HA
H. Asghari
28 records found
1
Measuring the brussels effect through access requests
Has the European General Data Protection Regulation Influenced the Data Protection Rights of Canadian Citizens?
We investigate empirically whether the introduction of the General Data Protection Regulation (GDPR) improved compliance with data protection rights of people who are not formally protected under GDPR. By measuring compliance with the right of access for European Union (EU) and C
...
This article investigates the relationship between data breaches and identity theft, including the impact of Data Breach Notification Laws (DBNL) on these incidents (using empirical data and Bayesian modeling). We collected incident data on breaches and identity thefts over a 13-
...
The Impact of User Location on Cookie Notices
(Inside and Outside of the European Union)
The web is global, but privacy laws differ by country. Which set of privacy rules do websites follow? We empirically study this question by detecting and analyzing cookie notices in an automated way. We crawl 1,500 European, American,and Canadian websites from each of 18 countrie
...
Using Crowdsourcing Marketplaces for Network Measurements
The Case of Spoofer
Internet measurement tools are used to make inferences about network policies and practices across the Internet, such as censorship, traffic manipulation, bandwidth, and security measures. Some tools must be run from vantage points within individual networks, so are dependent on
...
Micro-Targeting and ICT media in the Dutch Parliamentary system
Technological changes in Dutch Democracy
For the period surrounding the 2018 Dutch municipal elections, a team of researchers from the Delft University of Technology investigated the effect of the digital environment on parliamentary democracy. An interdisciplinary group of researchers combined expertise on digital ethi
...
The debate about how to govern personal data has intensified in recent years. The European Union’s General Data Protection Regulation, which came into effect in May 2018, relies on transparency mechanisms codified through obligations for organisations and citizen rights. While so
...
The Right of Access as a Tool for Privacy Governance
Findings from Individual Requests & Proposal for a Crowd-sourced Dataset of Privacy Practices
Estimating the size of the iceberg from its tip
An investigation into unreported data breach notifications
Epidemic models like the SIS or SIR model enable us to describe simple spreading processes over networks but are often not sufficient to accurately capture more complex network dynamics as exhibited by sophisticated and malicious computer worms. Many of the common assumptions beh
...
This documents presents the final report of a two-year project to evaluate the impact of AbuseHUB, a Dutch clearinghouse for acquiring and processing abuse data on infected machines. The report was commissioned by the Netherlands Ministry of Economic Affairs, a co-funder of the d
...
The Internet has enabled tremendous economic and social innovation yet the underlying systems, networks and services sometimes fail miserably to protect the security of communications and data. Security incidents occur in many forms, including but not limited to the leaking and t
...