Paper published in a book (Scientific congresses, symposiums and conference proceedings)
Towards Reinventing Online Privacy
Gheorghe, Gabriela; Engel, Thomas
2015 • In Berendt, Bettina; Engel, Thomas; Ikonomou, Demostheneset al. (Eds.) LNCS - Annual Privacy Forum 2015 - Bridging the gap between research and policy
Gheorghe, Gabriela ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Engel, Thomas ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
External co-authors :
no
Language :
English
Title :
Towards Reinventing Online Privacy
Publication date :
2015
Event name :
Annual Privacy Forum 2015 - Bridging the gap between research and policy
Event date :
7-10-2015 to 8-10-2015
Main work title :
LNCS - Annual Privacy Forum 2015 - Bridging the gap between research and policy
Accenture: Accenture big success with big data survey (2014). https://www.accenture.com/lu-en/acnmedia/Accenture/Conversion-Assets/DotCom/Documents/Global/PDF/Industries14/Accenture-Big-Data-POV.pdf
Bisogni, F.: Data breaches and the dilemmas in notifying customers. In: WEIS (2015)
Edwards, B., Hofmeyr, S., Forrest, S.: Hype and heavy tails: a closer look at data breaches. In: WEIS (2015)
European Commission: Proposal for a general data protection regulation (2012). http://ec.europa.eu/justice/data-protection/document/review2012/com201211en.pdf
Gartner: gartner survey reveals that SaaS deployments are now mission critical (2014). http://www.gartner.com/newsroom/id/2923217
Gembasu, R., Levy, A.: Vanish: self-distructing digital data (2009). http://vanish.cs.washington.edu/
Google: google trends statistics on the keyphrase “data protection compliance” since 2005 in the UK (2015) http://www.google.com/trends/explore#q=data%20protection%20compliance&cmpt=q&tz=
Kwon, J., Hofmeyr, S., Johnson, B.: The market effect of healthcare security: dopatients care about data breaches? In: WEIS (2015)
Perlman, R.: The ephemerizer: making data disappear. J. Inf. Syst. Secur. 1, 51–68 (2005)
Reardon, J., Basin, D., Capkun, S.: SoK: secure data deletion. In: Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP 2013, pp. 301–315. IEEEComputer Society, Washington (2013)