Human-implanted RFID chips
BlogApril 21, 2014
Daniel published an article entitled “Human-implanted RFID chips.” In order to gain access to the article, please click here. Photo: Natia Koiava,...
The Debate Over Network Neutrality in the EU and the USA
BlogFebruary 13, 2014
Daniel published an article entitled “The Debate Over Network Neutrality in the EU and the USA.” In order to gain access to the article, please...
Privacy Implications of the Internet of Things
BlogNovember 14, 2013
Daniel published an article entitled “Privacy Implications of the Internet of Things.” In order to gain access to the article, please...
The new Google Maps: a perfect place for review fraud
BlogAugust 12, 2013
Daniel published an article entitled “The new Google Maps: a perfect place for review fraud.” In order to gain access to the article,...
Privacy Implications of Google Glass
BlogAugust 12, 2013
Daniel published an article entitled “Privacy Implications of Google Glass.” In order to gain access to the article, please click...
PayPal: Chargebacks and Dispute Resolution
BlogMay 25, 2013
Daniel published an article entitled “PayPal: Chargebacks and Dispute Resolution.” In order to gain access to the article, please...
E -Money Fraud
BlogMay 20, 2013
Daniel published an article entitled “E-Money Fraud”. In order to gain access to the article, please click here . Photo: Todd Huffman,...
Software Patent Law: EU, New Zealand, and the US compared
BlogApril 19, 2013
Daniel published an article entitled “Software Patent Law: EU, New Zealand, and the US compared.” In order to gain access to the...
Legal Aspects of Online Gambling
BlogMarch 15, 2013
Daniel published an article entitled “Legal Aspects of Online Gambling.” In order to gain access to the article, please click here....
Mobile Phone Spying Software: Legality, Symptoms, and Removal
BlogMarch 15, 2013
Daniel published an article entitled “Mobile Phone Spying Software: Legality, Symptoms, and Removal.” In order to gain access to the...
Using Crowdsourcing for Collecting Information about Security Vulnerabilities
BlogFebruary 26, 2013
Daniel published an article on Using Crowdsourcing for Collecting Information about Security Vulnerabilities. In order to gain access to the...
Restricting social media at work
BlogJanuary 25, 2013
Daniel published an article on restricting social media at work. In order to gain access to the article, please click here.
Photo: Sean...
Identity Theft: The Means, Methods and Recourse
BlogJanuary 15, 2013
Daniel published an article on identity theft. In order to gain access to the article, please click here. You can also look at Advanced...
Differences between the privacy laws in the EU and the US
BlogJanuary 11, 2013
Daniel published an article on differences between the privacy laws in the EU and the US. In order to gain access to the article, please click...
Domain name parking of gTLDs
BlogJanuary 6, 2013
Daniel published an article on Domain name parking of gTLDs. In order to gain access to the article, please click here.
Photo: ivanpw,...