Change search
Link to record
Permanent link

Direct link
Jensen, Meiko
Publications (10 of 21) Show all publications
Hansen, M., Runge, G., Gruschka, N. & Jensen, M. (2026). Illuminating the DPIA Blackbox – A Survey of Data Protection Impact Assessment Practices in Organisations. In: Narges Arastouei; Meiko Jensen; Kai Rannenberg (Ed.), Privacy Technologies and Policy: 13th Annual Privacy Forum–Proceedings. Paper presented at 13th Annual Privacy Forum, APF 2025,Frankfurt, Germany, October 22-23. 2025. (pp. 178-201). Springer, 16183 LNCS
Open this publication in new window or tab >>Illuminating the DPIA Blackbox – A Survey of Data Protection Impact Assessment Practices in Organisations
2026 (English)In: Privacy Technologies and Policy: 13th Annual Privacy Forum–Proceedings / [ed] Narges Arastouei; Meiko Jensen; Kai Rannenberg, Springer, 2026, Vol. 16183 LNCS, p. 178-201Conference paper, Published paper (Refereed)
Abstract [en]

According to the European General Data Protection Regulation (GDPR), a Data Protection Impact Assessment (DPIA) is mandatory for all ongoing and planned processing of personal data if said processing is likely to affect the privacy and data protection rights and freedoms of the data subjects. However, upon examining the real-world implementation of this requirement, various approaches emerged, resulting in a heterogeneous landscape of DPIA processes. In this paper, we present the results of a survey that investigated the state of adoption of DPIA process methodologies in real-world organisations. Our survey reveals that handwritten DPIA reports and ad-hoc methods continue to dominate the DPIA landscape in Europe. Moreover, according to our data, processes involving multiple stakeholders are often not adequately assessed in terms of DPIA-related risks. 

Place, publisher, year, edition, pages
Springer, 2026
Series
Lecture Notes in Computer Science ; 16183 LNCS
Keywords
Data privacy, Assessment practices, Assessment process, Black boxes, Data protection impact assessments, Data subjects, General data protection regulations, Impact assessments, Privacy impact assessment, Real-world implementation, Risk assessment
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-107732 (URN)10.1007/978-3-032-07574-1_8 (DOI)2-s2.0-105020265183 (Scopus ID)978-3-032-07573-4 (ISBN)978-3-032-07574-1 (ISBN)
Conference
13th Annual Privacy Forum, APF 2025,Frankfurt, Germany, October 22-23. 2025.
Available from: 2025-12-03 Created: 2025-12-03 Last updated: 2026-02-12Bibliographically approved
Arastouei, N., Jensen, M. & Rannenberg, K. (2026). Preface. In: Narges Arastouei; Meiko Jensen; Kai Rannenberg (Ed.), Privacy Technologiesand Policy: Proceedings-13th Annual Privacy Forum, APF 2025. Springer, 16183 LNCS
Open this publication in new window or tab >>Preface
2026 (English)In: Privacy Technologiesand Policy: Proceedings-13th Annual Privacy Forum, APF 2025 / [ed] Narges Arastouei; Meiko Jensen; Kai Rannenberg, Springer, 2026, Vol. 16183 LNCSChapter in book (Refereed)
Place, publisher, year, edition, pages
Springer, 2026
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 16183
National Category
Information Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-107733 (URN)10.1007/978-3-032-07574-1 (DOI)2-s2.0-105020264676 (Scopus ID)978-3-032-07573-4 (ISBN)978-3-032-07574-1 (ISBN)
Note

3th Annual Privacy Forum, APF 2025, Frankfurt, Germany, October 22-23, 2025. 

Available from: 2025-12-03 Created: 2025-12-03 Last updated: 2026-02-12Bibliographically approved
Graßhoff, H., Jensen, M., Hansen, M. & Gruschka, N. (2025). Identification of Compositional Risks in Data Protection Impact Assessments and beyond. In: Proceedings - 10th IEEE European Symposium on Security and Privacy Workshops: . Paper presented at 2025 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Venice, Italy, June 30- July 4, 2025. (pp. 251-259). IEEE
Open this publication in new window or tab >>Identification of Compositional Risks in Data Protection Impact Assessments and beyond
2025 (English)In: Proceedings - 10th IEEE European Symposium on Security and Privacy Workshops, IEEE, 2025, p. 251-259Conference paper, Published paper (Refereed)
Abstract [en]

When personal data is processed in a distributed manner by cooperating service providers, privacy risks may emerge solely from the choice of data processors included in the composition. For instance, different data processors may unknowingly rely on the same cloud provider, allowing for unintended linkability of personal data at that very provider. As such compositional risks to privacy are beyond the scope of each individual risk assessment, they are likely to be overseen when performing a data protection impact assessment. In this paper, we propose a novel protocol to detect and manage such compositional risks to privacy. Following an initial problem definition and requirements elicitation, we elaborate how our protocol identifies candidates for compositional risks and how this information may be used to improve the results of a data protection impact assessment over service compositions including multiple data processors. 

Place, publisher, year, edition, pages
IEEE, 2025
Keywords
Data privacy, Cloud providers, Compositional risk, Data processors, Data protection impact assessments, DPIA, Privacy, Privacy risks, Risk detections, Risks assessments, Service provider, Risk assessment
National Category
Computer Sciences Software Engineering
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-107431 (URN)10.1109/EuroSPW67616.2025.00035 (DOI)001576286100029 ()2-s2.0-105016554511 (Scopus ID)
Conference
2025 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Venice, Italy, June 30- July 4, 2025.
Available from: 2025-11-03 Created: 2025-11-03 Last updated: 2026-02-12Bibliographically approved
Arastouei, N., Jensen, M. & Rannenberg, K. (Eds.). (2025). Privacy Technologies and Policy: 13th Annual Privacy Forum, APF 2025-Proceedings. Paper presented at 13th Annual Privacy Forum, APF 2025, Frankfurt, Germany, October 22–23, 2025.. Springer
Open this publication in new window or tab >>Privacy Technologies and Policy: 13th Annual Privacy Forum, APF 2025-Proceedings
2025 (English)Conference proceedings (editor) (Refereed)
Abstract [en]

This open access book constitutes the refereed proceedings of the 13th Annual Privacy Forum on Privacy Technologies and Policy, APF 2025, held in Frankfurt am Main, Germany, during October 22-23, 2025.

The 9 full papers were carefully reviewed and selected from 27 submissions.They were organized into following topical sections: Supporting Laypeople and Users: Design Approaches, User Perceptions, and Problems; Emerging Risks from Upcoming Technologies, Misunderstandings, and Regulatory Derogation; Professional Methods & Tools for Analysis and Decision Making.

Place, publisher, year, edition, pages
Springer, 2025. p. 221
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 16183
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-107744 (URN)10.1007/978-3-032-07574-1 (DOI)978-3-032-07573-4 (ISBN)978-3-032-07574-1 (ISBN)
Conference
13th Annual Privacy Forum, APF 2025, Frankfurt, Germany, October 22–23, 2025.
Available from: 2025-12-03 Created: 2025-12-03 Last updated: 2026-02-12Bibliographically approved
Larsson, E. & Jensen, M. (2025). Understanding Corporate Ransomware – A Case Study in the Nordics. In: Isabel Praça, Simona Bernardi, Pedro R.M. Inácio (Ed.), Cybersecurity: Proceedings of the 9th European Interdisciplinary Cybersecurity Conference. Paper presented at 9th European Interdisciplinary Cybersecurity Conference, EICC, Rennes, France, June 18–19, 2025. (pp. 82-97). Springer, 2500 CCIS
Open this publication in new window or tab >>Understanding Corporate Ransomware – A Case Study in the Nordics
2025 (English)In: Cybersecurity: Proceedings of the 9th European Interdisciplinary Cybersecurity Conference / [ed] Isabel Praça, Simona Bernardi, Pedro R.M. Inácio, Springer, 2025, Vol. 2500 CCIS, p. 82-97Conference paper, Published paper (Refereed)
Abstract [en]

Ransomware is continuously evolving and has recently seen record-breaking payouts. This paper describes developments in corporate ransomware which have contributed to this continued rise. It provides an interdisciplinary case study of a ransomware campaign conducted in northern Europe during 2023 and 2024. We argue that underlying factors, including the broad rollout of personal cloud backups, have caused modern ransomware groups to shift towards expending more effort per attack in order to attack bigger targets. We perform an analysis of such an attack using a combination of internal and open sources, as well as using forensic techniques. The analysis shows how the attackers approach high-value targets, use both traditional crypto-ransomware tools and hacking, and utilize multiple avenues of extortion to negotiate the highest possible ransom. 

Place, publisher, year, edition, pages
Springer, 2025
Series
Communications in Computer and Information Science ; CCIS, volume 2500
Keywords
Personal computing, Akira, Breakings, Case-studies, Corporates, Double extortion, Internal source, Malwares, Open-source, Personal clouds, Underlying factors, Malware
National Category
Computer Sciences
Research subject
Computer Science; Computer Science
Identifiers
urn:nbn:se:kau:diva-106249 (URN)10.1007/978-3-031-94855-8_6 (DOI)001552002800006 ()2-s2.0-105009287108 (Scopus ID)978-3-031-94854-1 (ISBN)978-3-031-94855-8 (ISBN)
Conference
9th European Interdisciplinary Cybersecurity Conference, EICC, Rennes, France, June 18–19, 2025.
Funder
Knowledge Foundation
Available from: 2025-07-08 Created: 2025-07-08 Last updated: 2026-02-12Bibliographically approved
Hansen, M., Gruschka, N. & Jensen, M. (2024). A Universal Data Model for Data Sharing Under the European Data Strategy. In: Lect. Notes Comput. Sci.: . Paper presented at Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 3-19). Springer
Open this publication in new window or tab >>A Universal Data Model for Data Sharing Under the European Data Strategy
2024 (English)In: Lect. Notes Comput. Sci., Springer, 2024, p. 3-19Conference paper, Published paper (Refereed)
Abstract [en]

The current European data strategy foresees a novel ecosystem of data sharing and data trading among public and private sector organizations in the EU member states. The focus is on enabling and fostering data sharing among the stakeholders while maintaining compliance with existing EU and national data protection legislation, such as the European General Data Protection Regulation (GDPR). However, managing data sharing in such a compliant manner requires additional metadata to be exchanged amongst the actors in this ecosystem. Therefore, this paper proposes a novel data model for managing data sharing activities. This model takes current and planned regulations (e.g., the Data Governance Act) and the resulting data ecosystem architectures (e.g. data intermediaries) into account and is applicable to different actions that are necessary for compliant data exchange, like data subject rights requests or intellectual property enforcement. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.

Place, publisher, year, edition, pages
Springer, 2024
Keywords
Data Governance Act, data model, data sharing, European data strategy, GDPR, Electronic data interchange, Intellectual property, Laws and legislation, 'current, Data governances, General data protection regulations, Novel ecosystems, Public and private sector, Public sector organization, Universal data model, Ecosystems
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-101126 (URN)10.1007/978-3-031-61089-9_1 (DOI)2-s2.0-85197222996 (Scopus ID)9783031610882 (ISBN)
Conference
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Available from: 2024-07-12 Created: 2024-07-12 Last updated: 2026-02-12Bibliographically approved
Barbera, I., Castelluccia, C., D’acquisto, G., Gasowska, M. F., Hansen, M., Hoepman, J.-H., . . . Drogkaris, P. (2024). Engineering Personal Data Protection in EU Data Spaces. European union agency for cybersecurity
Open this publication in new window or tab >>Engineering Personal Data Protection in EU Data Spaces
Show others...
2024 (English)Report (Other academic)
Abstract [en]

The recent EU legislative initiatives promoting data sharing are sectoral and cross-sectoralinstruments that aim to make data available by regulating the reuse of publicly and privatelyheld data, including personal data. They also facilitate data sharing by creating of novelintermediaries and sharing environments where the parties involved can pool data and facilitiesin a trusted and secure way.Common European data spaces (EU data spaces) are a novel concept introduced in theEuropean strategy for data and elaborated further within the Data Governance Act (DGA). It isenvisioned that they will facilitate innovation, economic growth and digital transformation andrevolve around creating a framework for data sharing that respects privacy, security and otherapplicable regulatory considerations while promoting cross-sector collaboration andinteroperability.This report attempts to contextualise the main design principles regarding protection of personaldata and demonstrate how to engineer personal data protection through two use cases of anenvisioned EU data space in the pharmaceutical domain.Despite the potential of the EU data spaces, there are still considerations regarding appropriatetechnical and organisational measures and how to engineer them into practice, both from a dataprotection and from a cybersecurity point of view. Even if there are already a good number ofprivacy enhancing technologies that can support us in meeting specific data protection goals,we should not neglect the fact that we are called to address new processing operations, wherethe roles and responsibilities are not always clearly defined. 

Place, publisher, year, edition, pages
European union agency for cybersecurity, 2024. p. 24
Series
ENISA Reports
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-103733 (URN)10.2824/210862 (DOI)978-92-9204-650-7 (ISBN)
Available from: 2025-03-27 Created: 2025-03-27 Last updated: 2026-02-12Bibliographically approved
Weijers, F., Jensen, M. & Raab-Düsterhöft, A. (2024). Forensic strategies and methods in advanced software-defined networks. In: Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI): . Paper presented at Lock-in or log out? Wie digitale Souveranitat gelingt, INFORMATIK, Wiesbaden, Germany, September 24-26, 2024. (pp. 331-341). Gesellschaft fur Informatik (GI), 352
Open this publication in new window or tab >>Forensic strategies and methods in advanced software-defined networks
2024 (English)In: Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), Gesellschaft fur Informatik (GI) , 2024, Vol. 352, p. 331-341Conference paper, Published paper (Refereed)
Abstract [en]

When it comes to network forensics in modern cloud-edge-systems, network forensics has become an urgent yet challenging field of work. Especially forensics of software-defined networks (SDN) poses some unique challenges that need to be addressed. This article hence addresses the methodological and strategic challenges of network forensics in modern complex software-defined networks using the ZeroTier Network as a practical example. In this context, detailed strategies and methods for clarification and preservation of evidence in SDN after common IT security incidents are derived from existing best practices in digital forensics. In addition, typical technical and legal issues and obstacles for forensic work in SDN are addressed in connection with IT security measures, and possible solution approaches are presented. Using an advanced SDN example, characteristic workflows of network forensics in SDN are discussed. The result of the work is ultimately a presentation of adapted and individually adaptable strategies and methods for applying targeted digital forensics in advanced SDN. 

Place, publisher, year, edition, pages
Gesellschaft fur Informatik (GI), 2024
Keywords
Computer forensics, Electronic crime countermeasures, Forensic engineering, Advanced softwares, Complex software, IT security, Methodology, Security incident, Software-defined networkings, Software-defined networks, Strategic challenges, Strategy, Systems networks, Social software
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-103358 (URN)10.18420/inf2024_23 (DOI)2-s2.0-85216081176 (Scopus ID)
Conference
Lock-in or log out? Wie digitale Souveranitat gelingt, INFORMATIK, Wiesbaden, Germany, September 24-26, 2024.
Available from: 2025-02-24 Created: 2025-02-24 Last updated: 2026-02-12Bibliographically approved
Drogkaris, P., Jensen, M., Lauradoux, C. & Rannenberg, K. (2024). Preface. In: Meiko Jensen · Cédric Lauradoux · Kai Rannenberg (Ed.), Privacy Technologiesand Policy: (pp. v). Springer Science+Business Media B.V., 14831 LNCS
Open this publication in new window or tab >>Preface
2024 (English)In: Privacy Technologiesand Policy / [ed] Meiko Jensen · Cédric Lauradoux · Kai Rannenberg, Springer Science+Business Media B.V., 2024, Vol. 14831 LNCS, p. v-Chapter in book (Refereed)
Place, publisher, year, edition, pages
Springer Science+Business Media B.V., 2024
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 14831
National Category
Computer and Information Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-101426 (URN)10.1007/978-3-031-68024-3 (DOI)2-s2.0-85200976066 (Scopus ID)978-3-031-68023-6 (ISBN)978-3-031-68024-3 (ISBN)
Note

This book constitutes the refereed proceedings of the 12th Annual Privacy Forum on Privacy Technologies and Policy, APF 2024, held in Karlstad, Sweden, during September 4–5, 2024.

Available from: 2024-08-23 Created: 2024-08-23 Last updated: 2026-02-12Bibliographically approved
Bieker, F., de Conca, S., Gruschka, N., Jensen, M. & Schiering, I. (2024). Preface. In: Felix Bieker, Silvia de Conca, Nils Gruschka, Meiko Jensen, Ina Schiering (Ed.), Privacy and Identity Management. Sharing in a Digital World: (pp. v-vi). Springer, 695 IFIPAICT
Open this publication in new window or tab >>Preface
Show others...
2024 (English)In: Privacy and Identity Management. Sharing in a Digital World / [ed] Felix Bieker, Silvia de Conca, Nils Gruschka, Meiko Jensen, Ina Schiering, Springer, 2024, Vol. 695 IFIPAICT, p. v-viChapter in book (Refereed)
Place, publisher, year, edition, pages
Springer, 2024
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 695
National Category
Computer and Information Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-100224 (URN)10.1007/978-3-031-57978-3 (DOI)2-s2.0-85192374478 (Scopus ID)978-3-031-57977-6 (ISBN)978-3-031-57978-3 (ISBN)
Available from: 2024-06-17 Created: 2024-06-17 Last updated: 2026-02-12Bibliographically approved
Organisations

Search in DiVA

Show all publications