2018
|
Kosta, Eleni The Retention of Communications Data in Europe and the UK Book Chapter Edwards, Lilian; Waelde, Charlotte (Ed.): Law and the Internet, pp. 193-212, Hart Publishing, 2018, ISBN: 9781841138152. BibTeX @inbook{E.2018,
title = {The Retention of Communications Data in Europe and the UK},
author = {Eleni Kosta},
editor = {Lilian Edwards and Charlotte Waelde},
isbn = {9781841138152},
year = {2018},
date = {2018-00-00},
booktitle = {Law and the Internet},
pages = {193-212},
publisher = {Hart Publishing},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
|
KOSTA Eleni NAI FOVINO Igor, FISCHER-HUEBNER Simone HANSEN Marit RAAB Charles SANCHEZ Ignacio ; Diane, WHITEHOUSE The Smart World Revolution Book Chapter Hansen M., Kosta Nai-Fovino Fischer-Hübner E I S (Ed.): Privacy and Identity Management. The Smart Revolution, pp. 3-12, Springer, 2018, ISBN: 978-3-319-92925-5, (12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, IFIP AICT 526). BibTeX @inbook{Eleni2018b,
title = {The Smart World Revolution},
author = {KOSTA Eleni, NAI FOVINO Igor, FISCHER-HUEBNER Simone, HANSEN Marit, RAAB Charles, SANCHEZ Ignacio and WHITEHOUSE Diane},
editor = {Hansen, M., Kosta, E., Nai-Fovino, I., Fischer-Hübner, S.},
isbn = {978-3-319-92925-5},
year = {2018},
date = {2018-00-00},
booktitle = {Privacy and Identity Management. The Smart Revolution},
pages = {3-12},
publisher = {Springer},
note = {12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers, IFIP AICT 526},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
|
2015
|
KOSTA E., STUURMAN K Technical standards and the draft General Data Protection Regulation Book Chapter Delimatsis, P (Ed.): The Law, Economics and Politics of International Standardization, pp. 434-459, Cambridge University Press 2015, 2015. Links | BibTeX @inbook{E.2015,
title = {Technical standards and the draft General Data Protection Regulation},
author = {KOSTA E., STUURMAN K.},
editor = {P. Delimatsis},
url = {https://ssrn.com/abstract=2642331},
doi = {10.2139/ssrn.2642331},
year = {2015},
date = {2015-00-00},
booktitle = {The Law, Economics and Politics of International Standardization},
pages = {434-459},
publisher = {Cambridge University Press 2015},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
|
PURTOVA N. KOSTA E., KOOPS B -J Laws and Regulations for digital health Book Chapter S. Fricker C. Thümmler, Gavras A (Ed.): Requirements Engineering for Digital Health, pp. 47-74, Springer, 2015, ISBN: 3319097970. Links | BibTeX @inbook{N.2015,
title = {Laws and Regulations for digital health},
author = {PURTOVA N., KOSTA E., KOOPS B.-J.},
editor = {S. Fricker, C. Thümmler, A. Gavras},
url = {https://ssrn.com/abstract=2529948},
isbn = {3319097970},
year = {2015},
date = {2015-00-00},
booktitle = {Requirements Engineering for Digital Health},
pages = {47-74},
publisher = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
|
2014
|
CUIJPERS C. PURTOVA N., KOSTA E Data Protection Reform and the Internet: the draft Data Protection Regulation Book Chapter Savin A., Trzaskowski J (Ed.): Research Handbook on EU Internet Law, pp. 543-568, Edward Elgar, 2014. Links | BibTeX @inbook{C.2014,
title = {Data Protection Reform and the Internet: the draft Data Protection Regulation},
author = {CUIJPERS C., PURTOVA N., KOSTA E.},
editor = {Savin, A., Trzaskowski, J.},
url = {https://ssrn.com/abstract=2373683},
year = {2014},
date = {2014-00-00},
booktitle = {Research Handbook on EU Internet Law},
pages = {543-568},
publisher = {Edward Elgar},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
|
KOSTA E., CUIJPERS C The draft Data Protection Regulation and the development of data processing applications, Book Chapter Marit Hansen Jaap-Henk Hoepman, Ronald Leenes Diane Whitehouse (Ed.): Privacy and Identity Management for Emerging Services and Technologies, pp. 12-32, Springer, 2014, (8th IFIP Summer School on Privacy and Identity Management 2013, IFIP AICT 421). Links | BibTeX @inbook{E.2014b,
title = {The draft Data Protection Regulation and the development of data processing applications,},
author = {KOSTA E., CUIJPERS C.},
editor = {Marit Hansen, Jaap-Henk Hoepman, Ronald Leenes, Diane Whitehouse},
doi = {10.1007/978-3-642-55137-6_2},
year = {2014},
date = {2014-00-00},
booktitle = {Privacy and Identity Management for Emerging Services and Technologies},
pages = {12-32},
publisher = {Springer},
note = {8th IFIP Summer School on Privacy and Identity Management 2013, IFIP AICT 421},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
|
2012
|
KOSTA E., GASSON M The processing of location data under the European data protection legal framework: behavioural profiling via location tracking Book Chapter K. JANSSEN, CROMPVOETS J (Ed.): Geographic Data and the Law: Defining New Challenges, pp. 93-109, Leuven University Press, 2012. BibTeX @inbook{E.2012,
title = {The processing of location data under the European data protection legal framework: behavioural profiling via location tracking},
author = {KOSTA E., GASSON M.},
editor = {K. JANSSEN, J. CROMPVOETS},
year = {2012},
date = {2012-00-00},
booktitle = {Geographic Data and the Law: Defining New Challenges},
pages = {93-109},
publisher = {Leuven University Press},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
|
GASSON M. KOSTA E., BOWMAN D Chapter 1 : Human ICT implants: From invasive to pervasive Book Chapter GASSON M. KOSTA E., BOWMAN D (Ed.): Human ICT implants – Technical, Legal and Ethical Considerations, IT & Law Series, pp. 1-8, TMC Asser Press - Springer, 2012. BibTeX @inbook{M.2012b,
title = {Chapter 1 : Human ICT implants: From invasive to pervasive},
author = {GASSON M., KOSTA E., BOWMAN D.},
editor = {GASSON M., KOSTA E., BOWMAN D.},
year = {2012},
date = {2012-00-00},
booktitle = {Human ICT implants – Technical, Legal and Ethical Considerations, IT & Law Series},
pages = {1-8},
publisher = {TMC Asser Press - Springer},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
|
KOSTA E., BOWMAN D Chapter 9: Implanting implications: data protection challenges arising from the use of human ICT implants Book Chapter GASSON M. KOSTA E., BOWMAN D (Ed.): Human ICT implants – Technical, Legal and Ethical Considerations, IT & Law Series , pp. 97-112, TMC Asser Press - Springer, 2012. Links | BibTeX @inbook{E.2012b,
title = {Chapter 9: Implanting implications: data protection challenges arising from the use of human ICT implants},
author = {KOSTA E., BOWMAN D.},
editor = {GASSON M., KOSTA E., BOWMAN D.},
doi = {10.1007%2F978-90-6704-870-5_9},
year = {2012},
date = {2012-00-00},
booktitle = {Human ICT implants – Technical, Legal and Ethical Considerations, IT & Law Series },
pages = {97-112},
publisher = {TMC Asser Press - Springer},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
|
BOWMAN D. GASSON M., KOSTA E The societal reality of that which was once science fiction Book Chapter GASSON M. KOSTA E., BOWMAN D (Ed.): Human ICT implants – Technical, Legal and Ethical Considerations, IT and Law Series, Chapter 13, pp. 175-179, TMC Asser Press - Springer, 2012. BibTeX @inbook{D.2012,
title = {The societal reality of that which was once science fiction},
author = {BOWMAN D., GASSON M., KOSTA E.},
editor = {GASSON M., KOSTA E., BOWMAN D.},
year = {2012},
date = {2012-00-00},
booktitle = {Human ICT implants – Technical, Legal and Ethical Considerations, IT and Law Series},
pages = {175-179},
publisher = {TMC Asser Press - Springer},
chapter = {13},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
|
2011
|
PRIEM B. LEENES R., KOSTA KUCZERAWY E A The identity landscape Book Chapter J. CAMENISCH R. LEENES, SOMMER D (Ed.): Digital Privacy – PRIME – Privacy and Identity Management for Europe, pp. 33-51, Springer-Verlag Berlin Heidelberg, 2011. Links | BibTeX @inbook{B.2011,
title = {The identity landscape},
author = {PRIEM B., LEENES R., KOSTA E., KUCZERAWY A.},
editor = {J. CAMENISCH, R. LEENES, D. SOMMER},
doi = {10.1007/978-3-642-19050-6_3},
year = {2011},
date = {2011-00-00},
booktitle = {Digital Privacy – PRIME – Privacy and Identity Management for Europe},
pages = {33-51},
publisher = {Springer-Verlag Berlin Heidelberg},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
|
PRIEM B. LEENES R., FAIRCHILD KOSTA A E The need for privacy-enhancing Identity Management Book Chapter J. CAMENISCH R. LEENES, SOMMER D (Ed.): Digital Privacy – PRIME – Privacy and Identity Management for Europe, pp. 53-71, Springer, 2011. Links | BibTeX @inbook{B.2011b,
title = {The need for privacy-enhancing Identity Management},
author = {PRIEM B., LEENES R., FAIRCHILD A., KOSTA E.},
editor = {J. CAMENISCH, R. LEENES, D. SOMMER},
doi = {10.1007/978-3-642-19050-6_4},
year = {2011},
date = {2011-00-00},
booktitle = {Digital Privacy – PRIME – Privacy and Identity Management for Europe},
pages = {53-71},
publisher = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
|
KOSTA E KUCZERAWY A., LEENES DUMORTIER R J Regulating identity management Book Chapter J. CAMENISCH R. LEENES, SOMMER D (Ed.): Digital Privacy – PRIME – Privacy and Identity Management for Europe, pp. 73-89, Springer-Verlag Berlin Heidelberg, 2011. Links | BibTeX @inbook{E2011,
title = {Regulating identity management},
author = {KOSTA E, KUCZERAWY A., LEENES R., DUMORTIER J.},
editor = {J. CAMENISCH, R. LEENES, D. SOMMER},
doi = {10.1007/978-3-642-19050-6_5},
year = {2011},
date = {2011-00-00},
booktitle = {Digital Privacy – PRIME – Privacy and Identity Management for Europe},
pages = {73-89},
publisher = {Springer-Verlag Berlin Heidelberg},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
|
PRIEM B. KOSTA E., KUCZERAWY DUMORTIER LEENES A J R User-centric privacy-enhancing Identity Management Book Chapter J. CAMENISCH R. LEENES, SOMMER D (Ed.): Digital Privacy – PRIME – Privacy and Identity Management for Europe, pp. 91-106, Springer-Verlag Berlin Heidelberg, 2011. Links | BibTeX @inbook{B.2011c,
title = {User-centric privacy-enhancing Identity Management},
author = {PRIEM B., KOSTA E., KUCZERAWY A., DUMORTIER J., LEENES R.},
editor = {J. CAMENISCH, R. LEENES, D. SOMMER},
doi = {10.1007/978-3-642-19050-6_6},
year = {2011},
date = {2011-00-00},
booktitle = {Digital Privacy – PRIME – Privacy and Identity Management for Europe},
pages = {91-106},
publisher = {Springer-Verlag Berlin Heidelberg},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
|
2010
|
QUECK R. DE STREEL A., HOU JOST & KOSTA L J E The EU Regulatory Framework Applicable to Electronic Communications Book Chapter O’REGAN, GARZANITI & L M (Ed.): Telecommunications, Broadcasting and the Internet. EU Competition Law & Regulation, pp. 3-262, Thomson Sweet & Maxwell, 3, 2010. BibTeX @inbook{R.2010,
title = {The EU Regulatory Framework Applicable to Electronic Communications},
author = {QUECK R., DE STREEL A., HOU L., JOST J. & KOSTA E.},
editor = {L. GARZANITI & M. O’REGAN},
year = {2010},
date = {2010-00-00},
booktitle = {Telecommunications, Broadcasting and the Internet. EU Competition Law & Regulation},
pages = {3-262},
publisher = {Thomson Sweet & Maxwell},
edition = {3},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
|
KOSTA E., Privacy issues and new technologies: the example of RFID technology (Radio Frequency Identification) Book Chapter C. LAMBRINOUDAKIS L. MITROU, GRITZALIS KATSIKAS S S (Ed.): Privacy Protection in the Information and Communication Technologies: Technical and Legal Issues, pp. 583-601, Papasotiriou Editions, 2010, (in Greek). BibTeX @inbook{E.2010c,
title = {Privacy issues and new technologies: the example of RFID technology (Radio Frequency Identification)},
author = {KOSTA E.,},
editor = {C. LAMBRINOUDAKIS, L. MITROU, S. GRITZALIS, S. KATSIKAS},
year = {2010},
date = {2010-00-00},
booktitle = {Privacy Protection in the Information and Communication Technologies: Technical and Legal Issues},
pages = {583-601},
publisher = {Papasotiriou Editions},
note = {in Greek},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
|
E., KOSTA The Freddi Staurs of Social Networking – A legal approach Book Chapter BEZZI M. DUQUENOY P., FISCHER-HÜBNER HANSEN ZHANG S M G (Ed.): Privacy and Identity, IFIP AICT 320, pp. 66–74, Springer, 2010. BibTeX @inbook{E.2010d,
title = {The Freddi Staurs of Social Networking – A legal approach},
author = {KOSTA E.},
editor = {BEZZI M., DUQUENOY P., FISCHER-HÜBNER S., HANSEN M. , ZHANG G.},
year = {2010},
date = {2010-00-00},
booktitle = {Privacy and Identity, IFIP AICT 320},
pages = {66–74},
publisher = {Springer},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
|
2008
|
KINDT E. LIEVENS E., KOSTA LEYS DE HERT E T P Constitutional Rights and New Technologies in Belgium Book Chapter LEENES R., KOOPS B J; DE HERT, P (Ed.): Constitutional Rights and New Technologies. A comparative study, Chapter 2, pp. 11-55, TMC Asser Press, Information Technology & Law Series, The Hague, 2008. BibTeX @inbook{E.2008b,
title = {Constitutional Rights and New Technologies in Belgium},
author = {KINDT E., LIEVENS E., KOSTA E., LEYS T., DE HERT P.},
editor = {LEENES, R., KOOPS, B.J. and DE HERT, P.},
year = {2008},
date = {2008-00-00},
booktitle = {Constitutional Rights and New Technologies. A comparative study},
pages = {11-55},
publisher = {TMC Asser Press, Information Technology & Law Series, The Hague},
chapter = {2},
keywords = {},
pubstate = {published},
tppubtype = {inbook}
}
|