877.791.9571 |

About the Author:

Daniel Dimov is an independent legal consultant (www.dimov.pro) based in Belgium. Daniel Dimov is a PhD student at the Center for Law in the Information Society at Leiden University, the Netherlands. He did traineeships with the European Commission (Brussels), European Digital Rights (Brussels), and T.M.C. Asser Institute (the Hague). He has a Master's Degree in Bulgarian Law (Bulgaria), a Master's Degree in European law (The Netherlands), and a certificate in Public International Law from the Hague Academy of International law. Daniel is a legal consultant with InfoSec Institute.
crwdsourcing10232014

Cyber Attack Protection via Crowdsourcing

1. Introduction

In 2013, Imperva, a company providing information security products and services, published a study analyzing attack traffic against 60 web applications within the time period of January-March 2013. […]

ChineseSocialMedia10152014

Chinese Social Media Censorship

1. Introduction

In the 3rd century BC, the Chinese Emperor Qin Shihuang attempted to destroy original Confucian texts and killed scholars who had knowledge in those texts. This event is […]

nanorobots10142014

Information Security of Nanorobots

1. Introduction

The year is 2045. A 31-year-old woman is brought to the hospital complainingof headaches and fever. The doctors identify a species of equine encephalitis, a mosquito-borne virus, in […]

slepTrack09122014

Privacy Risks of Sleep-Tracking Devices

1. Introduction

According to the technology market intelligence company “ABI Research”, there are currently more than 10 billion wirelessly connected devices. In 2030, the number of these devices will reach […]

crowdsensing07292014

Crowdsensing: State of the Art and Privacy Aspects

1. Introduction

It is estimated that today approximately three-quarters of the human population has a mobile phone. Crowdsensing, a new business model, allows this large number of mobile phones to […]

RFID-Chip-04172014

Human-implanted RFID chips

1. Introduction

In 1945, Léon Theremin, a Russian inventor, invented one of the first covert listening devices, also known as “bugs.” The device was a predecessor of the Radio-frequency identification […]

Privacy02182014

Ten Important Privacy Threats

1. Introduction

As the Internet becomes more and more important to our lives, the challenge is to enjoy the conveniences of online activities while reducing the risks of privacy violations. […]

NetNeutrality02112014

The Debate Over Network Neutrality in the EU and the USA

1. Introduction

Network neutrality (also known as net neutrality or Internet neutrality) refers to a general principle that Internet service providers (ISPs) should not control how their customers lawfully use […]

TheInternet-11142013

Privacy Implications of the Internet of Things

,

Introduction

The term “Internet of Things” refers to the use of the Internet for monitoring, tracking, controlling, and interconnecting everyday objects. For example, home appliances can be connected to the […]

Google-Maps-06192013

The new Google Maps: a perfect place for review fraud

1. Introduction

In 2006, Jeff Howe coined the concept of crowdsourcing. Crowdsourcing is an act of outsourcing a job, previously done by workers, to a large group of people in […]

GoogleGlass06132013

Privacy Implications of Google Glass

Introduction

Google Glass is a wearable computer worn like a standard pair of glasses. The device displays information on a glass screen in front of the eyes of the user. […]

paypal_logo-feature

PayPal: Chargebacks and Dispute Resolution

Introduction

PayPal Inc. is a global provider of online payment services established in 1998 in Palo Alto, California. In 2012, PayPal Inc. generated a total revenue of $5.6 billion USD. […]

e-money-fraud

E -Money Fraud

1. Introduction

Electronic money (e-money) is the digital equivalent of cash that is stored on an electronic device or remotely at a server. It is a relatively new payment instrument […]

Software Patent Law: EU, New Zealand, and the US compared

Software Patent Law: EU, New Zealand, and the US compared

1. Introduction

A patent is defined as an exclusive right or rights provided by a government to an inventor for a certain period of time in exchange for the public […]

Online-gambling03132013

Legal Aspects of Online Gambling

1. Introduction

Since the website of the first online casino appeared in 1995, that time, the online gambling business has grown tremendously. H2 Gambling Capital, one of the most widely […]

mobile-phone-spy-03082013

Mobile Phone Spying Software: Legality, Symptoms, and Removal

Introduction

At present, there are many websites offering mobile phone spying software. Typical examples of such websites are SpyBubble (http://www.spybubble.com/), Mobile-Spy (http://www.mobile-spy.com/), and Stealthgenie (http://http://www.stealthgenie.com/). By installing mobile phone spying […]

Crowdsourcing-02052013

Using Crowdsourcing for Collecting Information about Security Vulnerabilities

Introduction

The concept of crowdsourcing was coined by Jeff Howe in 2006. Crowdsourcing is an act of outsourcing a job, previously done by workers, to a large group of people […]

social-media-restrict-sized

Restricting social media at work

Introduction

Employees using social networks such as Facebook and Google+ may not only waste a lot of their working time, but also spread viruses on their work computers. Due to […]

SSN-identity-theft-sized

Identity Theft: The Means, Methods and Recourse

Introduction
Identity theft occurs when a person uses the identity of another person with the intent to obtain benefits illegally. The victim of the identity theft may not only suffer […]

privacy_law-sized

Differences between the privacy laws in the EU and the US

Introduction

Everything we do in the Internet leaves digital fingerprints. Therefore, it is only logical that many web users are worried about the issue of privacy. Their worry is not […]