2018
|
Bert-Jaap KOOPS, Eleni KOSTA Looking for some light through the lens of “cryptowar” history: Policy options for law enforcement authorities against “going dark” Journal Article Computer Law and Security Review , 34 , pp. 890-900, 2018. Links | BibTeX @article{Jaap-Eleni2018,
title = {Looking for some light through the lens of “cryptowar” history: Policy options for law enforcement authorities against “going dark”},
author = {Bert-Jaap KOOPS, Eleni KOSTA},
url = {https://ssrn.com/abstract=3249238},
doi = {10.1016/j.clsr.2018.06.003},
year = {2018},
date = {2018-00-00},
journal = {Computer Law and Security Review },
volume = {34},
pages = {890-900},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2017
|
MACENAITE Milda, KOSTA Eleni Consent of minors to their online personal data processing in the EU: following in US footsteps? Journal Article Information and Communications Technology Law, 33 (4), pp. 146-197, 2017. BibTeX @article{Milda-Elen2017,
title = {Consent of minors to their online personal data processing in the EU: following in US footsteps? },
author = {MACENAITE Milda, KOSTA Eleni},
year = {2017},
date = {2017-00-00},
journal = {Information and Communications Technology Law},
volume = {33},
number = {4},
pages = {146-197},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
TSOHOU Aggeliki, KOSTA Eleni Enabling Valid Informed Consent for Location Tracking through Privacy Awareness of Users: A Process Theory Journal Article Computer Law & Security Review, 33 (4), pp. 434-457, 2017. BibTeX @article{Agg-Eleni2017,
title = {Enabling Valid Informed Consent for Location Tracking through Privacy Awareness of Users: A Process Theory},
author = {TSOHOU Aggeliki, KOSTA Eleni},
year = {2017},
date = {2017-00-00},
journal = {Computer Law & Security Review},
volume = {33},
number = {4},
pages = {434-457},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
Irene KAMARA, Eleni KOSTA Do Not Track initiatives: myths and reality around the lost user control, Journal Article International Data Protection Law, 6 , pp. 276-290, 2017. BibTeX @article{Kam-eleni2017,
title = {Do Not Track initiatives: myths and reality around the lost user control,},
author = {Irene KAMARA , Eleni KOSTA},
year = {2017},
date = {2017-00-00},
journal = {International Data Protection Law},
volume = {6},
pages = {276-290},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2016
|
Eleni, KOSTA The Dutch regulation of cookies Journal Article European Data Protection Law Review, 2 (1), pp. 97-102, 2016. Links | BibTeX @article{Eleni2016,
title = {The Dutch regulation of cookies},
author = {KOSTA Eleni},
url = {https://ssrn.com/abstract=2752898},
year = {2016},
date = {2016-00-00},
journal = {European Data Protection Law Review},
volume = {2},
number = {1},
pages = {97-102},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2015
|
Eleni, KOSTA Construing the Meaning of “Opt-Out” – An Analysis of the European, U.K. and German Data Protection Legislation Journal Article European Data Protection Law Review , 1 (1), pp. 16-31, 2015. Links | BibTeX @article{Eleni2015,
title = {Construing the Meaning of “Opt-Out” – An Analysis of the European, U.K. and German Data Protection Legislation},
author = {KOSTA Eleni},
url = {https://ssrn.com/abstract=2642321},
year = {2015},
date = {2015-00-00},
journal = {European Data Protection Law Review },
volume = {1},
number = {1},
pages = {16-31},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
Ronald LEENES, Eleni KOSTA Taming the cookie monster with Dutch law – a tale of regulatory failure, Computer Law and Security Review Journal Article Computer Law & Security Review, 31 (3), pp. 317-355, 2015. Links | BibTeX @article{Ronald2015,
title = {Taming the cookie monster with Dutch law – a tale of regulatory failure, Computer Law and Security Review},
author = {Ronald LEENES, Eleni KOSTA},
url = {https://ssrn.com/abstract=2577233},
year = {2015},
date = {2015-00-00},
journal = {Computer Law & Security Review},
volume = {31},
number = {3},
pages = {317-355},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2013
|
Sophie WROBEL Eleni KOSTA, Mohamed BOURIMI Rafael GIMENEZ Simon SCERRI Building future generation service-oriented information broker networks – A technical and legal joint perspective on the di.me case study Journal Article (IJACSA) International Journal of Advanced Computer Science and Applications, 4 (11), pp. 169-179, 2013, (indexed in Thomson’s ISI Web of Knowledge). BibTeX @article{Sophie2013,
title = {Building future generation service-oriented information broker networks – A technical and legal joint perspective on the di.me case study},
author = {Sophie WROBEL, Eleni KOSTA , Mohamed BOURIMI, Rafael GIMENEZ, Simon SCERRI},
year = {2013},
date = {2013-00-00},
journal = {(IJACSA) International Journal of Advanced Computer Science and Applications},
volume = {4},
number = {11},
pages = {169-179},
note = {indexed in Thomson’s ISI Web of Knowledge},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
E., KOSTA The way to Luxemburg: national court decisions on the compatibility of the Data Retention Directive with the rights to privacy and data protection Journal Article Scripted, 10 (3), pp. 339-363, 2013. Links | BibTeX @article{E.2013b,
title = {The way to Luxemburg: national court decisions on the compatibility of the Data Retention Directive with the rights to privacy and data protection},
author = {KOSTA E.},
url = {https://ssrn.com/abstract=2675803},
year = {2013},
date = {2013-00-00},
journal = {Scripted},
volume = {10},
number = {3},
pages = {339-363},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
VAN ALSENOY B. KOSTA E., DUMORTIER J Privacy notices versus informational self-determination: Minding the gap Journal Article International Review of Law, Computers & Technology, 28 (2), pp. 185-203, 2013. Links | BibTeX @article{B.2013,
title = {Privacy notices versus informational self-determination: Minding the gap},
author = {VAN ALSENOY B., KOSTA E., DUMORTIER J.},
doi = {10.1080/13600869.2013.812594},
year = {2013},
date = {2013-00-00},
journal = {International Review of Law, Computers & Technology},
volume = {28},
number = {2},
pages = {185-203},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
E., KOSTA Peeking into the cookie jar: the European approach towards the regulation of cookies Journal Article International Journal of law and information technology, 21 (4), pp. 380-406, 2013. Links | BibTeX @article{E.2013c,
title = {Peeking into the cookie jar: the European approach towards the regulation of cookies},
author = {KOSTA E.},
url = {https://ssrn.com/abstract=2675810},
doi = {10.1093/ijlit/eat011},
year = {2013},
date = {2013-00-00},
journal = {International Journal of law and information technology},
volume = {21},
number = {4},
pages = {380-406},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2012
|
KARDARA M. FUCHS O., KOSTA AISOPOS SPAIS & VARVARIGOU E F I T Policy testing in virtual environments – addressing technical and legal challenges Journal Article International Journal of Electronic Government Research, 8 (3), pp. 1-21, 2012. Links | BibTeX @article{M.2012,
title = {Policy testing in virtual environments – addressing technical and legal challenges},
author = {KARDARA M., FUCHS O., KOSTA E., AISOPOS F., SPAIS I. & VARVARIGOU T.},
doi = {10.4018/jegr.2012070101},
year = {2012},
date = {2012-00-00},
journal = {International Journal of Electronic Government Research},
volume = {8},
number = {3},
pages = {1-21},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2011
|
TRONCOSO C. DANEZIS G., KOSTA BALASCH & PRENEEL PriPAYD E J B Privacy Friendly Pay-As-You-Drive Insurance Journal Article IEEE Transactions on Dependable and Secure Computing,, 8 (5), pp. 743-755 , 2011, (indexed in Thomson’s ISI Web of Knowledge). Links | BibTeX @article{C.2011,
title = {Privacy Friendly Pay-As-You-Drive Insurance},
author = {TRONCOSO C., DANEZIS G., KOSTA E., BALASCH J. & PRENEEL B., PriPAYD},
doi = {10.1109/TDSC.2010.71},
year = {2011},
date = {2011-00-00},
journal = {IEEE Transactions on Dependable and Secure Computing,},
volume = {8},
number = {5},
pages = {743-755 },
note = {indexed in Thomson’s ISI Web of Knowledge},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
D., KOSTA & BOWMAN E Treating or Tracking? Regulatory Challenges of Nano-Enabled ICT Implants Journal Article Law & Policy, 33 (2), pp. 256-275 , 2011, (indexed in Thomson’s Social Sciences Citation Index). Links | BibTeX @article{D.2011,
title = {Treating or Tracking? Regulatory Challenges of Nano-Enabled ICT Implants},
author = {KOSTA E. & BOWMAN D.},
doi = {10.1111/j.1467-9930.2010.00338.x},
year = {2011},
date = {2011-00-00},
journal = {Law & Policy},
volume = {33},
number = {2},
pages = {256-275 },
note = {indexed in Thomson’s Social Sciences Citation Index},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
GASSON M. KOSTA E., ROYER MEINTS & WARWICK D M K Normality Mining: Privacy Implications of Behavioral Profiles Drawn from GPS Enabled Mobile Phones Journal Article IEEE Transactions on Systems, Man, and Cybernetics--Part C: Applications and Reviews , 41 (2), pp. 251-261, 2011, (indexed in Thomson’s ISI Web of Knowledge). Links | BibTeX @article{M.2011,
title = {Normality Mining: Privacy Implications of Behavioral Profiles Drawn from GPS Enabled Mobile Phones},
author = {GASSON M., KOSTA E., ROYER D., MEINTS M. & WARWICK K.},
doi = {10.1109/TSMCC.2010.2071381},
year = {2011},
date = {2011-00-00},
journal = {IEEE Transactions on Systems, Man, and Cybernetics--Part C: Applications and Reviews },
volume = {41},
number = {2},
pages = {251-261},
note = {indexed in Thomson’s ISI Web of Knowledge},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
KOSTA E. KALLONIATIS Ch., MITROU & KAVAKLI L E The “Panopticon” of Search Engines: The Response of the European Data Protection Framework Journal Article Requirements Engineering, 16 , pp. 47-54, 2011, (indexed in Thomson’s ISI Web of Knowledge). BibTeX @article{E.2011,
title = {The “Panopticon” of Search Engines: The Response of the European Data Protection Framework},
author = {KOSTA E., KALLONIATIS Ch., MITROU L. & KAVAKLI E.},
year = {2011},
date = {2011-00-00},
journal = {Requirements Engineering},
volume = {16},
pages = {47-54},
note = {indexed in Thomson’s ISI Web of Knowledge},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2010
|
KOSTA E. KALLONIATIS Ch., MITROU & GRITZALIS L S Data protection issues pertaining to social networking under EU law Journal Article Transforming Government: People, Process, and Policy journal, 4 (2), pp. 193-201, 2010. Links | BibTeX @article{E.2010,
title = {Data protection issues pertaining to social networking under EU law},
author = {KOSTA E., KALLONIATIS Ch., MITROU L. & GRITZALIS S.},
doi = {10.1108/17506161011047406},
year = {2010},
date = {2010-00-00},
journal = {Transforming Government: People, Process, and Policy journal},
volume = {4},
number = {2},
pages = {193-201},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
KOSTA E. PITKÄNEN O., NIEMELÄ & KAASINEN M E Mobile-centric Ambient Intelligence in Health- and Homecare - Anticipating Ethical and Legal Challenges Journal Article Science and Engineering Ethics, 16 (2), pp. 303-323, 2010, (indexed in Thomson’s ISI Web of Knowledge – Social Sciences). Links | BibTeX @article{E.2010b,
title = {Mobile-centric Ambient Intelligence in Health- and Homecare - Anticipating Ethical and Legal Challenges},
author = {KOSTA E., PITKÄNEN O., NIEMELÄ M. & KAASINEN E.},
doi = {10.1007/s11948-009-9150-5},
year = {2010},
date = {2010-00-00},
journal = {Science and Engineering Ethics},
volume = {16},
number = {2},
pages = {303-323},
note = {indexed in Thomson’s ISI Web of Knowledge – Social Sciences},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2009
|
KOSTA E., VALCKE & STEVENS P D ‘Spam, spam, spam, spam…Lovely spam!’ Why is Bluespam different? Journal Article International Review of Law Computers & Technology, 23 (1-2), pp. 89-97, 2009. Links | BibTeX @article{E.2009,
title = {‘Spam, spam, spam, spam…Lovely spam!’ Why is Bluespam different?},
author = {KOSTA E., VALCKE P. & STEVENS D},
doi = {10.1080/13600860902742513},
year = {2009},
date = {2009-00-00},
journal = {International Review of Law Computers & Technology},
volume = {23},
number = {1-2},
pages = {89-97},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
DIAZ C. KOSTA E., DEKEYSER KOHLWEISS & NIGUSSE H M G Privacy preserving electronic petitions Journal Article IDIS Journal, 1 (1), pp. 203-219, 2009. Links | BibTeX @article{C.2009,
title = {Privacy preserving electronic petitions},
author = {DIAZ C., KOSTA E., DEKEYSER H., KOHLWEISS M. & NIGUSSE G.},
url = {https://www.researchgate.net/publication/225256179_Privacy_preserving_electronic_petitions},
doi = {10.1007/s12394-009-0012-8},
year = {2009},
date = {2009-00-00},
journal = {IDIS Journal},
volume = {1},
number = {1},
pages = {203-219},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2008
|
P., KOSTA & VALCKE E The promise and peril of ICT implants: setting the legal framework Journal Article The Journal of The Institute of Telecommunications Professionals, 2 (4), pp. 35-38, 2008, (indexed in Thomson’s ISI Web of Knowledge). BibTeX @article{P.2008,
title = {The promise and peril of ICT implants: setting the legal framework},
author = {KOSTA E. & VALCKE P.},
year = {2008},
date = {2008-00-00},
journal = {The Journal of The Institute of Telecommunications Professionals},
volume = {2},
number = {4},
pages = {35-38},
note = {indexed in Thomson’s ISI Web of Knowledge},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
VALCKE P. HOU L., STEVENS & KOSTA D E Guardian Knight or Hands Off: The European response to Network Neutrality – Legal considerations on the electronic communications reform Journal Article Communications & Strategies, 72 (4), pp. 89-112, 2008. Links | BibTeX @article{P.2008b,
title = {Guardian Knight or Hands Off: The European response to Network Neutrality – Legal considerations on the electronic communications reform},
author = {VALCKE P., HOU L., STEVENS D. & KOSTA E.},
url = {https://ssrn.com/abstract=1374322},
year = {2008},
date = {2008-00-00},
journal = {Communications & Strategies},
volume = {72},
number = {4},
pages = {89-112},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
J., KOSTA & DUMORTIER E Searching the man behind the tag: privacy implications of RFID technology Journal Article International Journal of Intellectual Property Management (IJIPM), 2 (3), pp. 276-288, 2008, (Special Issue on: “Identity, Privacy and New Technologies”). Links | BibTeX @article{J.2008,
title = {Searching the man behind the tag: privacy implications of RFID technology},
author = {KOSTA E. & DUMORTIER J.},
doi = {10.1504/IJIPM.2008.021141},
year = {2008},
date = {2008-00-00},
journal = {International Journal of Intellectual Property Management (IJIPM)},
volume = {2},
number = {3},
pages = {276-288},
note = {Special Issue on: “Identity, Privacy and New Technologies”},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
KOSTA E. ZIBUSCHKA J., SCHERNER & DUMORTIER T J Privacy issues in location based services - Legal considerations on privacy-enhancing Location Based Services using PRIME technology Journal Article Computer Law and Security Report, 24 (2), pp. 139-146, 2008. Links | BibTeX @article{E.2008,
title = {Privacy issues in location based services - Legal considerations on privacy-enhancing Location Based Services using PRIME technology},
author = {KOSTA E., ZIBUSCHKA J., SCHERNER T. & DUMORTIER J.},
doi = {10.1016/j.clsr.2008.01.006},
year = {2008},
date = {2008-00-00},
journal = {Computer Law and Security Report},
volume = {24},
number = {2},
pages = {139-146},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2007
|
J., KOSTA & DUMORTIER E The data retention directive and the principles of European data protection legislation Journal Article Medien und Recht International, 3 , pp. 130-136, 2007. BibTeX @article{J.2007,
title = {The data retention directive and the principles of European data protection legislation},
author = {KOSTA E. & DUMORTIER J.},
year = {2007},
date = {2007-00-00},
journal = {Medien und Recht International},
volume = {3},
pages = {130-136},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
KOSTA E., COUDERT & DUMORTIER F J Data protection in the third pillar: in the aftermath of the ECJ decision on PNR data and the data retention directive Journal Article International Review of Law Computers & Technology, 21 (3), pp. 343-358, 2007. Links | BibTeX @article{E.2007,
title = {Data protection in the third pillar: in the aftermath of the ECJ decision on PNR data and the data retention directive},
author = {KOSTA E., COUDERT F. & DUMORTIER J.},
doi = {10.1080/13600860701701728},
year = {2007},
date = {2007-00-00},
journal = {International Review of Law Computers & Technology},
volume = {21},
number = {3},
pages = {343-358},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|
2006
|
P., KOSTA & VALCKE E Retaining the data retention directive Journal Article Computer Law & Security Report, 22 (5), pp. 370-380, 2006. Links | BibTeX @article{P.2006,
title = {Retaining the data retention directive},
author = {KOSTA E. & VALCKE P.},
url = {https://ssrn.com/abstract=2675799},
doi = {10.1016/j.clsr.2006.07.002},
year = {2006},
date = {2006-00-00},
journal = {Computer Law & Security Report},
volume = {22},
number = {5},
pages = {370-380},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
|