You are here: Dissemination > Publications




[23] Tschersich, M.; Kahl, C.; Heim, S.; Crane, S.; Böttcher, K.; Krontiris, I.; Rannenberg, K. (2011) Towards Privacy-enhanced Mobile Communities - Architecture, Concepts and User Trials. In: Journal of Systems and Software, Special Issue: Mobile Applications (JSS-D-11-00155R1). Elsevier, 2011. (

[22] Kahl, Christian; Crane, Stephen; Tschersich, Markus; Rannenberg, Kai (2011) Profit vs. Privacy - Advanced Targeted Advertising for Social Networks. In: The 6th Mediterranean Conference on Information Systems (MCIS 2011) (Proceedings), 2011.

[21] Kosta, E. (2011) Book chapter on Location privacy, in “‘Geographic data and the law: opportunities, challenges and pitfalls”, ed. K. Janssen, J. Crompvoets, Leuven University Press (forthcoming, 2011)

[20] Kosta, E. (2011) Unravelling consent in European data protection legislation – a prospective study on consent in electronic communications, Doctoral Thesis, Faculty of Laws, Katholieke Universiteit Leuven, Belgium, supervised by Prof. Jos Dumortier (co-supervisor Prof. Peggy Valcke), defended on 01.06.2011

[19] Gasson, M.; Kosta, E.; Royer D., Meints, M.; & Warwick, K. (2011) Normality Mining: Privacy Implications of Behavioral Profiles Drawn from GPS Enabled Mobile Phones, IEEE Transactions on Systems, Man, and Cybernetics--Part C: Applications and Reviews, Vol.41(2), p. 251-261, IEEE.

[18] Kahl, Christian; Crane, Stephen; Tschersich, Markus; Rannenberg, Kai (2011) Privacy respecting targeted advertising for social networks, In: Workshop in Information Security Theory and Practice (WISTP 11) - 5th Edition - Proceedings, 1-3 June 2011, Heraklion, Greece, Springer (2011).

[17] Kosta, E.; Kalloniatis, Ch.; Mitrou, L. & Kavakli, E. (2011) The “Panopticon” of Search Engines: The Response of the European Data Protection Framework, Requirements Engineering, Vol.16, p. 47-54, Springer.


[16] Kosta, E.; Kallionatis, Ch.; Mitrou, L. & Gritzalis, S. (2010) Data protection issues pertaining to social networking under EU law, Transforming Government: People, Process, and Policy journal, 4(2) (2010), pp.193-201, Emerald.

[15] Kahl, Christian; Böttcher, Katja; Tschersich, Markus; Heim, Stephan; Rannenberg, Kai:
"Enhanced Privacy and Identity Management for Community Services – Demo of the PICOS project". In: Di Nitto, Elisabetta; Yahyapour, Ramin (Eds.): Towards a Service-Based Internet - Third European Conference, ServiceWave 2010 (Proceedings), Ghent, Belgium, December 13-15, 2010. ISBN: 978-3-642-17693-7. Springer 2010.

[14] Vivas, J. L.; Agudo, I.; Lopez, J.: "A methodology for security assurance-driven system development", In: Requirements Engineering, pp. 1-19, 2010. (

[13] Kahl, Christian; Boettcher, Katja; Tschersich, Markus; Heim, Stephan; Rannenberg, Kai: "How to enhance Privacy and Identity Management for Mobile Communities: Approach and User driven Concepts of the PICOS Project". In: Proceedings of 25th IFIP International Information Security Conference Security & Privacy − Silver Linings in the Cloud (IFIP SEC 2010). ISBN: 978-3-642-15256-6. Springer (2010)
[Download (pdf)]

[12] Rannenberg, K.; Kahl, C.; Böttcher, K.: "Communities,
Mobilität und Datenschutz - Innovative Konzepte zum Schutz der Privatsphäre im Projekt PICOS
". In: Forschung Frankfurt 1.2010, Goethe Universität Frankfurt, 2010. (Available online, german only)

[11] Kosta E. (2010) The Freddi Staurs of Social Networking – A legal approach, in Bezzi, M.; Duquenoy, P.; Fischer-Hübner, S.; Hansen, M. & Zhang, G. (Eds.): Privacy and Identity, IFIP AICT 320, Revised selected papers from the IFIP/PrimeLife Summer School 2009, pp. 66–74, 2010 (Springer).


[10] Schrammel, J.; Köffel, C.; Tscheligi, M.: "Personality traits, usage patterns and information disclosure in online communities". BCS HCI '09: Proceedings of the 2009 British Computer Society Conference on Human-Computer Interaction Cambridge, United Kingdom, 2009, pp.169-174.

[09] Schrammel, J.; Köffel, C.; Tscheligi, M.: "How much do you tell? Information disclosure behavior in different types of online communities". In Fourth International Conference on Communities and Technologies, 2009.

[08] Kosta, E.; Valcke, P.; Stevens, D.: "Spam, spam, spam, spam…Lovely spam! Why is Bluespam different?". International Review of Law Computers & Technology, Vol. 23, Nos. 1–2, March 2009, pp. 89-97.

[07] Kosta E.; Pimenidis, L.; Dumortier, J.: "The European debate on IP addresses – using a hammer to drive a screw?". BILETA 2009 Annual Conference “To Infinity and Beyond: Law and Technology in Harmony?”, Winchester, UK, 21-23 April 2009.

[06] Bramhall, P.: "Privacy has been lost – can Privacy Enhancing Technologies (PETs) regain it?". In: Proceedings of Information Security Summit, Prague, May 2009.

[05] Kosta E.; Kalloniatis, Ch.; Mitrou, L.; Kavakli, E.: "Search engines: gateway to a new “Panopticon”?". In: Fischer-Hübner, S.; Lambrinoudakis, C; Pernul, G.: Trust, Privacy and Security in Digital Business. 6th International Conference, TrustBus 2009, Linz-Austria, September 2009, Proceedings, LNCS 5695, pp. 11-21.

[04] Schrammel, J., “Information disclosure in different types of communities”, Fourth International Conference on Communities and Technologies (Submitted), Pennsylvania, USA, 2009.

[03] Crespo, A., Mendez, R., Liesebach, K. “Climbing towards trust and privacy management in social mobile communities”, W3C Workshop on the Future of Social Networking Proceedings, W3C, Barcelona, Spain, 2009. (Full Paper)


[02] Weiss, S., “Privacy Threat Model for Data Portability in Social Network Applications”, Proceedings of the 14th Americas Conference on Information Systems (AMCIS), Toronto, Canada, 2008.

[01] Kosta E., Dumortier J., "Searching the man behind the tag: privacy implications of RFID technology, International Journal of Intellectual Property Management (IJIPM)", Vol. 2, No. 3, 2008, Special Issue on: “Identity, Privacy and New Technologies”, Vol. 1, pp. 276-288.