Danaja Fabcic

Danaja Fabcic
Vrije Universiteit Brussel | VUB · Law Science Technology and Society (LSTS)

About

10
Publications
622
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
11
Citations

Publications

Publications (10)
Chapter
Full-text available
Remote care technologies help patients connect with their caregivers through monitoring, alerts, anomaly detection, and so on. Due to their nature, remote care technologies cross a number of legal fields, such as privacy and data protection, cybersecurity, and medical devices regulation. This paper aims to close the gap between high-level legal pri...
Chapter
Blockchain and the blockchain-based cryptocurrency Bitcoin revolutionized our ideas of decentralized data and transaction management. Based on and improving on the ideas of blockchain, a variety of distributed ledger technologies (DLTs) have been proposed in recent years. DLTs promise fully decentralized data and transaction management, with wide-r...
Chapter
Blockchains and distributed ledgers have attracted increasing attention since the introduction of the Bitcoin blockchain. The ability to run decentralized computations on open networks, on Bitcoin and on the Ethereum Virtual Machine, has led practitioners and researchers to investigate the use of blockchains and distributed ledgers for a variety of...
Conference Paper
Full-text available
Data collection in the EU pandemic preparedness framework (ECDC, HERA)
Chapter
Full-text available
Authentication is the process of confirming the user’s identity before the payment can be performed. It contributes to cybersecurity by preventing access by unauthorised parties. However, in e-payments the authentication differs from traditional identity checks since it is performed online and remotely. This paper explores the relationship between...
Chapter
Full-text available
Encryption is the process of obscuring plaintext information to make it unreadable without special knowledge, such as decryption key. Proper use of strong encryption in ICTs creates a zone of privacy to protect opinion and belief. However, in a global digital economy, any legal system which does not ensure strong encryption, puts this safe zone at...
Chapter
Full-text available
The mHealth services have brought to the healthcare operators, professionals and patients numerous advantages and, at the same time, opened a door to new cyber-threats that might have a significant influence on patient’s health and life. Often, cyber-attacks are successful due to a human error and a poor knowledge about the cyber-security. Therefor...
Conference Paper
Full-text available
In order to combat cyberattacks, an organisation can decide to train its employees. Improving cyber-skills of employees through educational games means their personal data will be processed and therefore it falls under the scope of the General Data Protection Regulation (GDPR). The goal of this paper is to address challenges that organisations are...

Network

Cited By