General Lack of Privacy
- Paper: Google Glass users fight privacy fears
- Paper: We Can't Stop Sharing
- Paper: Does Google Know Too Much About You?
- Paper: Does Google Know Too Much?
- Paper: Privacy and the Internet of Things
- Paper: Google and the Right to be Forgotten
Security Policy and Mechanism
- Paper: Making security sustainable
- Paper: Impediments with policy interventions to foster cybersecurity
- Paper: Why Is Security a Software Issue?
- Paper: Email Outsourcing Threatens Privacy & Academic Freedom
- Paper: San Francisco Bans Facial Recognition Technology
- Paper: High-tech Estonia votes online for European Parliament
Risks to Privacy and Security
- Paper: Communications Surveillance: Privacy and Security at Risk
- Paper: Obama and Cameron Exposing the Internet
- Paper: Personal Data and the Internet of Things
Cyber Security Risks
- Paper: The Online Threat.
- Paper: Obama and Cameron Exposing the Internet
- Paper: What Happens When Your Car Gets Hacked?
Privacy Rights of Individuals
- Paper on the Act: Guide for Businesses and Organizations to Canada's Personal Information Protection and Electronic Documents Act, [pdf].
- Paper: Employee Rights to Privacy
GPDR
- Paper: General Data Protection Regulation (GPDR)
- Paper: General Data Protection Regulation (GDPR): What you need to know to stay compliant
- Site: EUGDPR --- Information Portal
- Paper: The European Perspective on Responsible Computing
Censorship
- Paper: Casting Too Wide a Net?; Critics See Internet Board Overstepping Its Authority
- Paper: Sri Lanka blocked Facebook after the Easter bombings. Should it have?
USA Government
- Paper: NSA Prism and Tech Companies
- Paper: NSA Security
- Paper: NSA Security Update
- Site: Domestic Surveillance Techniques - Our Data Collection Program
- Paper: US government defends data gathering - Digital Spy
- Paper: Internet-of-Things spying
- Paper: How facial recognition became a routine policing tool in America
Canadian Government
- Paper: Canadian cellphone spying
- Paper: Canadian CSIS concerns
- Paper: The Personal Information Protection and Electronic Documents Act: A primer on its privacy provisions
Chinese Government
- Paper: Inside China's Dystopian Dreams: A.I., Shame and Lots of Cameras
- Paper: China Aims For Near-Total Surveillance, Including in People's Homes
- Paper: China's Surveillance State Should Scare Everyone
- Paper: China's watchful eye
- Paper: China's All-Seeing Surveillance State Is Reading Its Citizens' Faces
- Video: Social Credit System Coming To China, With Citizens Scored On Behavior
- Video: Scientists in China develop ultra-long range AI camera that can photograph subjects from 28 MILES away
- Paper: Code in Chinese surveillance app analysed
Law Enforcement vs Encryption
- Paper: Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications
- Paper: Encryption and Surveillance
- Paper: Quantum Hype and Quantum Skepticism
Data Breaches
- Paper: The 18 biggest data breaches of the 21st century
- Paper: Data Breaches 101: How They Happen, What Gets Stolen, and Where It All Goes
- Paper: Data breach
- Paper: Tesla cars keep more data than you think, including this video of a crash that totaled a Model 3
- Paper: Steven Weber and Betsy Cooper: In our age of hacks and leaks, itâs time to turn back to analog
Facebook Problems
- Paper: Hundreds of millions of Facebook user records were exposed on Amazon cloud server
- Paper: Facebook data leak (yeah, another one) allegedly exposes passwords, likes, etc
- Paper: Massive Facebook data breach left 50 million accounts exposed
- Video: Facebook co-founder Chris Hughes: `It's time to hold them accountable' (Part 1)
- Video: Facebook co-founder Chris Hughes: `It's time to hold them accountable' (Part 2)
Spam
- Paper: Damn Spam
- Paper: Canadian Anti-Spam Law
- Paper: Geist on Anti-Spam
Trust on Internet
- Paper: Trust, Authenticity, and Discursive Power In Cyberspace.
Privacy and Security by Design
- Paper: ``Privacy by Design'' A Crucial Design Principle
- Paper: Enterprise Wi-Fi: We Need Devices That Are Secure by Default