About
63
Publications
40,409
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
836
Citations
Introduction
Education
March 1989 - February 1993
Publications
Publications (63)
This book addresses the interplay between the proportionality principle and EU digital law.
Does EU digital law provide a fair balance of rights and interests? How does proportionality limit legislation in the digital economy? How can it be used to balance competing rights and interests? Diving into the dialectics of law and technology, the book an...
Using remote sensing technologies to ensure environmental protection responds to the
need of protection of a right and a public good and interest. However, the increasing introduction of these technologies has raised new challenges, such as their interference with the rights of privacy and personal data, which are also protected fundamental rights....
Application of Remote Sensing Technologies in environmental
monitoring: legal framework, limitations and potential in the
European Union
Distributed medical, financial, or social databases are analyzed daily for the discovery of patterns and useful information. Privacy concerns have emerged as some database segments contain sensitive data. Data mining techniques are used to parse, process, and manage enormous amounts of data while ensuring the preservation of private information. Cr...
Our analysis of community policing focuses on the impact of the new Data Protection Package that will enter into force in May 2018. We identify and discuss the implications of both the General Data Protection Regulation (2016/ 679/ EU-GDPR) and the Police and Criminal Justice Authorities Directive (2016/680/ EU -PCJA Directive), as due to the hybri...
In 2016, the General Data Protection Regulation has opened a new chapter for the protection of informational privacy in Europe. More than a simple revision of the Data Protection Directive (1995) and less than a regulatory paradigm shift, the Regulation attempts to keep path with technological and socio-economic changes while guaranteeing the perso...
The Internet of Things (IoT), in which billions of things such as devices, applications and networks , are interconnected to each other and are capable to interact without any human intervention , is transforming the way of life. Public safety, transportation and communication, energy , healthcare, logistics, government and education are using cute...
In this paper a systematic modelling methodology for evaluating the effects of cyber-attacks on States Critical Information Infrastructure (CII) is introduced. The analysis is focused on the United Nations Charter's normative scheme of the ‘use of force’, in order to define whether these attacks constitute a wrongful ‘use of force’ under the princi...
Several high-profile personal data breaches have triggered a discussion among privacy advocates, security practitioners, corporate managers and politicians on what role regulation should play in how companies and organisations protect data. The self-regulation paradigm fails to reinforce individuals' right to information and foster proactive risk m...
A systematic modelling methodology is presented in this paper, so as to evaluate the effects of cyberattacks
on states’ Critical Information Infrastructure, in order to answer the question of whether these
attacks have risen to the level of a ‘use of force’ under the principles of international law. By using the
qualitative criteria for recognizing...
Purpose
– The increasing number of cyber attacks has transformed the “cyberspace” into a “battlefield”, bringing out “cyber warfare” as the “fifth dimension of war” and emphasizing the States’ need to effectively protect themselves against these attacks. The existing legal framework seem inadequate to deal effectively with cyber operations and, fro...
Purpose
– This work aims to argue that it is possible to address discrimination issues that naturally arise in contemporary audio CAPTCHA challenges and potentially enhance the effectiveness of audio CAPTCHA systems by adapting the challenges to the user characteristics.
Design/methodology/approach
– A prototype has been designed, called PrivCAPTC...
In this paper, we perform an analysis of SIP, a popular voice over IP (VoIP) protocol and propose a framework for capturing and analysing volatile VoIP data in order to determine forensic readiness requirements for effectively identifying an attacker. The analysis was performed on real attack data and the findings were encouraging. It seems that if...
Social media and Web 2.0 have enabled internet users to contribute online content, which may be crawled and utilized for a variety of reasons, from personalized advertising to behaviour prediction/profiling. In this paper, our goal is to present a horror and a success story from the digital world of Social Media, in order to: (a). present a politic...
Following the identification on an international basis of cyberspace as a new “domain of warfare”, it has become widely (though not fully) accepted that the traditional rules of International Humanitarian Law are also applicable to Computer Network Attacks (CNAs). Despite the fact that there has been considerable progress at the European and Intern...
Cloud computing (CC) is the new trend in computing and resource management. This architectural shift toward thin clients and the centralized on-demand provision of computing resources aspires to offer significant economical benefits to its users. However, the adaption of the CC model has forced many times the IT industry and the academia to revisit...
This paper is towards deliverable ID4.3.1 "Legal Issues of Cybercrime".
Addressing the insider threat is a major issue in cyber and corporate security in order to enhance trusted computing in critical infrastructures. In this paper we study the psychosocial perspective and the implications of insider threat prediction via social media, Open Source Intelligence and user generated content classification. Inductively, we...
The proliferation of smartphones introduces new opportunities in digital forensics. One of the reasons is that smartphones are usually equipped with sensors (e.g. accelerometer, proximity sensor, etc.), hardware which can be used to infer the user's context. This context may be useful in a digital investigation, as it can aid in the rejection or ac...
It is an undisputable fact that nowadays many different types of crime are conducted by utilizing some type of electronic device - communication. To address this new situation, modern forensics tools evolved, becoming sophisticated enough to handle almost all kinds of digital content. However, surprisingly enough, collecting and validating the auth...
Social media have widened society’s opportunities for communication, while they offer ways to perform employees’ screening and profiling. Our goal in this paper is to develop an insider threat prediction method by (e)valuating a users’ personality trait of narcissism, which is deemed to be closely connected to the manifestation of malevolent inside...
Cloud Computing (CC) is a promising next-generation computing paradigm providing network and computing resources on demand via the web. The cloud market is still in its infancy and all major issues, ranging from interoperability and standardization, to legislation and SLA contracts are still wide open. However, the main obstacle for a more catholic...
Privacy preserving analysis of a social network aims at a better understanding of the network and its behavior, while at the same time protecting the privacy of its individuals. We propose an anonymization method for weighted graphs, i.e., for social networks where the strengths of links are important. This is in contrast with many previous studies...
Smartphones constantly interweave into everyday life, as they accompany individuals in different contexts. Smartphones include a combination of heterogeneous data sources, which can prove essential when combating crime. In this paper we examine potential evidence that may be collected from smartphones. We also examine the available connection chann...
The effectiveness of CAPTCHA challenges largely depends on being simultaneously easier to solve for humans and harder to solve for bots. In this work we argue that it is possible to enhance the effectiveness of audio CAPTCHA challenges by adapting the challenge to the users characteristics. We propose a method for achieving this adaptation while p...
Technological and social phenomena like cloud computing, behavioural advertising, online social networks as well as globalisation (of data flows) have profoundly transformed the way in which personal data are processed and used. This paper discusses the efficiency of the legislation in force and the impact of PETs and the concept of privacy by desi...
The evolution of new technologies and the spread of the Internet have led to the exchange and elaboration of massive amounts
of data. Simultaneously, intelligent systems that parse and analyze patterns within data are gaining popularity. Many of these
data contain sensitive information, a fact that leads to serious concerns on how such data should...
This paper addresses the issue of workplace monitoring and its implications for employees' privacy. We focus on privacy issues with regard to new trends and surveillance techniques: proxy servers, keyloggers and packet sniffers. The aim is multifold: we discuss privacy concerns and implications as a result of implementing surveillance technologies,...
Nowadays, Internet users are depending on various search engines in order to be able to find requested information on the
Web. Although most users feel that they are and remain anonymous when they place their search queries, reality proves otherwise.
The increasing importance of search engines for the location of the desired information on the Inte...
Purpose
– The purpose of this paper is to examine how the introduction of new communication channels facilitates interactive information sharing and collaboration between various actors over social networking services and how social networking fits in the existing European legal framework on data protection. The paper also aims to discuss some spec...
This chapter addresses the issue of electronic workplace monitoring and its implications for employees’ privacy. Organizations increasingly use a variety of electronic surveillance methods to mitigate threats to their information systems. Monitoring technology spans different aspects of organizational life, including communications, desktop and phy...
Nowadays, Internet users are depending on various search engines in order to be able to find requested information on the
Web. Although most users feel that they are and remain anonymous when they place their search queries, reality proves otherwise.
The increasing importance of search engines for the location of the desired information on the Inte...
It is widely accepted that electronic Government environments have caused a complete transformation of the way individuals, businesses and governmental agencies interact with central government. However, the acceptance and success of e-Government services largely depend on the level of trust and confidence developed by the users to the provided ser...
This chapter addresses the issue of electronic workplace monitoring and its implications for employees' privacy. Organisations increasingly use a variety of electronic surveillance methods to mitigate threats to their information systems. Monitoring technology spans different aspects of organisational life, including communications, desktop and phy...
This paper provides a combined approach on the major issues pertaining to the investigation of cyber crimes and the deployment of Internet forensics techniques. It discusses major issues from a technical and legal perspective and provides general directions on how these issues can be tackled. The paper also discusses the implications of data mining...
The internationally increased attention on organized crime, cyber-crime, as well as terrorism-reinforced by the terrorist attacks, especially in New York, Madrid, and London-have created a fertile ground for governments and international organizations to speed up the adoption of legislation that will strengthen the investigation and prosecution pow...
This paper addresses the controversy between employees’ right to privacy and employers’ need to safeguard organizational resources by employing monitoring tools. It shows how organizations can formulate use policies, by applying basic principles for fair and lawful monitoring. A list of key points is presented, which organizations should take into...
Purpose
– The objective of this paper is to investigate the legal and technical reasons why a declaration of will, denoted by a digital signature, can be cancelled and how this cancellation can be technically achieved.
Design/methodology/approach
– Proposes a technical framework for establishing a signature revocation mechanism based on special da...
The digitalisation of networks thus offering of new services may entail inherent risks to privacy of the user, as well as
possible inhibitions on his/her freedom of communication. This paper addresses issues of privacy and fair processing of personal
data in electronic communications. It focuses on the analysis of the Directive 2002/58/EC “on priva...
This paper provides a systematic overview of the major constitutional and legalaspects of e-voting, together with their technical
implications. All democracy-oriented legal and constitutional requirements of an Internet-based voting system are identified.
Such a voting system has to comply with these, in order to encourage and promote the participa...
This paper addresses the democracy-oriented legal and constitutional requirements that an electronic voting system has to comply with. Its scope covers every election or decision-making process, which takes place through voting. Due mainly to the digital divide and to current technological limitation, electronic voting cannot be proposed as a unive...
This paper provides a systematic overview of the major constitutional and legal aspects of e-voting, together with their technical implications. All democracy- oriented legal and constitutional requirements of an Internet-based voting system are identified. Such a voting system has to comply with these, in order to encourage and promote the partici...