After a successful PhD defence in Leiden, the Netherlands.

At the office.

With Rod Beckstrom (on the left), former president of ICANN, at the ICANN meeting in Prague.

Blog

Is Kleros a Fair Dispute Resolution System?

Kleros' approach to arbitration is radically different to traditional court systems and alternative dispute resolution methods. Relying on cryptoeconomics, it provides crowdsourced jurors the incentive to arbitrate on various types of disputes. The entire article is available here....
Read more 0

GDPR Trolls

Patent trolls are not a new phenomenon. They buy patents for the sole purpose of extorting and suing companies. Since patent-related litigation proceedings are complex and time-consuming, the fees for defending a patent claim in court proceedings may exceed one million U.S. dollars. Therefore, many legitimate companies (especially startups) prefer to pay the requested settlement fees instead of defending their rights. According to CNN, just within the period 1990 – 2010, patent trolls cost investors 500 billion U.S. dollars. Patent trolls can target a limited scope...
Read more 0

Consequences of the Late Announcement of Cyber-security Incidents

Cyber-security attacks that are becoming more and more common among various types and sizes of organizations may have serious effects on electronic communication networks, provision of services, and national security. Although significant breaches that affect many users or extensively disrupt the functioning of an organization usually receive extensive media coverage, smaller security incidents may remain unreported to the public. This can occur because of several reasons. For example, the affected organization may become aware of the incident later, it considers the incident insignificant (e.g.,...
Read more 0

Tips for Drafting Efficient Employee Information Security Policies

Employee information security policies impose obligations on employees of organizations which aim to reduce the risks of cyber-attacks. Such policies usually contain instructions on how to choose strong passwords, apply patches and updates, detect phishing schemes, protect sensitive information, and respond to information security incidents. There is an abundance of online materials about how to draft a comprehensive employee information security policy. However, many of those materials do not address the disadvantages of such policies. The purpose of this article is to provide tips on...
Read more 0

The Future of Information Security

In this article, we look at the current trends in the field of information security and present speculations as to what the future of the field would be. It should be noted that unpredicted emergence of disrupting innovations may radically change the existing information security landscape. Nevertheless, we may reasonably expect that the future of cybersecurity will be dominated by four trends, namely, use of Blockchain technologies (Section 2), expanding the role of artificial intelligence (Section 3), harnessing the wisdom of the crowd (Section...
Read more 0

US-Russia Cyber-Security Unit: Future Reality or Pipe Dream

On 9th of July 2017, the President of the United States, Donald Trump, published the following tweet: “Putin & I discussed forming an impenetrable Cyber-security unit so that election hacking, & many other negative things, will be guarded.” One day later, President Trump published a tweet which poured cold water over the enthusiastic idea about an “impenetrable Cyber-security Unit.” More specifically, the tweet stated: “The fact that President Putin and I discussed a cyber-security unit doesn’t mean I think it can happen. It can’t-but a...
Read more 0

Cybersecurity as an ethical obligation

An ethical obligation is a standard that defines a moral course of action. Many professions are subject to comprehensive sets of ethical obligations which, if violated, may lead to sanctions. For example, the Code of Medical Ethics adopted by the American Medical Association sets forth the values to which every physician commits himself/herself as a member of the medical profession. The State Bar of California has issued advisory opinions regarding the ethicality of hypothetical attorney conduct. The advisory opinions cover ethicality of attorney blogging,...
Read more 0

US Regions Most Vulnerable to a Cyber Attack

In December 2016, the Identity Theft Resource Center published a report indicating the top 10 cyber-risk vulnerable U.S. regions. The ten regions (ordered from high to low level of vulnerability) are as follows: (i) Washington, D.C.; (ii) California; (iii) Florida; (iv) Massachusetts; (v) Nevada; (vi) Illinois; (vii) Texas; (viii) Michigan; (ix) Missouri; and (x) Connecticut. In the following sections, we examine the possible reasons for the inclusion of each of these ten regions in the rank list. In the end, we provide concluding remarks. The...
Read more 0

Malware-as-a-service

In May 2017, a new form of ransomware called WannaCry affected more than 230,000 personal and business computers in over 150 countries. The ransomware affected organizations, such as Deutsche Bahn AG (a German railway company), NHS Scotland (the publicly funded healthcare system in Scotland), National Health Service of England, Saudi Telecom Company, and FedEx (an international courier delivery services company). The ransomware attack is now estimated to be one of the largest global security incidents in the history of the Web. The full article is...
Read more 0

PhD Defence

Daniel will defend his PhD dissertation on 27th of June 2017. The dissertation aims to examine whether Crowdsourced Online Dispute Resolution (CODR) can fairly resolve disputes. First, it provides a framework of CODR, analyses the differences between CODR and other dispute resolution schemes, and constructs an interpretation of procedural fairness that merges objective and subjective procedural fairness. Second, the dissertation investigates whether the current CODR procedures are fair and proposes a model of a CODR procedure that complies with the interpretation of procedural fairness. For...
Read more 0