Behavioral Targeting: A European Legal Perspective external link

IEEE Security & Privacy, num: 1, pp: 82-85, 2013

Abstract

Behavioral targeting, or online profiling, is a hotly debated topic. Much of the collection of personal information on the Internet is related to behavioral targeting, although research suggests that most people don't want to receive behaviorally targeted advertising. The World Wide Web Consortium is discussing a Do Not Track standard, and regulators worldwide are struggling to come up with answers. This article discusses European law and recent policy developments on behavioral targeting.

Grondrechten, Privacy

Bibtex

Article{nokey, title = {Behavioral Targeting: A European Legal Perspective}, author = {Zuiderveen Borgesius, F.}, url = {http://www.ivir.nl/publicaties/download/IEEE_2013_1.pdf}, year = {0702}, date = {2013-07-02}, journal = {IEEE Security & Privacy}, number = {1}, abstract = {Behavioral targeting, or online profiling, is a hotly debated topic. Much of the collection of personal information on the Internet is related to behavioral targeting, although research suggests that most people don\'t want to receive behaviorally targeted advertising. The World Wide Web Consortium is discussing a Do Not Track standard, and regulators worldwide are struggling to come up with answers. This article discusses European law and recent policy developments on behavioral targeting.}, keywords = {Grondrechten, Privacy}, }

Segmentação Comportamental, Do Not Track e o desenvolvimento jurídico europeu e holandês external link

poliTICs, num: 14, pp: 9-22, 2013

Grondrechten, Privacy

Bibtex

Article{nokey, title = {Segmentação Comportamental, Do Not Track e o desenvolvimento jurídico europeu e holandês}, author = {Zuiderveen Borgesius, F.}, url = {http://www.ivir.nl/publicaties/download/poliTICs14.pdf}, year = {0711}, date = {2013-07-11}, journal = {poliTICs}, number = {14}, keywords = {Grondrechten, Privacy}, }

Consent to Behavioural Targeting in European Law – What are the Policy Implications of Insights from Behavioural Economics? external link

pp: 1-58, 2013

Grondrechten, Privacy

Bibtex

Presentation{nokey, title = {Consent to Behavioural Targeting in European Law – What are the Policy Implications of Insights from Behavioural Economics?}, author = {Zuiderveen Borgesius, F.}, url = {http://www.ivir.nl/publicaties/download/PLSC_paper_2013.pdf}, year = {0730}, date = {2013-07-30}, keywords = {Grondrechten, Privacy}, }

De wind van Snowden in de Amerikaanse informatieparaplu external link

Mediaforum, num: 7/8, pp: 173, 2013

Bescherming van communicatie, Grondrechten

Bibtex

Article{nokey, title = {De wind van Snowden in de Amerikaanse informatieparaplu}, author = {Arnbak, A. and van Hoboken, J.}, url = {http://www.ivir.nl/publicaties/download/981.pdf}, year = {0806}, date = {2013-08-06}, journal = {Mediaforum}, number = {7/8}, keywords = {Bescherming van communicatie, Grondrechten}, }

Security Economics in the HTTPS Value Chain external link

Asghari, H., Eeten, M.J.G. van, Arnbak, A. & van Eijk, N.
pp: 1-35, 2013

Abstract

Even though we increasingly rely on HTTPS to secure Internet communications, several landmark incidents in recent years have illustrated that its security is deeply flawed. We present an extensive multi-disciplinary analysis that examines how the systemic vulnerabilities of the HTTPS authentication model could be addressed. We conceptualize the security issues from the perspective of the HTTPS value chain. We then discuss the breaches at several Certificate Authorities (CAs). Next, we explore the security incentives of CAs via the empirical analysis of the market for SSL certificates, based on the SSL Observatory dataset. This uncovers a surprising pattern: there is no race to the bottom. Rather, we find a highly concentrated market with very large price differences among suppliers and limited price competition. We explain this pattern and explore what it tells us about the security incentives of CAs, including how market leaders seem to benefit from the status quo. In light of these findings, we look at regulatory and technical proposals to address the systemic vulnerabilities in the HTTPS value chain, in particular the EU eSignatures proposal that seeks to strictly regulate HTTPS communications.

Bescherming van communicatie, Grondrechten

Bibtex

Presentation{nokey, title = {Security Economics in the HTTPS Value Chain}, author = {Asghari, H. and Eeten, M.J.G. van and Arnbak, A. and van Eijk, N.}, url = {http://www.ivir.nl/publicaties/download/paper_WEIS_2013.pdf}, year = {0711}, date = {2013-07-11}, abstract = {Even though we increasingly rely on HTTPS to secure Internet communications, several landmark incidents in recent years have illustrated that its security is deeply flawed. We present an extensive multi-disciplinary analysis that examines how the systemic vulnerabilities of the HTTPS authentication model could be addressed. We conceptualize the security issues from the perspective of the HTTPS value chain. We then discuss the breaches at several Certificate Authorities (CAs). Next, we explore the security incentives of CAs via the empirical analysis of the market for SSL certificates, based on the SSL Observatory dataset. This uncovers a surprising pattern: there is no race to the bottom. Rather, we find a highly concentrated market with very large price differences among suppliers and limited price competition. We explain this pattern and explore what it tells us about the security incentives of CAs, including how market leaders seem to benefit from the status quo. In light of these findings, we look at regulatory and technical proposals to address the systemic vulnerabilities in the HTTPS value chain, in particular the EU eSignatures proposal that seeks to strictly regulate HTTPS communications.}, keywords = {Bescherming van communicatie, Grondrechten}, }

PRISM: Obscured by Clouds or the Dark Side of the Moon?: How to Address Governmental Access to Cloud Data from Abroad external link

2013

Grondrechten, Privacy

Bibtex

Presentation{nokey, title = {PRISM: Obscured by Clouds or the Dark Side of the Moon?: How to Address Governmental Access to Cloud Data from Abroad}, author = {Arnbak, A.}, url = {http://www.ivir.nl/publicaties/download/979.pdf}, year = {0627}, date = {2013-06-27}, keywords = {Grondrechten, Privacy}, }

Gespreksnotitie RTG ‘praktijken, gevolgen en wettelijke kaders inzake het aftappen van persoonsgegevens’ external link

Grondrechten, Privacy

Bibtex

Presentation{nokey, title = {Gespreksnotitie RTG ‘praktijken, gevolgen en wettelijke kaders inzake het aftappen van persoonsgegevens’}, author = {Arnbak, A. and van Hoboken, J.}, url = {http://www.ivir.nl/publicaties/download/978.pdf}, year = {0625}, date = {2013-06-25}, keywords = {Grondrechten, Privacy}, }

Obscured by Clouds or How to Address Governmental Access to Cloud Data From Abroad external link

Grondrechten, Privacy

Bibtex

Presentation{nokey, title = {Obscured by Clouds or How to Address Governmental Access to Cloud Data From Abroad}, author = {van Hoboken, J. and Arnbak, A. and van Eijk, N.}, url = {http://www.ivir.nl/publicaties/download/obscured_by_clouds.pdf}, year = {0611}, date = {2013-06-11}, keywords = {Grondrechten, Privacy}, }

Annotatie bij Rb. ‘s-Gravenhage 11 januari 2012 (Brein / Ziggo & XS4ALL) external link

AMI, num: 3, pp: 119-131, 2012

Grondrechten

Bibtex

Case note{nokey, title = {Annotatie bij Rb. ‘s-Gravenhage 11 januari 2012 (Brein / Ziggo & XS4ALL)}, author = {Arnbak, A.}, url = {http://www.ivir.nl/publicaties/download/AMI_2012_3.pdf}, year = {0615}, date = {2012-06-15}, journal = {AMI}, number = {3}, keywords = {Grondrechten}, }