Our Team

Daniel Dimov

Daniel Dimov, LLB, LLM, PhD

Rasa Juzenaite, MA











For Daniel’s full CV, please click here.

For Rasa’s full CV, please click here.



(in English, Dutch, and Bulgarian)


Dimov, D. V., ‘Voluntary agreements on blocking are interfering with human rights’, European Digital Rights (EDRi), Brussels, Belgium, 27 July 2011. Available at: http://www.edri.org/edrigram/number9.15/voluntary-blocking-interfere-human-rights.

Dimov, D.V. and McNamee, J., ‘Draft Council conclusions on Net Neutrality’, European Digital Rights (EDRi), Brussels, Belgium, 27 July 2011. Available at: http://www.edri.org/edrigram/number9.15/net-neutrality-council-conclusions.

Dimov, D.V., ‘EP study on ‘Consumer Behaviour in a Digital Environment’, European Digital Rights (EDRi), Brussels, Belgium, 7 September 2011. Available at: http://www.edri.org/edrigram/number9.17/consumer-behaviour-digital-environment.

Dimov, D.V. and Bradwell, P., ‘New rules on term of protection of music recordings’, European Digital Rights (EDRi), Brussels, Belgium, 21 September 2011. Available at: http://www.edri.org/edrigram/number9.18/term-extension-music-copyright.

McNamee J., Fiedler, K., Humeau, M., Dimov, D.V., ‘EU Surveillance: A summary of current EU surveillance and security measures’ (booklet), European Digital Rights (EDRi), http://www.statewatch.org/news/2012/jan/eu-surveillance-edri.pdf

Dimov, D.V. and Van den Herik, J., ‘Използване на краудсоурсинг за разрешаване на спорове’, Bulgarian Legal World Magazine, 22 June 2012. Available at http://www.legalworld.bg/show.php?storyid=27076 .

Dimov, D.V., ‘Legal and Technological Concerns Regarding the Use of BIOS Anti-theft Technologies’, InfoSec Institute, 31 October 2012. Available at http://resources.infosecinstitute.com/bios-anti-theft-technologies/ .

Dimov, D.V., ‘Domain theft and the possibilities for recovery of the stolen domain names’, InfoSec Institute, 3 December 2012. Available at http://resources.infosecinstitute.com/domain-theft-stolen-domain/ .

Dimov, D.V., ‘Differences in Copyright Enforcement between the U.S. and China’, InfoSec Institute, 17 December 2012. Available at http://resources.infosecinstitute.com/copyright-enforcement-the-u-s-and-china/ .

Dimov, D.V., ‘Domain name parking of gTLDs’, InfoSec Institute, 3 January 2013. Available at http://resources.infosecinstitute.com/domain-name-parking-gtlds/ .

Dimov, D.V., ‘Differences between the privacy laws in the EU and the US’, InfoSec Institute, 10 January 2013. Available at http://resources.infosecinstitute.com/differences-privacy-laws-in-eu-and-us/ .

Dimov, D.V., ‘Identity Theft: The Means, Methods and Recourse’, 14 January 2013. Available at http://resources.infosecinstitute.com/identity-theft-means-methods-recourse/ .

Dimov, D.V.,‘Restricting social media at work’, InfoSec Institute, 25 January 2013. Available at http://resources.infosecinstitute.com/restricting-social-media-at-work/ .

Dimov, D.V., ‘Using Crowdsourcing for Collecting Information about Security Vulnerabilities’, InfoSec Institute, 5 February 2013. Available at http://resources.infosecinstitute.com/crowdsourcing-for-collecting-information-security-vulnerabilities/ .

Dimov, D.V., ‘Mobile Phone Spying Software: Legality, Symptoms, and Removal’, InfoSec Institute, 8 March 2013. Available at http://resources.infosecinstitute.com/mobile-phone-spying-software-legality-symptoms-and-removal/ .

Dimov, D.V., ‘Legal Aspects of Online Gambling’, InfoSec Institute, 13 March 2013. Available at http://resources.infosecinstitute.com/legal-aspects-of-online-gambling/ .

Dimov, D.V., ‘Software Patent Law: EU, New Zealand, and the US compared’, InfoSec Institute, 19 April 2013. Available at http://resources.infosecinstitute.com/software-patent-law-eu-new-zealand-and-the-us-compared/ .

Dimov, D.V., ‘E-Money Fraud’, InfoSec Institute, 9 May 2013. Available at http://resources.infosecinstitute.com/e-money-fraud/ .

Dimov, D.V., ‘PayPal: Chargebacks and Dispute Resolution’, InfoSec Institute, 23 May 2013. Available at http://resources.infosecinstitute.com/paypal-chargebacks-and-dispute-resolution/ .

Dimov, D.V., ‘Privacy Implications of Google Glass’, InfoSec Institute, 13 June 2013. Available at http://resources.infosecinstitute.com/privacy-implications-of-google-glass/ .

Dimov, D.V., ‘The new Google Maps: a perfect place for review fraud’, InfoSec Institute, 19 June 2013. Available at http://resources.infosecinstitute.com/the-new-google-maps-a-perfect-place-for-review-fraud/ .

Dimov, D.V., ‘Privacy Implications of the Internet of Things,’ InfoSec Institute, 14 November 2013. Available at http://resources.infosecinstitute.com/privacy-implications-internet-things/ .

Dimov, D.V., ‘The Debate Over Network Neutrality in the EU and the USA,’ InfoSec Institute, 11 February 2014. Available at http://resources.infosecinstitute.com/debate-network-neutrality-eu-usa/ .

Dimov, D.V., ‘Ten Important Privacy Threats,’ InfoSec Institute, 18 February 2014. Available at http://resources.infosecinstitute.com/ten-important-privacy-threats/ .

Dimov, D.V., ‘Human-implanted RFID chips,’ InfoSec Institute, 17 April 2014. Available at http://resources.infosecinstitute.com/human-implanted-rfid-chips/ .

Dimov, D.V., ‘Crowdsensing: State of the Art and Privacy Aspects,’ InfoSec Institute, 29 July 2014. Available at http://resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/ .

Dimov, D.V., ‘Privacy Risks of Sleep-Tracking Devices,’ InfoSec Institute, 12 September 2014. Available at http://resources.infosecinstitute.com/privacy-risks-sleep-tracking-devices/ .

Dimov, D.V., ‘Information Security of Nanorobots,’ InfoSec Institute, 14 October 2014. Available at http://resources.infosecinstitute.com/information-security-nanorobots/ .

Dimov, D.V., ‘Chinese Social Media Censorship,’ InfoSec Institute, 15 October 2014. Available at http://resources.infosecinstitute.com/chinese-social-media-censorship/ .

Dimov, D.V., ‘Cyber Attack Protection via Crowdsourcing,’ InfoSec Institute, 23 October 2014. Available at http://resources.infosecinstitute.com/cyber-attack-protection-via-crowdsourcing/ .

Dimov, D.V., ‘Privacy Risks of Beacons,’ InfoSec Institute, 8 December 2014. Available at http://resources.infosecinstitute.com/privacy-risks-beacons/ .

Dimov, D.V., ‘Legality of Jailbreaking Mobile Phones,’ InfoSec Institute, 16 December 2014. Available at http://resources.infosecinstitute.com/legality-jailbreaking-mobile-phones/ .

Dimov, D.V., ‘Information Security Vulnerabilities of Automobiles,’ InfoSec Institute, 13 January 2015. Available at http://resources.infosecinstitute.com/information-security-vulnerabilities-automobiles/ .

Dimov, D.V., ‘What US Companies Need to Know about EU Privacy Laws,’ InfoSec Institute, 2 February 2015. Available at http://resources.infosecinstitute.com/us-companies-need-know-eu-privacy-laws/ .

Dimov, D.V., ‘Legality of Electronic Signatures in the EU and the US,’ InfoSec Institute, 5 March 2015. Available at http://resources.infosecinstitute.com/legality-electronic-signatures-eu-us/ .

Dimov, D.V., ‘Side Effects of the New US Net Neutrality Rules,’ InfoSec Institute, 16 April 2015. Available at http://resources.infosecinstitute.com/side-effects-of-the-new-us-net-neutrality-rules/ .

Dimov, D.V., ‘How to Prevent a Domain Name Theft,’ InfoSec Institute, 19 June 2015. Available at http://resources.infosecinstitute.com/how-to-prevent-a-domain-name-theft/ .

Dimov, D.V., ‘How to Deal with Reverse Domain Name Hijacking,’ InfoSec Institute, 6 July 2015. Available at http://resources.infosecinstitute.com/how-to-deal-with-reverse-domain-name-hijacking/ .

Juzenaite, R., Dimov, D.V., ‘The Most Hacker-Active Countries – Part I,’ InfoSec Institute, 5 August 2015. Available at http://resources.infosecinstitute.com/the-most-hacker-active-countries-part-i/ .
Academic publications

Juzenaite, R., Dimov, D.V., ‘The Most Hacker-Active Countries – Part II,’ InfoSec Institute, 19 August 2015. Available at http://resources.infosecinstitute.com/the-most-hacker-active-countries-part-ii/ .

Juzenaite, R., Dimov, D.V., ‘How Security Awareness Can Prevent Romance Fraud,’ InfoSec Institute, 4 September 2015. Available at http://resources.infosecinstitute.com/how-security-awareness-can-prevent-romance-fraud/ .

Juzenaite, R., Dimov, D.V., ‘Crowdsourcing Cybersecurity: How to Raise Security Awareness Through Crowdsourcing,’ InfoSec Institute, 22 September 2015. Available at http://resources.infosecinstitute.com/crowdsourcing-cybersecurity-how-to-raise-security-awareness-through-crowdsourcing/ .

Juzenaite, R., Dimov, D.V., ‘Online Rental Scams,’ InfoSec Institute, 29 September 2015. Available at http://resources.infosecinstitute.com/online-rental-scams/ .

Juzenaite, R., Dimov, D.V., ‘Top 5 Snapchat Security Vulnerabilities,’ InfoSec Institute, 1 October 2015. Available at http://resources.infosecinstitute.com/top-5-snapchat-security-vulnerabilities-how-the-app-learned-its-lessons/ .

Juzenaite, R., Dimov, D.V., ‘Top 7 Types of Hacking Tutorials on YouTube,’ InfoSec Institute, 5 October 2015. Available at http://resources.infosecinstitute.com/top-7-types-of-hacking-tutorials-on-youtube/ .

Juzenaite, R., Dimov, D.V., ‘Smartwatch – A Fashionable and Dangerous Gadget,’ InfoSec Institute, 22 October 2015. Available at http://resources.infosecinstitute.com/smartwatch-a-fashionable-and-dangerous-gadget-10-tips-to-protect-your-smartwatch/ .

Juzenaite, R., Dimov, D.V., ‘Interplanetary Hacking: How the space industry mitigates cyber-threats,’ InfoSec Institute, 27 October 2015. Available at http://resources.infosecinstitute.com/interplanetary-hacking-how-the-space-industry-mitigates-cyber-threats/ .

Juzenaite, R., Dimov, D.V., ‘Password Security: Efficient Protection of Digital Identities,’ InfoSec Institute, 30 October 2015. Available at http://resources.infosecinstitute.com/password-security-efficient-protection-of-digital-identities/ .

Dimov, D.V.,  Juzenaite, R., ‘The Most Popular Social Network Phishing Schemes,’ InfoSec Institute, 10 November 2015. Available at http://resources.infosecinstitute.com/password-security-efficient-protection-of-digital-identities/ .

Juzenaite, R., Dimov, D.V., ‘Security Vulnerabilities of Voice Recognition Technologies’, InfoSec Institute, 7 December 2015. Available at http://resources.infosecinstitute.com/security-vulnerabilities-of-voice-recognition-technologies/ .

Dimov, D.V., Juzenaite, R., ‘Budgeting for Security Awareness: Who – What – When – Where – Why – How much’, InfoSec Institute, 10 December 2015. Available at http://resources.infosecinstitute.com/budgeting-for-security-awareness-who-what-when-where-why-how-much/ .

Dimov, D.V., Juzenaite, R., ‘Attacks on Hotel Wi-Fi Networks’, InfoSec Institute, 11 December 2015. Available at http://resources.infosecinstitute.com/attacks-on-hotel-wi-fi-networks/ .

Dimov, D.V., Juzenaite, R., ‘Phishing Attacks Using Public Data’, InfoSec Institute, 6 January 2016. Available at http://resources.infosecinstitute.com/phishing-attacks-using-public-data/ .

Dimov, D.V., Juzenaite, R., ‘Legal Issues of New and Emerging Technologies’, InfoSec Institute, 3 February 2016. Available at http://resources.infosecinstitute.com/legal-issues-of-new-and-emerging-technologies/ .

Dimov, D.V., Juzenaite, R., ‘Security Vulnerabilities of Internet-Connected Homes’, InfoSec Institute, 30 March 2016. Available at http://resources.infosecinstitute.com/security-vulnerabilities-of-internet-connected-homes/ .

Dimov, D.V., Juzenaite, R., ‘Tax-Evasion Hacks’, InfoSec Institute, 19 April 2016. Available at http://resources.infosecinstitute.com/tax-evasion-hacks/ .

Dimov, D.V., Juzenaite, R., ‘Information Security Vulnerabilities of Trains’, InfoSec Institute, 25 April 2016. Available at http://resources.infosecinstitute.com/information-security-vulnerabilities-of-trains/ .

Dimov, D.V., Juzenaite, R., ‘Healthcare Hacking’, InfoSec Institute, 25 April 2016. Available at http://resources.infosecinstitute.com/healthcare-hacking/ .

Dimov, D.V., Juzenaite, R., ‘The FBI Has New Hacking Powers’, InfoSec Institute, 25 April 2016. Available at http://resources.infosecinstitute.com/the-fbi-has-new-hacking-powers/ .

Dimov, D.V., Juzenaite, R., ‘New Wave of Cyber-attacks on Banks’, InfoSec Institute, 9 June 2016. Available at http://resources.infosecinstitute.com/new-wave-of-cyber-attacks-on-banks/ .

Dimov, D.V., Juzenaite, R., ‘Pornbots – Sexual Barbies of the Future’, InfoSec Institute, 20 June 2016. Available at http://resources.infosecinstitute.com/pornbots-sexual-barbies-of-the-future/ .

Dimov, D.V., Juzenaite, R., ‘Ransomware Attacks on Law Firms’, InfoSec Institute, 11 July 2016. Available at http://resources.infosecinstitute.com/ransomware-attacks-on-law-firms/ .

Dimov, D.V., Juzenaite, R., ‘Hacking Facebook Accounts’, InfoSec Institute, 22 July 2016. Available at http://resources.infosecinstitute.com/hacking-facebook-accounts/ .

Dimov, D.V., Juzenaite, R., ‘Privacy Concerns about Pokémon GO’, InfoSec Institute, 1 August 2016. Available at http://resources.infosecinstitute.com/privacy-concerns-about-pokemon-go/ .

Dimov, D.V., Juzenaite, R., ‘Security of Smart Contracts’, InfoSec Institute, 17 August 2016. Available at http://resources.infosecinstitute.com/security-smart-contracts/ .

Dimov, D.V., Juzenaite, R., ‘The End of Bitcoin Ransomware?’, InfoSec Institute, 14 October 2016. Available at http://resources.infosecinstitute.com/the-end-of-bitcoin-ransomware/ .

Dimov, D.V., Juzenaite, R., ‘Technologies for Conducting Privacy Compliance Assessments’, InfoSec Institute, 17 October 2016. Available at http://resources.infosecinstitute.com/technologies-for-conducting-privacy-compliance-assessments/ .

Juzenaite, R., Dimov, D.V., ‘Latest Trends in Cybersquatting,’ InfoSec Institute, 11 January 2017. Available at http://resources.infosecinstitute.com/latest-trends-in-cybersquatting/ .

Juzenaite, R., Dimov, D.V., ‘Insurance Against Ransomware Threats,’ InfoSec Institute, 24 February 2017. Available at http://resources.infosecinstitute.com/insurance-ransomware-threats/ .

Juzenaite, R., Dimov, D.V., ‘Security Concerns of Flying Motorcycles,’ InfoSec Institute, 7 April 2017. Available at http://resources.infosecinstitute.com/security-concerns-flying-motorcycles/ .

Dimov, D.V., Juzenaite, R., ‘Why Was Wanacrypt0r 2.0 So Successful?’, InfoSec Institute, 22 May 2017. Available at http://resources.infosecinstitute.com/wanacrypt0r-2-0-successful/ .

Dimov, D.V., Juzenaite, R., ‘Risks and Benefits of Security Policy Templates’, InfoSec Institute, 24 May 2017. Available at http://resources.infosecinstitute.com/risks-benefits-security-policy-templates/ .

Juzenaite, R., Dimov, D.V., ‘Security Risks of Smart E-cigarettes’, InfoSec Institute, 26 May 2017. Available at http://resources.infosecinstitute.com/security-risks-smart-e-cigarettes/.


Academic publications

Van den Herik, J., Dimov, D.V., ‘Towards Crowdsourced Online Dispute Resolution’, Law Across Nations: Governance, Policy & Statutes, Kierkegaard, S. (Ed.), Kierkegaard, P. (Assoc. Ed.), International Association of IT Lawyers (IAITL), 19 September 2011, pp. 244 – 257. Available at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1933392

Van den Herik, J., Dimov, D.V., ‘Can eBay’s Community Review Forum fairly resolve disputes?’, BNAIC proceedings, the 23rd Benelux Conference on Artificial Intelligence (BNAIC 2011), 3 November 2011.

Van den Herik, J., Dimov, D.V., ‘Een Crowdsourcing Model voor eBay’, in ‘Samen Slimmer: Hoe de ‘wisdom of crowds’ onze samenleving zal veranderen’, Kreijveld, M. (Ed.), Stichting Toekomstbeeld der Techniek, April 2012.

Van den Herik, J., Dimov, D.V., ‘Geschilbeslechting door crowdsourcing’, Tijdschrift conflicthantering, 11 October 2012.

Van den Herik, J., Levy, D., Plaat, A., Dimov, D.V., ‘Plagiarism in Game Programming Competitions’, Entertainment Computing, Volume 5, Issue 3, August 2014. Available at http://www.sciencedirect.com/science/article/pii/S1875952114000093 .

Dimov, D.V., ‘Crowdsourced Online Dispute Resolution’, E.M. Meijers Instituut, 2017.

Other publications

53 summaries of competition law decisions /1-2 A4 pages per summary/ published at www.caselex.com .

18 summaries of Bulgarian case law with EU relevance published at www.caselex.com .

Reports published in the Intranet of the European Commission.