A roadmap for research on identity in the information society
暂无分享,去创建一个
[1] A. Pfitzmann,et al. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .
[2] David Lyon,et al. Surveillance, Power and Everyday Life , 2009 .
[3] David-Olivier Jaquet-Chiffelle,et al. A TYPOLOGY OF IDENTITY-RELATED CRIME , 2009 .
[4] James Backhouse,et al. Approaching Interoperability for Identity Management Systems , 2009, The Future of Identity in the Information Society.
[5] Mireille Hildebrandt,et al. Profiling and the rule of law , 2008 .
[6] C. N. M. Pounder. Nine principles for assessing whether privacy is protected in a surveillance society , 2008 .
[7] T. Dowty. Overlooking children: an experiment with consequences , 2008 .
[8] John A. Taylor,et al. Identification practices in government: citizen surveillance and the quest for public service improvement , 2008 .
[9] James Backhouse,et al. Security and Privacy Perceptions of E- ID: A Grounded Research , 2008, ECIS.
[10] Serge Gutwirth,et al. Profiling the European Citizen, Cross-Disciplinary Perspectives , 2008 .
[11] Anders Albrechtslund,et al. Online Social Networking as Participatory Surveillance , 2008, First Monday.
[12] Wanda J. Orlikowski,et al. Using Technology and Constituting Structures: A Practice Lens for Studying Technology in Organizations , 2000, Theory in CSCW.
[13] N. D. Meulen,et al. D12.7 Identity-related crime in Europe : Big problem or big hype? , 2008 .
[14] Janni Nielsen,et al. European Conference on Information Systems (ECIS) , 2008 .
[15] D. Marron,et al. ‘Alter Reality’ Governing the Risk of Identity Theft , 2007 .
[16] Sean Brennan,et al. The biggest computer programme in the world ever! How's it going? , 2007, J. Inf. Technol..
[17] Sarah Cotterill,et al. Transformational Government? The role of information technology in delivering citizen-centric local public services , 2007 .
[18] Nigel Gilbert,et al. Dilemmas of privacy and surveillance: chaljenges of technological change , 2007 .
[19] Benoît Otjacques,et al. Interoperability of E-Government Information Systems: Issues of Identification and Data Sharing , 2007, J. Manag. Inf. Syst..
[20] Robin Mansell,et al. The Oxford Handbook of Information and Communication Technologies , 2007 .
[21] Richard Clayton,et al. Children's databases - safety and privacy: a report for the information commissioner , 2007 .
[22] M. Hildebrandt,et al. A vision of ambient law , 2007 .
[23] Ross Anderson,et al. Under threat: patient confidentiality and NHS computing , 2006 .
[24] Ross Anderson,et al. Children's Databases - Safety and Privacy , 2006 .
[25] Patrick Dunleavy,et al. Digital Era Governance , 2006 .
[26] Bert-Jaap Koops,et al. Identity theft, identity fraud and/or identity-related crime , 2006, Datenschutz und Datensicherheit - DuD.
[27] Ruth Halperin. Identity as an emerging field of study , 2006, Datenschutz und Datensicherheit - DuD.
[28] James Backhouse. Interoperability of identity and identity management systems , 2006, Datenschutz und Datensicherheit - DuD.
[29] Daniel J. Solove. The Digital Person and the Future of Privacy , 2006 .
[30] Robert E. Holtfreter,et al. Gauging the effectiveness of US identity theft legislation , 2006 .
[31] Stephen Saxby. eGovernment is dead: Long live transformation , 2006, Comput. Law Secur. Rev..
[32] A. Lips,et al. E-government under Construction : Challenging Traditional Conceptions of Citizenship , 2006 .
[33] Katherine J. Strandburg,et al. Privacy and Technologies of Identity: A Cross-Disciplinary Conversation , 2005 .
[34] Claudio Ciborra,et al. Interpreting e-government and development: Efficiency, transparency or governance at a distance? , 2005, Inf. Technol. People.
[35] Bruce Eckfeldt,et al. What does RFID do for the consumer? , 2005, CACM.
[36] David Lyon,et al. Surveillance as Social Sorting : Privacy, Risk and Automated Discrimination , 2005 .
[37] C. Linn. How terrorists exploit gaps in US anti‐money laundering laws to secrete plunder , 2005 .
[38] Susanne Lace,et al. The glass consumer : life in a surveillance society , 2005 .
[39] Perri,et al. Joined‐up government and privacy in the United Kingdom: managing tensions between data protection and social policy. Part II , 2005 .
[40] Hans Jochen Scholl,et al. Interoperability in E-Government: More than Just Smart Middleware , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[41] Deborah Estrin,et al. Habitat monitoring with sensor networks , 2004, CACM.
[42] Elia Zureik,et al. Governance, Security and Technology: the Case of Biometrics , 2004 .
[43] Arun Ross,et al. Multibiometric systems , 2004, CACM.
[44] A. Alterman,et al. ``A piece of yourself'': Ethical issues in biometric identification , 2003, Ethics and Information Technology.
[45] Luminita Vasiu,et al. Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.
[46] Robert D. Galliers,et al. Change as Crisis or Growth? Toward a Trans-disciplinary View of Information Systems as a Field of Study: A Response to Benbasat and Zmud's Call for Returning to the IT Artifact , 2003, J. Assoc. Inf. Syst..
[47] Tony Kinder,et al. Mrs Miller Moves House: The Interoperability of Local Public Services in Europe , 2003 .
[48] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..
[49] D. Lyon. Surveillance as social sorting : privacy, risk, and digital discrimination , 2003 .
[50] I. V. D. Ploeg,et al. Biometrics and Privacy A note on the politics of theorizing technology , 2003 .
[51] Paul A. Pavlou,et al. Institution-Based Trust in Interorganizational Exchange Relationships: The Role of Online B2B Marketplaces on Trust Formation , 2002, J. Strateg. Inf. Syst..
[52] M. Warner,et al. Applying Market Solutions to Public Services , 2002 .
[53] Charles J. Kacmar,et al. Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..
[54] Amitai Etzioni,et al. Implications of Select New Technologies For Individual Rights and Public Safety , 2002 .
[55] International Journal of Image and Graphics , 2002 .
[56] Chrisanthi Avgerou,et al. The significance of context in information systems and organizational change , 2001, Inf. Syst. J..
[57] James L. Wayman,et al. Fundamentals of Biometric Authentication Technologies , 2001, Int. J. Image Graph..
[58] Jane E. Fountain,et al. Paradoxes of Public Sector Customer Service , 2001 .
[59] Gurpreet Dhillon,et al. Technical opinion: Information system security management in the new millennium , 2000, CACM.
[60] Mark S. Nadel. Code and Other Laws of Cyberspace , 2000 .
[61] Rogers Brubaker,et al. Beyond “identity” , 2000 .
[62] R. Löfstedt,et al. Social Trust and the Management of Risk , 1999 .
[63] Roderick M. Kramer,et al. Trust and distrust in organizations: emerging perspectives, enduring questions. , 1999, Annual review of psychology.
[64] M. Felson,et al. Crime and Everyday Life , 1998 .
[65] S. Schwartzman,et al. The New Production of Knowledge: The Dynamics of Science and Research in Contemporary Societies , 1994 .
[66] L. Zucker. Production of trust: Institutional sources of economic structure, 1840–1920. , 1986 .