I am currently thinking about possible links between threat modelling as typically done in organizational IT structures and private, personal privacy and security management.

(i.e.: If you do this, then this has the following consequences for your security/privacy, or a 3rd party may deduce this and that information about you)

Does anyone know of literature that already has pursued such a way?

More Timo Jakobi's questions See All
Similar questions and discussions