Searched for: author%3A%22Asghari%2C+H.%22
(1 - 17 of 17)
document
Mahieu, René (author), Asghari, H. (author), Parsons, Christopher (author), van Hoboken, Joris (author), Crete-Nishihata, Masashi (author), Hilts, Andrew (author), Anstis, Siena (author)
We investigate empirically whether the introduction of the General Data Protection Regulation (GDPR) improved compliance with data protection rights of people who are not formally protected under GDPR. By measuring compliance with the right of access for European Union (EU) and Canadian residents, we find that this is indeed the case. We...
journal article 2021
document
Bisogni, F. (author), Asghari, H. (author)
This article investigates the relationship between data breaches and identity theft, including the impact of Data Breach Notification Laws (DBNL) on these incidents (using empirical data and Bayesian modeling). We collected incident data on breaches and identity thefts over a 13-year timespan (2005–2017) in the United States. Our analysis shows...
journal article 2020
document
Van Eijk, Rob (author), Asghari, H. (author), Winter, Philipp (author), Narayanan, Arvind (author)
The web is global, but privacy laws differ by country. Which set of privacy rules do websites follow? We empirically study this question by detecting and analyzing cookie notices in an automated way. We crawl 1,500 European, American,and Canadian websites from each of 18 countries. We detect cookie notices on 40% of websites in our sample. We...
conference paper 2019
document
Hazenberg, H.G.G. (author), van den Hoven, M.J. (author), Cunningham, S. (author), Alfano, M.R. (author), Asghari, H. (author), Sullivan, Emily (author), Ebrahimi Fard, A. (author), Turcios Rodriguez, Elsa (author)
For the period surrounding the 2018 Dutch municipal elections, a team of researchers from the Delft University of Technology investigated the effect of the digital environment on parliamentary democracy. An interdisciplinary group of researchers combined expertise on digital ethics, political theory, big data analytics, the economics of privacy...
report 2018
document
Pudane, B. (author), Rataj, Michal (author), Molin, E.J.E. (author), Mouter, N. (author), Asghari, H. (author), van Cranenburgh, S. (author), Chorus, C.G. (author)
conference paper 2018
document
Asghari, H. (author), Mahieu, R.L.P. (author), van Eeten, M.J.G. (author)
The debate about how to govern personal data has intensified in recent years. The European Union’s General Data Protection Regulation, which came into effect in May 2018, relies on transparency mechanisms codified through obligations for organisations and citizen rights. While some of these rights have existed for decades, their effectiveness is...
journal article 2018
document
Lone, Q.B. (author), Luckie, Matthew (author), Korczyński, MacIej (author), Asghari, H. (author), Javed, Mobin (author), van Eeten, M.J.G. (author)
Internet measurement tools are used to make inferences about network policies and practices across the Internet, such as censorship, traffic manipulation, bandwidth, and security measures. Some tools must be run from vantage points within individual networks, so are dependent on volunteer recruitment. A small pool of volunteers limits the...
conference paper 2018
document
Bisogni, F. (author), Asghari, H. (author), van Eeten, M.J.G. (author)
conference paper 2017
document
Asghari, H. (author), Mahieu, R.L.P. (author), Mittal, Prateek (author), Greenstadt, Rachel (author)
conference paper 2017
document
Asghari, H. (author)
Research in the field of information security economics has clarified how attacker and defender incentives affect cybersecurity. It has also highlighted the role of intermediaries in strengthening cybersecurity. Intermediaries are organizations and firms that provide the Internet’s infrastructure and platforms. This dissertation looks at how...
doctoral thesis 2016
document
van Eeten, M.J.G. (author), Lone, Q.B. (author), Moura, Giovane C. M. (author), Asghari, H. (author), Korczynski, M.T. (author)
This documents presents the final report of a two-year project to evaluate the impact of AbuseHUB, a Dutch clearinghouse for acquiring and processing abuse data on infected machines. The report was commissioned by the Netherlands Ministry of Economic Affairs, a co-funder of the development of AbuseHUB. AbuseHUB is the initiative of 9 Internet...
report 2016
document
Asghari, H. (author), Ciere, M. (author), Van Eeten, M.J.G. (author)
Research on botnet mitigation has focused predominantly on methods to technically disrupt the commandand-control infrastructure. Much less is known about the effectiveness of large-scale efforts to clean up infected machines. We analyze longitudinal data from the sinkhole of Conficker, one the largest botnets ever seen, to assess the impact of...
conference paper 2015
document
Moreira Moura, G.C. (author), Ganan, C.H.G. (author), Lone, Q.B. (author), Poursaied, P. (author), Asghari, H. (author), Van Eeten, M.J.G. (author)
IP address counts are typically used as a surrogate metric for the number of hosts in a network, as in the case of ISP rankings based on botnet infected addresses. However, due to effects of dynamic IP address allocation, such counts tend to overestimate the number of hosts, sometimes by an order of magnitude. In the literature, the rate at...
conference paper 2015
document
Tajalizadehkhoob, S.T. (author), Asghari, H. (author), Ganan, C. (author), Van Eeten, M.J.G. (author)
conference paper 2014
document
Asghari, H. (author), Van Eeten, M.J.G. (author), Mueller, M. (author)
Large and impressive data collection efforts often fail to make their data useful for answering policy questions. In this paper, we argue that this is due to a systematic gap between the ways measurement engineers think about their data, and how other disciplines typically make use of data. We recap our own efforts to use the data generated by a...
conference paper 2013
document
Asghari, H. (author), Van Eeten, M.J.G. (author), Arnbak, A.M. (author), Van Eijk, N.A.N.M. (author)
Even though we increasingly rely on HTTPS to secure Internet communications, several landmark incidents in recent years have illustrated that its security is deeply flawed. We present an extensive multi-disciplinary analysis that examines how the systemic vulnerabilities of the HTTPS authentication model could be addressed. We conceptualize the...
report 2013
document
Mueller, M. (author), Kuerbis, B. (author), Asghari, H. (author)
One of the most important but least-studied aspects of Internet policy is the emergence of a trading market for previously allocated Internet number blocks. Without unique Internet protocol numbers for the networks and devices attached, the Internet simply doesn’t work. The original Internet Protocol standard, known as IPv4, specified a 32-bit...
report 2012
Searched for: author%3A%22Asghari%2C+H.%22
(1 - 17 of 17)