diegem, 1997.
-
(1997)
Privacy: New Risk and Opportunities
-
-
Goldman, J.1
-
102
-
-
0038615886
-
Empirical Research in on-Line Trust: A Review and Critical Assessment
-
, Vol., No., pp
-
Grabner-Kräuter, S., and E.A. Kaluscha, “Empirical Research in on-Line Trust: A Review and Critical Assessment”, International Journal of Human-Computer Studies, Vol. 58, No. 6, 2003, pp. 783–812.
-
(2003)
International Journal of Human-Computer Studies
, vol.58
, Issue.6
, pp. 783-812
-
-
Grabner-Kräuter, S.1
Kaluscha, E.A.2
-
103
-
-
25444432074
-
RFID and the Perception of Control: The Consumer’s View
-
, Vol., No
-
Günther, O., and S. Spiekermann, “RFID and the Perception of Control: The Consumer’s View”, Communications of the ACM, Vol. 48, No. 9, 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.9
-
-
Günther, O.1
Spiekermann, S.2
-
104
-
-
84906460710
-
-
VUBPress, Brussels, pp
-
Gutwirth, S., “De polyfonie van de democratische rechtsstaat” [The polyphony of the democratic constitutional state] in M. Elchardus (ed.), Wantrouwen en onbehagen [Distrust and uneasiness], Balans 14, VUBPress, Brussels, 1998, pp. 137–193.
-
(1998)
De Polyfonie Van De Democratische Rechtsstaat [The Polyphony of the Democratic Constitutional State] in M. Elchardus (Ed.), Wantrouwen En Onbehagen [Distrust and Uneasiness], Balans 14
, pp. 137-193
-
-
Gutwirth, S.1
-
105
-
-
0038086634
-
-
Rowman & Littlefield, Lanham/Boulder/ New York/Oxford, pp
-
Gutwirth, S., Privacy and the Information Age, Rowman & Littlefield, Lanham/Boulder/ New York/Oxford, 2002, pp. 5–20.
-
(2002)
Privacy and the Information Age
, pp. 5-20
-
-
Gutwirth, S.1
-
106
-
-
84892252636
-
Privacy and Data Protection in a Democratic Constitutional State
-
Gutwirth, S., and P. de Hert, “Privacy and Data Protection in a Democratic Constitutional State” in M. Hildebrandt and S. Gutwirth (eds.), Profiling: Implications for Democracy and Rule of Law, FIDIS deliverable 7.4, Brussels, 2005. www.fidis.net
-
(2005)
M. Hildebrandt and S. Gutwirth (Eds.), Profiling: Implications for Democracy and Rule of Law, FIDIS Deliverable 7.4, Brussels
-
-
Gutwirth, S.1
de Hert, P.2
-
107
-
-
67650342504
-
-
Gutwirth, S., and P. De Hert, “Regulating profiling in a democratic constitutional state”, to be published in M. Hildebrandt and S. Gutwirth (eds.), Profiling the European Citizen, Springer, Dordrecht, 2008 (forthcoming)
-
Gutwirth, S., and P. De Hert, “Regulating profiling in a democratic constitutional state”, to be published in M. Hildebrandt and S. Gutwirth (eds.), Profiling the European Citizen, Springer, Dordrecht, 2008 (forthcoming).
-
-
-
-
108
-
-
33645657627
-
Increasingly, Internet’s Data Trail Leads to Court”
-
February 2006
-
Hansell, S., “Increasingly, Internet’s Data Trail Leads to Court”, The New York Times, 4 February 2006.
-
The New York Times
-
-
Hansell, S.1
-
109
-
-
85098217320
-
-
Hansen, M., and H. Krasemann (eds.), Deliverable D 15.1.d, July 2005
-
Hansen, M., and H. Krasemann (eds.), Privacy and Identity Management for Europe – PRIME White Paper, Deliverable D 15.1.d, 18 July 2005. http://www.prime-project.eu.org/public/prime_products/deliverables/
-
Privacy and Identity Management for Europe – PRIME White Paper
-
-
-
111
-
-
8544223437
-
The Distance Selling Directive: Points for Further Revision
-
, Vol., No., pp
-
Henderson, K., and A. Poulter, “The Distance Selling Directive: Points for Further Revision”, International Review for Law Computers & Technology, Vol. 16, No. 3, 2002, pp. 289–300.
-
(2002)
International Review for Law Computers & Technology
, vol.16
, Issue.3
, pp. 289-300
-
-
Henderson, K.1
Poulter, A.2
-
112
-
-
85098177915
-
-
, Vol. , Köln
-
Heusel, W. (ed.), Grundrechtecharta und Verfassungsentwicklung in der EU, Bundesanzeiger (Shriftenreihe der Europäischen Rechtsakademie Trier, Vol. 35), Köln, 2002.
-
(2002)
Grundrechtecharta Und Verfassungsentwicklung in Der EU, Bundesanzeiger (Shriftenreihe Der Europäischen Rechtsakademie Trier
, vol.35
-
-
Heusel, W.1
-
113
-
-
85098204402
-
Profiling and the Identity of European Citizens
-
Hildebrandt, M., “Profiling and the Identity of European Citizens” in M. Hildebrandt and S. Gutwirth (eds.), Profiling: Implications for Democracy and Rule of Law, FIDIS deliverable 7.4, Brussels, 2005. www.fidis.net
-
(2005)
M. Hildebrandt and S. Gutwirth (Eds.), Profiling: Implications for Democracy and Rule of Law, FIDIS Deliverable 7.4, Brussels
-
-
Hildebrandt, M.1
-
115
-
-
85098147427
-
-
Hildebrandt, M., and S. Gutwirth (eds.), September
-
Hildebrandt, M., and S. Gutwirth (eds.), Implications of Profiling on Democracy and the Rule of Law, FIDIS (Future of Identity in the Information Society), Deliverable D7.4, September 2005. http://www.fidis.net
-
(2005)
Implications of Profiling on Democracy and the Rule of Law, FIDIS (Future of Identity in the Information Society), Deliverable D7.4
-
-
-
116
-
-
85098200937
-
The Precautionary Principle in the Information Society, Effects of Pervasive Computing on Health and Environment
-
February
-
Hilty, L., et al., The Precautionary Principle in the Information Society, Effects of Pervasive Computing on Health and Environment, Report of the Centre for Technology Assessment, February 2005.
-
(2005)
Report of the Centre for Technology Assessment
-
-
Hilty, L.1
-
117
-
-
85098119615
-
Smart software linked to CCTV can spot dubious behaviour
-
July 2003
-
Hogan, J., “Smart software linked to CCTV can spot dubious behaviour”, New Scientist.com, 11 July 2003. http://www.newscientist.com/article.ns?id=dn3918
-
New Scientist.Com
-
-
Hogan, J.1
-
118
-
-
85098225699
-
Letter of the European Data Protection Supervisor (EDPS) to Dr W
-
June
-
Hustinx, P., Letter of the European Data Protection Supervisor (EDPS) to Dr W. Schauble, 27 June 2007. http://www.epic.org/privacy/pdf/hustinx-letter.pdf
-
(2007)
Schauble
, pp. 27
-
-
Hustinx, P.1
-
119
-
-
85098121581
-
Alternative Futures for the Islamic Ummah
-
undated
-
Inayatullah, S., “Alternative Futures for the Islamic Ummah”, Metafuture.org (undated). http://www.metafuture.org/Articles/AltFuturesUmmah.htm
-
Metafuture.Org
-
-
Inayatullah, S.1
-
122
-
-
84869135644
-
Information Technology – Security Techniques – Code of Practice for Information Security Management
-
International Organization for Standardization, Geneva
-
ISO/IEC 17799:2005(E), Information Technology – Security Techniques – Code of Practice for Information Security Management, International Organization for Standardization, Geneva, 2005.
-
(2005)
ISO/IEC 17799:2005(E)
-
-
-
124
-
-
85098170254
-
-
Office for Official Publications of the European Communities, Luxembourg
-
IST Advisory Group, Trust, Dependability, Security and Privacy for IST in FP6, Office for Official Publications of the European Communities, Luxembourg, 2002. http://www.cordis.lu/ist/istag-reports.html
-
(2002)
Security and Privacy for IST in FP6
-
-
-
125
-
-
85098121127
-
-
IST Advisory Group, K. Ducatel, M. Bogdanowicz et al., Scenarios for Ambient Intelligence in 2010, EUR 19763 EN, EC-JRC, Institute for Prospective Technological Studies (IPTS), Seville, 2001. http://www.cordis.lu/ist/istag-reports.html
-
IST Advisory Group, K. Ducatel, M. Bogdanowicz et al., Scenarios for Ambient Intelligence in 2010, EUR 19763 EN, EC-JRC, Institute for Prospective Technological Studies (IPTS), Seville, 2001. http://www.cordis.lu/ist/istag-reports.html
-
-
-
-
126
-
-
85098190744
-
Information Technology for European Advancement (ITEA) Office Association
-
2nd edition, Eindhoven
-
ITEA Technology Roadmap for Software-Intensive Systems, 2nd edition, Information Technology for European Advancement (ITEA) Office Association, Eindhoven, 2004. www.itea-office.org
-
(2004)
ITEA Technology Roadmap for Software-Intensive Systems
-
-
-
127
-
-
84943578808
-
Smart Furniture: Improvising Ubiquitous Hot-spot Environment
-
IEEE Press, pp
-
Ito, M., A. Iwaya, M. Saito et al., “Smart Furniture: Improvising Ubiquitous Hot-spot Environment” in Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCSW’03), Providence, RI, 19–22 May 2003, IEEE Press, 2003, pp. 48–53.
-
(2003)
Proceedings of the 23Rd International Conference on Distributed Computing Systems Workshops (ICDCSW’03), Providence, RI, 19–22 May 2003
, pp. 48-53
-
-
Ito, M.1
Iwaya, A.2
Saito, M.3
-
129
-
-
85098122940
-
Your Identity, Open to All
-
May 2005
-
Jardin, X., “Your Identity, Open to All”, Wired News, 6 May 2005. http://www.wired.com/news/privacy/0,1848,67407,00.html
-
Wired News
-
-
Jardin, X.1
-
130
-
-
85098187291
-
Electronic Eye Grows Wider in Britain
-
January 2006
-
Jordan, M., “Electronic Eye Grows Wider in Britain”, The Washington Post, 7 January 2006.
-
The Washington Post
-
-
Jordan, M.1
-
131
-
-
85098186952
-
-
Juels, A., D. Molnar and D. Wagner, “Security and Privacy Issues in E-passports”, ePrint Archive Cryptology Report 2005/095. http://eprint.iacr.org/
-
Juels, A., D. Molnar and D. Wagner, “Security and Privacy Issues in E-passports”, ePrint Archive Cryptology Report 2005/095. http://eprint.iacr.org/
-
-
-
-
132
-
-
84979846399
-
Intermediary Liability
-
, Vol., No., pp
-
Julia-Barcelo, R., and K.J. Koelman, “Intermediary Liability in the E-commerce Directive: So far so Good, But It’s not Enough”, Computer Law and Security Report, Vol. 16, No. 4, 2000, pp. 231–239.
-
(2000)
In the E-Commerce Directive: So Far So Good, but It’s Not Enough”, Computer Law and Security Report
, vol.16
, Issue.4
, pp. 231-239
-
-
Julia-Barcelo, R.1
Koelman, K.J.2
-
133
-
-
85098124799
-
-
Kaasinen, E., K. Rentto, V. Ikonen and P. Välkkynen, MIMOSA Initial Usage Scenarios, MIMOSA Deliverable D1.1, version 1.0, 2004. http://www.mimosa-fp6.com/cgi-bin/WebObjects/MIMOSA.woa/1/wo/g6hDj8CHIFBQDjTQXuNVGM/8.0.5.11.
-
(2004)
MIMOSA Initial Usage Scenarios, MIMOSA Deliverable D1.1, Version 1.0
-
-
Kaasinen, E.1
Rentto, K.2
Ikonen, V.3
Välkkynen, P.4
-
135
-
-
85098223573
-
-
Kato, U., T. Hayashi, N. Umeda et al. (eds.), Flying Carpet: Towards the 4th Generation Mobile Communications Systems, Ver. 2.00, 4th Generation Mobile Communications Committee, 2004. http://www.mitf.org/public_e/archives/index.html
-
Kato, U., T. Hayashi, N. Umeda et al. (eds.), Flying Carpet: Towards the 4th Generation Mobile Communications Systems, Ver. 2.00, 4th Generation Mobile Communications Committee, 2004. http://www.mitf.org/public_e/archives/index.html
-
-
-
-
136
-
-
13244265620
-
-
Kawahara, Y., M. Minami, S. Saruwatari et al., “Challenges and Lessons Learned in Building a Practical Smart Space”, in The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, Boston, MA, 22–26 August 2004, pp. 213–222
-
Kawahara, Y., M. Minami, S. Saruwatari et al., “Challenges and Lessons Learned in Building a Practical Smart Space”, in The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, Boston, MA, 22–26 August 2004, pp. 213–222.
-
-
-
-
137
-
-
85098178939
-
Spyware attacks triple in 2005
-
June 2006
-
Kelly, L., “Spyware attacks triple in 2005”, Computing, 12 June 2006. http://www.vnunet.com/computing/news/2158112/spyware-attacks-triple-2005
-
Computing
-
-
Kelly, L.1
-
138
-
-
0345618751
-
-
Kent, S.T., and L.I. Millett (eds.), National Academies Press, Washington, DC
-
Kent, S.T., and L.I. Millett (eds.), Who Goes There? Authentication Through the Lens of Privacy. National Academies Press, Washington, DC, 2003.
-
(2003)
Who Goes There? Authentication through the Lens of Privacy
-
-
-
139
-
-
0038649499
-
-
Kent, S.T., and L.I. Millett (eds.), National Academy Press, Washington, DC
-
Kent, S.T., and L.I. Millett (eds.), IDs – Not That Easy. Questions About Nationwide Identity Systems, Committee on Authentication Technologies and Their Privacy Implications, National Research Council, National Academy Press, Washington, DC, 2002.
-
(2002)
Ids – Not that Easy. Questions about Nationwide Identity Systems, Committee on Authentication Technologies and Their Privacy Implications, National Research Council
-
-
-
140
-
-
33646107714
-
“RFID Security”, in
-
, Vol., No
-
Knospe, H., and H. Pohl, “RFID Security”, in Information Security Technical Report, Vol. 9, No. 4, 2004, S. 30–41.
-
(2004)
Information Security Technical Report
, vol.9
, Issue.4
, pp. 30-41
-
-
Knospe, H.1
Pohl, H.2
-
141
-
-
85098181670
-
-
Koops, B.J., and M.M. Prinsen, “Glazen woning, transparant lichaam. Een toekomstblik op huisrecht en lichamelijke integriteit” [“Glass house, transparent body. A future view on home law and body integrity”], Nederland Juristenblad, 12 March 2005, pp. 624–630
-
Koops, B.J., and M.M. Prinsen, “Glazen woning, transparant lichaam. Een toekomstblik op huisrecht en lichamelijke integriteit” [“Glass house, transparent body. A future view on home law and body integrity”], Nederland Juristenblad, 12 March 2005, pp. 624–630.
-
-
-
-
142
-
-
50949105593
-
-
The Hague
-
Koorn, R., H. van Gils, J. ter Hart, P. Overbeek, R. Tellegen and J. Borking, “Privacy-Enhancing Technologies. White Paper for Decision-Makers”, Ministry of the Interior and Kingdom Relations, The Hague, 2004. http://www.dutchdpa.nl/downloads_overig/PET_ whitebook.pdf
-
(2004)
Privacy-Enhancing Technologies. White Paper for Decision-Makers”, Ministry of the Interior and Kingdom Relations
-
-
Koorn, R.1
van Gils, H.2
Ter Hart, J.3
Overbeek, P.4
Tellegen, R.5
Borking, J.6
-
143
-
-
85098166418
-
-
October
-
Korhonen, I., P. Aavilainen and A. Särelä, “Application of ubiquitous computing technologies for support of independent living of the elderly in real life settings” in UbiHealth 2003: The 2nd International Workshop on Ubiquitous Computing for Pervasive Healthcare Applications, Seattle, 8 October 2003.
-
(2003)
Application of Ubiquitous Computing Technologies for Support of Independent Living of The Elderly in Real Life Settings in Ubihealth 2003: The 2Nd International Workshop on Ubiquitous Computing for Pervasive Healthcare Applications, Seattle, 8
-
-
Korhonen, I.1
Aavilainen, P.2
Särelä, A.3
-
144
-
-
84959054649
-
Secure Open Systems for Protecting Privacy and Digital Services
-
in T. Sander (ed.), Revised Papers, Springer, Berlin, pp
-
Kravitz, D.W., K.-E. Yeoh and N. So, “Secure Open Systems for Protecting Privacy and Digital Services”, in T. Sander (ed.), Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, Philadelphia, 5 November 2001, Revised Papers, Springer, Berlin, 2002, pp. 106–125.
-
(2002)
Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, Philadelphia, 5 November 2001
, pp. 106-125
-
-
Kravitz, D.W.1
Yeoh, K.-E.2
So, N.3
-
145
-
-
79952059098
-
Hackers Break Into Computer-Security Firm’s Customer Database
-
December 2005
-
Krebs, B., “Hackers Break Into Computer-Security Firm’s Customer Database”, The Washington Post, 19 December 2005.
-
The Washington Post
-
-
Krebs, B.1
-
146
-
-
85098227987
-
Microsoft Releases Windows Malware Stats
-
June
-
Krebs, B., “Microsoft Releases Windows Malware Stats”, The Washington Post, 12 June 2006. http://blog.washingtonpost.com/securityfix/2006/06/microsoft_releases_malware_sta.html
-
(2006)
The Washington Post
, vol.12
-
-
Krebs, B.1
-
147
-
-
85098120769
-
Invasion of the Computer Snatchers
-
February 2006
-
Krebs, B., “Invasion of the Computer Snatchers”, The Washington Post, 19 February 2006.
-
The Washington Post
-
-
Krebs, B.1
-
148
-
-
85098195044
-
Hacked Home PCs Fueling Rapid Growth in Online Fraud
-
September 2005
-
Krebs, B., “Hacked Home PCs Fueling Rapid Growth in Online Fraud”, The Washington Post, 19 September 2005. http://www.washingtonpost.com/wp-dyn/content/article/2005/09/19/AR2005091900026.html
-
The Washington Post
-
-
Krebs, B.1
-
149
-
-
34948830549
-
Consumers Not Told Of Security Breaches, Data Brokers Admit
-
April 2005
-
Krim, J., “Consumers Not Told Of Security Breaches, Data Brokers Admit”, The Washington Post, 14 April 2005.
-
The Washington Post
-
-
Krim, J.1
-
150
-
-
85098138244
-
Data on 3,000 Consumers Stolen With Computer
-
November 2005
-
Krim, J., “Data on 3,000 Consumers Stolen With Computer”, The Washington Post, 9 November 2005.
-
The Washington Post
-
-
Krim, J.1
-
151
-
-
85008049424
-
T-Engine: Japan’s Ubiquitous Computing Architecture Is Ready for Prime Time
-
, Vol., No., pp
-
Krikke, J., “T-Engine: Japan’s Ubiquitous Computing Architecture Is Ready for Prime Time”, in Pervasive Computing, Vol. 4, No. 2, 2005, pp. 4–9.
-
(2005)
In Pervasive Computing
, vol.4
, Issue.2
, pp. 4-9
-
-
Krikke, J.1
-
152
-
-
85098199743
-
-
Preventing Information Exclusion, Demos, London
-
Kruger, D., Access Denied? Preventing Information Exclusion, Demos, London, 1998.
-
(1998)
Access Denied?
-
-
Kruger, D.1
-
153
-
-
85098172788
-
-
Electricité de France, Clamart
-
Lahlou, S., and F. Jegou, “European Disappearing Computer Privacy Design Guidelines V1”, Ambient Agora Deliverable D15.4, Electricité de France, Clamart, 2003. http://www.ambient-agoras.org/downloads/D15[1].4_-_Privacy_Design_Guidelines.pdf
-
(2003)
European Disappearing Computer Privacy Design Guidelines V1”, Ambient Agora Deliverable D15
, vol.4
-
-
Lahlou, S.1
Jegou, F.2
-
154
-
-
14544292118
-
Privacy and Trust Issues with Invisible Computers
-
, Vol., No. , March
-
Lahlou, S., M. Langheinrich and C. Rocker, “Privacy and Trust Issues with Invisible Computers”, Communications of the ACM, Vol. 48, No. 3, March 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.3
-
-
Lahlou, S.1
Langheinrich, M.2
Rocker, C.3
-
155
-
-
84945556728
-
Privacy by Design – Principles of Privacy-Aware Ubiquitous Systems
-
in G.D. Abowd, B. Brumitt and S.A. Shafer (eds.), Springer, Berlin, pp
-
Langheinrich, M., “Privacy by Design – Principles of Privacy-Aware Ubiquitous Systems”, in G.D. Abowd, B. Brumitt and S.A. Shafer (eds.), Proceedings of the Third International Conference on Ubiquitous Computing (Ubicomp 2001), Springer, Berlin, 2001, pp. 273–91.
-
(2001)
Proceedings of the Third International Conference on Ubiquitous Computing (Ubicomp 2001)
, pp. 273-291
-
-
Langheinrich, M.1
-
156
-
-
85098140193
-
The DC-Privacy Troubadour – Assessing Privacy Implications of DC-Projects”, Paper presented at the Designing for Privacy Workshop
-
Santorini, Greece
-
Langheinrich, M., “The DC-Privacy Troubadour – Assessing Privacy Implications of DC-Projects”, Paper presented at the Designing for Privacy Workshop, DC Tales Conference, Santorini, Greece, 2003.
-
(2003)
DC Tales Conference
-
-
Langheinrich, M.1
-
157
-
-
84892343824
-
‘Code’: Privacy’s Death or Saviour?
-
, Vol., No
-
Leenes, R., and B.J. Koops, “‘Code’: Privacy’s Death or Saviour?” International Review of Law, Computers & Technology, Vol. 19, No. 3, 2005.
-
(2005)
International Review of Law, Computers & Technology
, vol.19
, Issue.3
-
-
Leenes, R.1
Koops, B.J.2
-
158
-
-
85098193165
-
“Cybersecurity contests go national”, The Register, 5 June 2006. Http://www.theregister. co.uk/2006/06/05/security_contests/
-
Lemos, R., “Cybersecurity contests go national”, The Register, 5 June 2006. http://www.theregister. co.uk/2006/06/05/security_contests/. This article originally appeared at SecurityFocus. http://www.securityfocus.com/news/11394
-
This Article Originally Appeared at Securityfocus.
-
-
Lemos, R.1
-
159
-
-
77952992831
-
The Law of the Horse: What Cyberlaw Might Teach
-
, Vol., pp
-
Lessig, L., “The Law of the Horse: What Cyberlaw Might Teach”, Harvard Law Review, Vol. 133, 1999, pp. 501–546.
-
(1999)
Harvard Law Review
, vol.133
, pp. 501-546
-
-
Lessig, L.1
-
161
-
-
85098211234
-
-
Lewis, Paul, “Court victory hailed as spam stopper”, The Guardian, 28 December 2005. http://www.guardian.co.uk/uk_news/story/0,,1674316, 00.html
-
Lewis, Paul, “Court victory hailed as spam stopper”, The Guardian, 28 December 2005. http://www.guardian.co.uk/uk_news/story/0,,1674316, 00.html
-
-
-
-
163
-
-
85098228321
-
Report to the European Parliament Committee on Citizens’ Freedoms and Rights, Justice and Home Affairs (LIBE), IPTS Technical Report, Institute for Prospective Technological Studies
-
Seville
-
Maghiros, I. (ed.), Security and Privacy for the Citizen in the Post-September 11 Digital Age: A Prospective Overview, Report to the European Parliament Committee on Citizens’ Freedoms and Rights, Justice and Home Affairs (LIBE), IPTS Technical Report, Institute for Prospective Technological Studies, Seville, 2003. ftp://ftp.jrc.es/pub/EURdoc/eur20823en.pdf
-
(2003)
Security and Privacy for the Citizen in the Post-September 11 Digital Age: A Prospective Overview
-
-
Maghiros, I.1
-
164
-
-
85098121045
-
Biometrics at the Frontiers: Assessing the Impact on Society, Study commissioned by the LIBE committee of the European Parliament
-
Seville
-
Maghiros, I., Y. Punie, S. Delaitre et al., Biometrics at the Frontiers: Assessing the Impact on Society, Study commissioned by the LIBE committee of the European Parliament, EC – DG Joint Research Centre, EUR 21585 EN, Institute for Prospective Technological Studies (IPTS), Seville, 2005. http://www.jrc.es/home/pages/detail.cfm?prs=1235.
-
(2005)
EC – DG Joint Research Centre, EUR 21585 EN, Institute for Prospective Technological Studies (IPTS)
-
-
Maghiros, I.1
Punie, Y.2
Delaitre, S.3
-
165
-
-
85098204407
-
-
Magnus, U., and H.W. Micklitz, Comparative Analysis of National Liability Systems for Remedying Damage Caused by Defective Consumer Services: A study commissioned by the European Commission, Final Report, April 2004. http://europa.eu.int/comm/consumers/cons_safe/serv_ safe/liability/reportabc_en.pdf; http://europa.eu.int/comm/consumers/cons_safe/serv_safe/liability/reportd_en.pdf
-
Magnus, U., and H.W. Micklitz, Comparative Analysis of National Liability Systems for Remedying Damage Caused by Defective Consumer Services: A study commissioned by the European Commission, Final Report, April 2004. http://europa.eu.int/comm/consumers/cons_safe/serv_ safe/liability/reportabc_en.pdf; http://europa.eu.int/comm/consumers/cons_safe/serv_safe/liability/reportd_en.pdf
-
-
-
-
166
-
-
85098159909
-
-
Markoff, J., “Attack of the Zombie Computers Is Growing Threat”, New York Times, 7 January 2007. http://www.nytimes.com/2007/01/07/technology/07net.html?hp&ex=1168232400 &en=60c6afb90ec2af68&ei=5094&partner=homepage
-
Markoff, J., “Attack of the Zombie Computers Is Growing Threat”, New York Times, 7 January 2007. http://www.nytimes.com/2007/01/07/technology/07net.html?hp&ex=1168232400 &en=60c6afb90ec2af68&ei=5094&partner=homepage
-
-
-
-
167
-
-
33745863921
-
A Dependability Roadmap for the Information Society in Europe
-
Masera, M., and R. Bloomfeld, A Dependability Roadmap for the Information Society in Europe, AMSD Delilverable D1.1, 2003. https://rami.jrc.it/roadmaps/amsd
-
(2003)
AMSD Delilverable D1.1
-
-
Masera, M.1
Bloomfeld, R.2
-
168
-
-
0010409328
-
Scenarios as seen from a human and social perspective
-
, Vol., pp
-
Massini, E.H., and J.M. Vasquez, “Scenarios as seen from a human and social perspective”, Technological Forecasting and Social Change, Vol. 65, 2000, pp. 49–66.
-
(2000)
Technological Forecasting and Social Change
, vol.65
, pp. 49-66
-
-
Massini, E.H.1
Vasquez, J.M.2
-
170
-
-
0242406800
-
Applying Wearable Sensors to Avalanche Rescue
-
, Vol., No., pp
-
Michahelles, F., P. Matter, A. Schmidt, B. Schiele, “Applying Wearable Sensors to Avalanche Rescue: First Experiences with a Novel Avalanche Beacon” in Computers and Graphics, Vol. 27, No. 6, 2003, pp. 839–847.
-
(2003)
First Experiences with a Novel Avalanche Beacon” in Computers and Graphics
, vol.27
, Issue.6
, pp. 839-847
-
-
Michahelles, F.1
Matter, P.2
Schmidt, A.3
Schiele, B.4
-
171
-
-
85098191641
-
-
Mietzner, D., and G. Reger, “Scenario Approaches – History, Differences, Advantages, and Disadvantages”, in F. Scapolo and E. Cahill, New Horizons and Challenges for Future-Oriented Technology Analysis: Proceedings of the EU-US Scientific Seminar: New Technology
-
Scenario Approaches – History, Differences, Advantages, and Disadvantages”, in F. Scapolo and E. Cahill, New Horizons and Challenges for Future-Oriented Technology Analysis: Proceedings of the EU-US Scientific Seminar: New Technology
-
-
Mietzner, D.1
Reger, G.2
-
172
-
-
85098172194
-
Foresight, Forecasting and Assessment Methods, 13–14
-
May
-
Foresight, Forecasting and Assessment Methods, 13–14 May 2004, European Commission DG JRC-IPTS, Seville, 2004. http://www.jrc.es/projects/fta/
-
(2004)
European Commission DG JRC-IPTS, Seville
, pp. 2004
-
-
-
173
-
-
85098217030
-
Handbook of Knowledge Society Foresight”, European Foundation for the Improvement of Living and Working Conditions
-
Dublin
-
Miles, I., M. Keenan and J. Kaivo-Oja, “Handbook of Knowledge Society Foresight”, European Foundation for the Improvement of Living and Working Conditions, Dublin, 2003. This handbook is available in electronic format only: http://www.eurofound.eu.int
-
(2003)
This Handbook is Available in Electronic Format Only
-
-
Miles, I.1
Keenan, M.2
Kaivo-Oja, J.3
-
174
-
-
85098167971
-
Record Fine for Data Breach
-
January 2006
-
Mohammed, A., “Record Fine for Data Breach”, The Washington Post, 27 January 2006.
-
The Washington Post
-
-
Mohammed, A.1
-
175
-
-
34147117441
-
Government Increasingly Turning to Data Mining
-
June
-
Mohammed, A., and S. Kehaulani Goo, “Government Increasingly Turning to Data Mining”, The Washington Post, 15 June 2006. http://www.washingtonpost.com/wp-dyn/content/arti-cle/2006/06/14/AR2006061402063.html
-
(2006)
The Washington Post
, Issue.15
-
-
Mohammed, A.1
Kehaulani Goo, S.2
-
176
-
-
77952836196
-
Government Policies and Complex Product Systems: The Case of Defence Standards and Procurement
-
, Vol., No., pp
-
Molas-Gallart, J., “Government Policies and Complex Product Systems: The Case of Defence Standards and Procurement”, International Journal of Aerospace Management, Vol. 1, No. 3, 2001, pp. 268–280.
-
(2001)
International Journal of Aerospace Management
, vol.1
, Issue.3
, pp. 268-280
-
-
Molas-Gallart, J.1
-
177
-
-
14544301547
-
Do Consumers Understand the Role of Privacy Seals in E-Commerce?
-
, Vol., No., pp
-
Moores, T., “Do Consumers Understand the Role of Privacy Seals in E-Commerce?”, Communications of the ACM, Vol. 48, No. 3, 2005, pp. 86–91.
-
(2005)
Communications of the ACM
, vol.48
, Issue.3
, pp. 86-91
-
-
Moores, T.1
-
178
-
-
85098188804
-
-
MPHPT, Information and Communications in Japan: Building a Ubiquitous Network Society that Spreads Throughout the World, White Paper, Ministry of Public Management Home Affairs Posts and Telecommunications of Japan, Economic Research Office, General Policy Division, Tokyo, 2004. http://www.johotsusintokei.soumu.go.jp/whitepaper/eng/WP2004/2004-index. html
-
MPHPT, Information and Communications in Japan: Building a Ubiquitous Network Society that Spreads Throughout the World, White Paper, Ministry of Public Management Home Affairs Posts and Telecommunications of Japan, Economic Research Office, General Policy Division, Tokyo, 2004. http://www.johotsusintokei.soumu.go.jp/whitepaper/eng/WP2004/2004-index. html
-
-
-
-
183
-
-
1842538795
-
Privacy as Contextual Integrity
-
, Vol., No., pp
-
Nissenbaum, H., “Privacy as Contextual Integrity”, in Washington Law Review, Vol. 79, No. 1, 2004, pp. 101–139.
-
(2004)
Washington Law Review
, vol.79
, Issue.1
, pp. 101-139
-
-
Nissenbaum, H.1
-
184
-
-
0004185409
-
-
Cambridge University Press, Cambridge
-
Norris, P., Digital Divide: Civic Engagement, Information Poverty, and the Internet Worldwide, Cambridge University Press, Cambridge, 2001.
-
(2001)
Digital Divide: Civic Engagement, Information Poverty, and the Internet Worldwide
-
-
Norris, P.1
-
185
-
-
85098177226
-
Identity Theft Is Epidemic. Can It Be Stopped?
-
October 2004
-
O’Brien, T.L., “Identity Theft Is Epidemic. Can It Be Stopped?”, The New York Times, 24 October 2004.
-
The New York Times
-
-
O’Brien, T.L.1
-
191
-
-
78649832520
-
-
SecuMedia, Ingelheim
-
Oertel, B., M. Wölk, L.M. Hilty et al., Risiken und Chancen des Einsatzes von RFID-Systemen: Trends und Entwicklungen in Technologien, Anwendungen und Sicherheit, SecuMedia, Ingelheim, 2004.
-
(2004)
Risiken Und Chancen Des Einsatzes Von Rfid-Systemen: Trends Und Entwicklungen in Technologien, Anwendungen Und Sicherheit
-
-
Oertel, B.1
Wölk, M.2
Hilty, L.M.3
-
192
-
-
85098190285
-
-
Online protection: A survey of consumer, industry and regulatory mechanisms and systems, 21 June 2006
-
Ofcom, Online protection: A survey of consumer, industry and regulatory mechanisms and systems, 21 June 2006. http://www.ofcom.org.uk/research/technology/onlineprotection/report.pdf
-
-
-
-
194
-
-
85098183866
-
Privacy – Identity Management, Data Protection Issues in Relation to Networked Organisations Utilizing Identity Management Systems
-
Olsen, T., T. Mahler et al., “Privacy – Identity Management, Data Protection Issues in Relation to Networked Organisations Utilizing Identity Management Systems”, LEGAL IST: Legal Issues for the Advancement of Information Society Technologies, Deliverable D11, 2005. http://193.72.209.176/default.asp?P=369&obj=P1076
-
(2005)
LEGAL IST: Legal Issues for the Advancement of Information Society Technologies, Deliverable
, pp. D11
-
-
Olsen, T.1
Mahler, T.2
-
195
-
-
51249096689
-
-
Technical Report 99–24, Graphics, Visualization, and Usability Center, Georgia Tech
-
Orr, R.J., R. Raymond, J. Berman and F. Seay, “A System for Finding Frequently Lost Objects in the Home”, Technical Report 99–24, Graphics, Visualization, and Usability Center, Georgia Tech, 1999.
-
(1999)
A System for Finding Frequently Lost Objects in the Home
-
-
Orr, R.J.1
Raymond, R.2
Berman, J.3
Seay, F.4
-
196
-
-
33746673153
-
Herecast: An open infrastructure for location-based services using WiFi, Wireless and Mobile Computing, Networking and Communications
-
, pp
-
Paciga, M., and H. Lutfiyya, “Herecast: An open infrastructure for location-based services using WiFi, Wireless and Mobile Computing, Networking and Communications”, WiMob’2005, IEEE International Conference, 2005, pp. 21–28.
-
(2005)
WiMob’2005, IEEE International Conference
, pp. 21-28
-
-
Paciga, M.1
Lutfiyya, H.2
-
197
-
-
84880312225
-
Generic Artefacts Specification and Acceptance Criteria
-
STMicroelectronics s.r.l., Milan
-
Palmas, G., N. Tsapatsoulis, B. Apolloni et al., Generic Artefacts Specification and Acceptance Criteria, Oresteia Deliverable D01, STMicroelectronics s.r.l., Milan, 2001.
-
(2001)
Oresteia Deliverable
, vol.D01
-
-
Palmas, G.1
Tsapatsoulis, N.2
Apolloni, B.3
-
198
-
-
27844514683
-
-
Peers, S., and A. Ward (eds.), Hart Publishing, Oxford
-
Peers, S., and A. Ward (eds.), The European Union Charter of Fundamental Rights, Hart Publishing, Oxford, 2004.
-
(2004)
The European Union Charter of Fundamental Rights
-
-
-
199
-
-
1242310117
-
The Role of System Trust in Business-to-Consumer Transactions
-
, Vol., No., pp
-
Pennington, R., H.D. Wilcox and V. Grover, “The Role of System Trust in Business-to-Consumer Transactions”, Journal of Management Information System, Vol. 20, No. 3, 2004, pp. 197–226.
-
(2004)
Journal of Management Information System
, vol.20
, Issue.3
, pp. 197-226
-
-
Pennington, R.1
Wilcox, H.D.2
Grover, V.3
-
201
-
-
85098136093
-
Anonymity, unobservability, pseudonymity and identity management requirements for an AmI world”
-
Brussels, March
-
Pfitzmann, A., “Anonymity, unobservability, pseudonymity and identity management requirements for an AmI world”, SWAMI Final Conference, Brussels, 21–22 March 2006.
-
(2006)
SWAMI Final Conference
, pp. 21-22
-
-
Pfitzmann, A.1
-
202
-
-
33745883087
-
Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology
-
February
-
Pfitzmann, A., and M. Hansen, Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology, Version v0.27, 20 February 2006. http://dud.inf.tu-dresden.de/Anon_Terminology.shtml
-
(2006)
Version
, vol.27
, Issue.20
, pp. v0
-
-
Pfitzmann, A.1
Hansen, M.2
-
203
-
-
85098174794
-
-
EC-JRC, Seville, September
-
Pfitzmann, A., and M. Kohntopp, “Striking a Balance between Cyber-Crime and Privacy”, IPTS Report 57, EC-JRC, Seville, September 2001. http://www.jrc.es/home/report/english/articles/vol57/welcome.htm
-
(2001)
Striking a Balance between Cyber-Crime and Privacy, IPTS Report 57
-
-
Pfitzmann, A.1
Kohntopp, M.2
-
204
-
-
85098149396
-
Traffic Hackers Hit Red Light
-
August
-
Poulsen, K., “Traffic Hackers Hit Red Light”, Wired News, 12 August 2005. http://www.wired. com/news/technology/0,1282,68507,00.html
-
(2005)
Wired News
, vol.12
-
-
Poulsen, K.1
-
205
-
-
33751023483
-
The Propertization of Personal Data and Identities
-
, Vol. , October
-
Prins, J.E.J., “The Propertization of Personal Data and Identities”, Electronic Journal of Comparative Law, Vol. 8.3, October 2004. http://www.ejcl.org
-
(2004)
Electronic Journal of Comparative Law
, vol.8
, Issue.3
-
-
Prins, J.E.J.1
-
206
-
-
84887364947
-
Fighting Untrustworthy Internet Content: In Search of Regulatory Scenarios
-
, Vol., pp
-
Prins, J.E.J., and M.H.M. Schellekens, “Fighting Untrustworthy Internet Content: In Search of Regulatory Scenarios”, Information Polity, Vol. 10, 2005, pp. 129–139.
-
(2005)
Information Polity
, vol.10
, pp. 129-139
-
-
Prins, J.E.J.1
Schellekens, M.H.M.2
-
207
-
-
33745812442
-
The future of Ambient Intelligence in Europe: The need for more Everyday Life
-
, Vol., pp
-
Punie, Y., “The future of Ambient Intelligence in Europe: The need for more Everyday Life”, Communications and Strategies, Vol. 57, 2005, pp. 141–165.
-
(2005)
Communications and Strategies
, vol.57
, pp. 141-165
-
-
Punie, Y.1
-
208
-
-
85098127253
-
-
Punie, Y., S. Delaitre, I. Maghiros and D. Wright (eds.), A report of the SWAMI consortium to the European Commission, November
-
Punie, Y., S. Delaitre, I. Maghiros and D. Wright (eds.), Dark Scenarios in Ambient Intelligence: Highlighting Risks and Vulnerabilities, SWAMI Deliverable D2, A report of the SWAMI consortium to the European Commission, November 2005.
-
(2005)
Dark Scenarios in Ambient Intelligence: Highlighting Risks and Vulnerabilities, SWAMI Deliverable D2
-
-
-
209
-
-
0034593280
-
Multilateral Security: A Concept and Examples for Balanced Security
-
, pp
-
Rannenberg, K., “Multilateral Security: A Concept and Examples for Balanced Security”, ACM New Security Paradigms Workshop, September 2000, pp. 151–162.
-
(2000)
ACM New Security Paradigms Workshop, September
, pp. 151-162
-
-
Rannenberg, K.1
-
210
-
-
85098159143
-
Liability
-
ComputerLaw, London
-
Reed, Ch., and A. Welterveden, “Liability”, in Ch. Reed and J. Angel (eds.), ComputerLaw, London, 2000.
-
Ch. Reed and J. Angel (Eds.)
, pp. 2000
-
-
Reed, C.1
Welterveden, A.2
-
211
-
-
34547637688
-
Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay’s Reputation System
-
in Michael R. Baye (ed.), JAI Press, Amsterdam, pp
-
Resnick, P., and R. Zeckhauser, “Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay’s Reputation System”, in Michael R. Baye (ed.), The Economics of the Internet and E-Commerce, Vol. 11 of Advances in Applied Microeconomics, JAI Press, Amsterdam, 2002, pp. 127–157.
-
(2002)
The Economics of the Internet and E-Commerce, Vol. 11 of Advances in Applied Microeconomics
, pp. 127-157
-
-
Resnick, P.1
Zeckhauser, R.2
-
212
-
-
0002101577
-
Reputation Systems: Facilitating Trust in Internet Interactions
-
, Vol., No., pp
-
Resnick, P., R. Zeckhauser, E. Friedman and K. Kuwabara, “Reputation Systems: Facilitating Trust in Internet Interactions”, Communications of the ACM, Vol. 43, No. 12, 2000, pp. 45–48. http://www.si.umich.edu/∼presnick/papers/cacm00/reputations.pdf
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, K.4
-
213
-
-
85098179151
-
Suddenly, an Industry Is All Ears”
-
March 2006
-
Richtel, M., “Suddenly, an Industry Is All Ears”, The New York Times, 4 March 2006.
-
The New York Times
-
-
Richtel, M.1
-
214
-
-
19944389712
-
Consumer Perceptions of Privacy, Security and Trust in Ubiquitous Commerce
-
, Vol., No., pp
-
Roussos, G., and T. Moussouri, “Consumer Perceptions of Privacy, Security and Trust in Ubiquitous Commerce”, Personal and Ubiquitous Computing, Vol. 8, No. 6, 2004, pp. 416–429.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 416-429
-
-
Roussos, G.1
Moussouri, T.2
-
215
-
-
21844449186
-
Personal video retrieval and browsing for mobile users” in
-
San José, CA, January
-
Sachinopoulou, A., S. Mäkelä, S. Järvinen et al., “Personal video retrieval and browsing for mobile users” in 17th International Symposium Electronic Imaging Science and Technology, San José, CA, 16–20 January 2005.
-
(2005)
17Th International Symposium Electronic Imaging Science and Technology
, pp. 16-20
-
-
Sachinopoulou, A.1
Mäkelä, S.2
Järvinen, S.3
-
216
-
-
0345792391
-
Privacy As Intellectual Property?
-
, Vol
-
Samuelson, P., “Privacy As Intellectual Property?”, Stanford Law Review, Vol. 52, 2000.
-
(2000)
Stanford Law Review
, vol.52
-
-
Samuelson, P.1
-
217
-
-
33745811316
-
Report on Key Reference Scenarios
-
Foundation for Research and Technology Hellas, Institute of Computer Science, Heraklion
-
Savidis, A., S. Lalis, A. Karypidis et al., Report on Key Reference Scenarios, 2WEAR Deliverable D1, Foundation for Research and Technology Hellas, Institute of Computer Science, Heraklion, 2001.
-
(2001)
2WEAR Deliverable
, vol.D1
-
-
Savidis, A.1
Lalis, S.2
Karypidis, A.3
-
218
-
-
0003714340
-
-
National Academy Press, Washington, DC
-
Schneider, F.B. (ed.), Trust in Cyberspace, National Academy Press, Washington, DC, 1999.
-
(1999)
Trust in Cyberspace
-
-
Schneider, F.B.1
-
219
-
-
84889319684
-
Risks of Relying on Cryptography
-
, No
-
Schneier, B., “Risks of Relying on Cryptography”, Communications of the ACM 42, No. 10, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.10
-
-
Schneier, B.1
-
221
-
-
70849109374
-
Information security: How liable should vendors be?
-
October 2004
-
Schneier, B., “Information security: How liable should vendors be?”, Computerworld, 28 October 2004. http://www.schneier.com/essay-073.html
-
Computerworld
-
-
Schneier, B.1
-
222
-
-
0003487308
-
-
Wiley Computer Publishing, New York
-
Schneier, B., Secrets & Lies, Wiley Computer Publishing, New York, 2000.
-
(2000)
Secrets & Lies
-
-
Schneier, B.1
-
223
-
-
4344715558
-
Customers, Passwords, and Web Sites
-
, Vol., No
-
Schneier, B., “Customers, Passwords, and Web Sites”, in IEEE Security & Privacy Magazine, Vol. 2, No. 5, 2004.
-
(2004)
IEEE Security & Privacy Magazine
, vol.2
, Issue.5
-
-
Schneier, B.1
-
227
-
-
85098103144
-
-
Schreurs, W., M. Hildebrandt, M. Gasson and K. Warwick, Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence, FIDIS Deliverable D7.3, 2005. http://www.fidis.net
-
(2005)
Report on Actual and Possible Profiling Techniques in the Field of Ambient Intelligence, FIDIS Deliverable D7
, vol.3
-
-
Schreurs, W.1
Hildebrandt, M.2
Gasson, M.3
Warwick, K.4
-
228
-
-
77955649104
-
-
Schreurs, W., M. Hildebrandt, E. Kindt and M. Vanfleteren, “Cogitas, ergo sum. The role of data protection law and non-discrimination law in group profiling in the private sector”, to be published in M. Hildebrandt and S. Gutwirth (eds.), Profiling the European Citizen, Springer, Dordrecht, 2008 (forthcoming)
-
Schreurs, W., M. Hildebrandt, E. Kindt and M. Vanfleteren, “Cogitas, ergo sum. The role of data protection law and non-discrimination law in group profiling in the private sector”, to be published in M. Hildebrandt and S. Gutwirth (eds.), Profiling the European Citizen, Springer, Dordrecht, 2008 (forthcoming).
-
-
-
-
229
-
-
85098111974
-
-
President, Symantec Corporation on Worms, Viruses and Securing Our Nation’s Computers, House Government Reform Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, Washington, DC
-
Schwarz, J., Statement of John Schwarz, President, Symantec Corporation on Worms, Viruses and Securing Our Nation’s Computers, House Government Reform Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, Washington, DC, 2003. http://reform.house.gov/UploadedFiles/Schwarz-v5.pdf
-
(2003)
Statement of John Schwarz
-
-
Schwarz, J.1
-
230
-
-
85098145082
-
A Future More Nasty, Because It’s So Near”, Film review of “Code 46
-
August 2004
-
Scott, A.O., “A Future More Nasty, Because It’s So Near”, Film review of “Code 46”, The New York Times, 6 August 2004.
-
The New York Times
-
-
Scott, A.O.1
-
231
-
-
85098161559
-
-
Office of Science and Technology, London
-
Sharpe, B., S. Zaba and M. Ince, “Foresight Cyber Trust and Crime Prevention Project: Technology Forward Look: User Guide”, Office of Science and Technology, London, 2004.
-
(2004)
Foresight Cyber Trust and Crime Prevention Project: Technology Forward Look: User Guide
-
-
Sharpe, B.1
Zaba, S.2
Ince, M.3
-
233
-
-
84900270514
-
-
New York University Press, New York
-
Solove, D.J., The Digital Person, New York University Press, New York, 2004.
-
(2004)
The Digital Person
-
-
Solove, D.J.1
-
234
-
-
85098143768
-
-
October 2004, pp
-
Sommer, D., Architecture Version 0, PRIME Deliverable D14.2.a, 13 October 2004, pp. 35–36, 57–58. http://www.prime-project.eu.org
-
Architecture Version 0, PRIME Deliverable D14.2.A
, pp. 57-58
-
-
Sommer, D.1
-
236
-
-
33644605740
-
Technology Paternalism – Wider Implications of Ubiquitous Computing
-
, Vol., No
-
Spiekermann, S., and F. Pallas, “Technology Paternalism – Wider Implications of Ubiquitous Computing”, Poiesis & Praxis, Vol. 4, No. 1, 2006.
-
(2006)
Poiesis & Praxis
, vol.4
, Issue.1
-
-
Spiekermann, S.1
Pallas, F.2
-
238
-
-
0036999904
-
The Resurrecting Duckling: Security Issues for Ubiquitous Computing”, first Security & Privacy Supplement to
-
April, pp
-
Stajano, F., and R. Anderson, “The Resurrecting Duckling: Security Issues for Ubiquitous Computing”, first Security & Privacy Supplement to IEEE Computer, April 2002, pp. 22–26.
-
(2002)
IEEE Computer
, pp. 22-26
-
-
Stajano, F.1
Anderson, R.2
-
239
-
-
29244440808
-
-
Ambient Intelligence: Impact on Embedded System Design, Kluwer, Dordrecht, The Netherlands
-
Stajano, F., and J. Crowcroft, “The Butt of the Iceberg: Hidden Security Problems of Ubiquitous Systems”, in Basten et al. (eds.), Ambient Intelligence: Impact on Embedded System Design, Kluwer, Dordrecht, The Netherlands, 2003.
-
(2003)
The Butt of the Iceberg: Hidden Security Problems of Ubiquitous Systems, in Basten Et Al. (Eds.)
-
-
Stajano, F.1
Crowcroft, J.2
-
240
-
-
85098172484
-
Data Theft at Nuclear Agency Went Unreported for 9 Months”
-
June 2006
-
Stout, D., “Data Theft at Nuclear Agency Went Unreported for 9 Months”, The New York Times, 10 June 2006.
-
The New York Times
-
-
Stout, D.1
-
241
-
-
14544284183
-
The Disappearing Computer
-
, Vol., No., pp
-
Streitz, N.A., and P. Nixon, “The Disappearing Computer”, Communications of the ACM, Vol. 48, No. 3, 2005, pp. 32–35.
-
(2005)
Communications of the ACM
, vol.48
, Issue.3
, pp. 32-35
-
-
Streitz, N.A.1
Nixon, P.2
-
242
-
-
85098204517
-
-
Sturcke, J., and agencies, “US access to flight data unlawful”, The Guardian, 30 May 2006
-
Sturcke, J., and agencies, “US access to flight data unlawful”, The Guardian, 30 May 2006.
-
-
-
-
245
-
-
55349137921
-
‘Don’t Shoot the Messenger?’ The UK and Online Intermediary Liability
-
, Vol., No., pp
-
Sutter, G., “ ‘Don’t Shoot the Messenger?’ The UK and Online Intermediary Liability”, International Review of Law Computers & Technology, Vol. 17, No. 1, 2003, pp. 73–84.
-
(2003)
International Review of Law Computers & Technology
, vol.17
, Issue.1
, pp. 73-84
-
-
Sutter, G.1
-
247
-
-
85050497412
-
Government Uses Color Laser Printer Technology to Track Documents. Practice embeds hidden, traceable data in every page printed
-
November 2004
-
Tuohey, J., “Government Uses Color Laser Printer Technology to Track Documents. Practice embeds hidden, traceable data in every page printed”, PC World, 22 November 2004. http://www.pcworld.com/news/article/0,aid,118664,00.asp
-
PC World
-
-
Tuohey, J.1
-
249
-
-
85098220936
-
-
Trust in Cyberspace, National Research Council, National Academies Press, Washington, DC
-
[US] Committee on Information Systems Trustworthiness, Trust in Cyberspace, National Research Council, National Academies Press, Washington, DC, 1999.
-
(1999)
-
-
-
250
-
-
85098110942
-
-
[US] Committee on Radio Frequency Identification Technologies, Radio Frequency Identification Technologies: A Workshop Summary, Computer Science and Telecommunications Board, National Research Council, National Academies Press, Washington, DC, 2004. http://books. nap.edu/catalog/11189.html
-
[US] Committee on Radio Frequency Identification Technologies, Radio Frequency Identification Technologies: A Workshop Summary, Computer Science and Telecommunications Board, National Research Council, National Academies Press, Washington, DC, 2004. http://books. nap.edu/catalog/11189.html
-
-
-
-
251
-
-
85098160704
-
-
[US] National Telecommunications and Information Administration (NTIA), Falling through the Net: Towards Digital Inclusion. A Report on Americans’ Access to Technology Tools, US Department of Commerce, Economics and Statistics Administration, National Telecommunications and Information Administration, Washington, DC, 2000. http://search. ntia.doc.gov/pdf/fttn00.pdf
-
[US] National Telecommunications and Information Administration (NTIA), Falling through the Net: Towards Digital Inclusion. A Report on Americans’ Access to Technology Tools, US Department of Commerce, Economics and Statistics Administration, National Telecommunications and Information Administration, Washington, DC, 2000. http://search. ntia.doc.gov/pdf/fttn00.pdf
-
-
-
-
252
-
-
0034559541
-
Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model
-
, Vol., No., pp
-
Venkatesh, V., “Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model”, Information Systems Research, Vol. 11, No. 4, 2000, pp. 342–365.
-
(2000)
Information Systems Research
, vol.11
, Issue.4
, pp. 342-365
-
-
Venkatesh, V.1
-
253
-
-
85098156342
-
ID Theft Continues to Increase. More than 13 million Americans have been victimized, new study reveals
-
July 2003
-
Vijayan, J., “ID Theft Continues to Increase. More than 13 million Americans have been victimized, new study reveals”, Computerworld, 30 July 2003. http://www.pcworld.com/news/article/0,aid,111832,00.asp
-
Computerworld
-
-
Vijayan, J.1
-
254
-
-
1842487417
-
-
Vishwanath, A., “Manifestations of Interpersonal Trust in Online Interaction”, New Media and Society, Vol. 6, No. 2, 2004, pp. 224 f
-
Vishwanath, A., “Manifestations of Interpersonal Trust in Online Interaction”, New Media and Society, Vol. 6, No. 2, 2004, pp. 224 f.
-
-
-
-
255
-
-
85098155718
-
-
, D. Slater and G. Even-Shoshan G [Ashurst], Study on the Conditions of Claims for Damages in Case of Infringement of EC Competition Rules, commissioned by European Commission DG Competition
-
Waelbroeck, D., D. Slater and G. Even-Shoshan G [Ashurst], Study on the Conditions of Claims for Damages in Case of Infringement of EC Competition Rules, commissioned by European Commission DG Competition, 2004. http://ec.europa.eu/comm/competition/antitrust/others/actions_for_damages/study.html
-
(2004)
-
-
Waelbroeck, D.1
-
256
-
-
84988613678
-
-
Computer Science and Telecommunications Board, National Academies Press, Washington, DC
-
Waldo, James, Herbert S. Lin and Lynette I. Millett, Engaging Privacy and Information Technology in a Digital Age, Computer Science and Telecommunications Board, National Academies Press, Washington, DC, 2007.
-
(2007)
Engaging Privacy and Information Technology in a Digital Age
-
-
Waldo, J.1
Lin, H.S.2
Millett, L.I.3
-
257
-
-
35048876270
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
in D. Hutter, G. Müller et al. (eds.), pp
-
Weis, S.A., S.E. Sarma, R.L. Rivest and D.W. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems”, in D. Hutter, G. Müller et al. (eds.), Security in Pervasive Computing, First International Conference, Boppard, Germany, 12–14 March 2003, Springer (Lecture notes in computer science, 2802), Berlin/New York, 2004, pp. 201–212.
-
(2004)
Security in Pervasive Computing, First International Conference, Boppard, Germany, 12–14 March 2003, Springer (Lecture Notes in Computer Science, 2802), Berlin/New York
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
258
-
-
0001853125
-
The Computer for the 21st Century
-
, Vol., No., pp
-
Weiser, M., “The Computer for the 21st Century”, Scientific American, Vol. 265, No. 3, 1991, pp. 94–104.
-
(1991)
Scientific American
, vol.265
, Issue.3
, pp. 94-104
-
-
Weiser, M.1
-
259
-
-
84976653144
-
Some Computer Science Issues in Ubiquitous Computing
-
, Vol., No., pp
-
Weiser, M., “Some Computer Science Issues in Ubiquitous Computing”, Communications of the ACM, Vol. 36, No. 7, 1993, pp. 75–85.
-
(1993)
Communications of the ACM
, vol.36
, Issue.7
, pp. 75-85
-
-
Weiser, M.1
-
260
-
-
0002054321
-
The Coming Age of Calm Technology”
-
in P.J. Denning and R.M. Metcalfe (eds.), Copernicus, New York
-
Weiser, M., and J.S. Brown, “The Coming Age of Calm Technology”, in P.J. Denning and R.M. Metcalfe (eds.), Beyond Calculation: The Next Fifty Years of Computing, Copernicus, New York, 1997.
-
(1997)
Beyond Calculation: The Next Fifty Years of Computing
-
-
Weiser, M.1
Brown, J.S.2
-
261
-
-
85098182290
-
-
University of Strathclyde, Glasgow
-
Welen, P., A. Wilson and P. Nixon, Scenario Analysis, Gloss Deliverable D.9, University of Strathclyde, Glasgow, 2003. http://iihm.imag.fr/projects/Gloss/Deliverables/D9–1.pdf
-
(2003)
Scenario Analysis, Gloss Deliverable D.9
-
-
Welen, P.1
Wilson, A.2
Nixon, P.3
-
262
-
-
85098179776
-
-
Whitehouse, O., GPRS Wireless Security: Not Ready for Prime Time, Research report, Stake, Boston, MA, 2002. http://www.atstake.com/research/reports/acrobat/atstake_gprs_security. pdf
-
Whitehouse, O., GPRS Wireless Security: Not Ready for Prime Time, Research report, Stake, Boston, MA, 2002. http://www.atstake.com/research/reports/acrobat/atstake_gprs_security. pdf
-
-
-
-
263
-
-
85098228906
-
-
Wilkinson, L., “How to Build Scenarios”, Wired 3, Special Issue. http://www.wired.com/wired/scenarios/build.html
-
Wilkinson, L., “How to Build Scenarios”, Wired 3, Special Issue. http://www.wired.com/wired/scenarios/build.html
-
-
-
-
265
-
-
27744516580
-
The dark side of ambient intelligence
-
, Vol., No. , October, pp
-
Wright, D., “The dark side of ambient intelligence”, Info, Vol. 7, No. 6, October 2005, pp. 33–51. http://www.emeraldinsight.com/info
-
(2005)
Info
, vol.7
, Issue.6
, pp. 33-51
-
-
Wright, D.1
-
266
-
-
40549122809
-
Alternative futures: Aml scenarios and Minority Report
-
, Vol. , June , forthcoming
-
Wright, David, “Alternative futures: Aml scenarios and Minority Report”, Futures, Vol. 40:5, June 2008 (forthcoming).
-
(2008)
Futures
, vol.40
, Issue.5
-
-
Wright, D.1
-
267
-
-
40549129976
-
The illusion of security
-
forthcoming
-
Wright, D., et al., “The illusion of security”, Communications of the ACM, 2008 (forthcoming).
-
(2008)
Communications of the ACM
-
-
Wright, D.1
-
268
-
-
85098228644
-
-
WWRF, The Book of Visions 2001: Visions of the Wireless World, Version 1.0, Wireless World Research Forum, 2001. http://www.wireless-world-research.org/general_info/BoV2001-final. pdf
-
WWRF, The Book of Visions 2001: Visions of the Wireless World, Version 1.0, Wireless World Research Forum, 2001. http://www.wireless-world-research.org/general_info/BoV2001-final. pdf
-
-
-
-
269
-
-
85098116653
-
-
Wireless World Research Forum
-
Xenakis, C., and S. Kontopoulou, “Risk Assessment, Security & Trust: Cross Layer Issues”, Special Interest Group 2, Wireless World Research Forum, 2006.
-
(2006)
Risk Assessment, Security & Trust: Cross Layer Issues, Special Interest Group 2
-
-
Xenakis, C.1
Kontopoulou, S.2
-
270
-
-
85098216036
-
For Victims, Repairing ID Theft Can Be Grueling”, The
-
October 2005
-
Zeller, T. Jr., “For Victims, Repairing ID Theft Can Be Grueling”, The New York Times, 1 October 2005.
-
New York Times
-
-
Zeller, T.1
-
271
-
-
85098145777
-
TSA Data Dump Leads to Lawsuit
-
July 2005
-
Zetter, K., “TSA Data Dump Leads to Lawsuit”, Wired News, 14 July 2005. http://www.wired. com/news/privacy/0,1848,68560,00.html
-
Wired News
-
-
Zetter, K.1
|