Protecting personal data in E-government: A cross-country study
暂无分享,去创建一个
[1] Anil Kumar. Interview with: Rainey Reitman Director of Communications Privacy Rights Clearinghouse , 2010 .
[2] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[3] J. Fountain. Bureaucratic Reform and E-Government in the United States: An Institutional Perspective , 2007 .
[4] Joseph Gray Jackson,et al. Privacy and Freedom , 1968 .
[5] J. Fountain. Building the Virtual State: Information Technology and Institutional Change , 2001 .
[6] Mark Beatty,et al. Internet Governance: The New Frontier of Global Institutions , 2010 .
[7] H. P Gassmann,et al. OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .
[8] Telecommunications Board,et al. Findings and Recommendations , 2014 .
[9] J. W. DeCew. In Pursuit of Privacy: Law, Ethics, and the Rise of Technology , 1997 .
[10] Anthony Ogus,et al. Rethinking Self-Regulation , 1995 .
[11] Lawrence B. Solum. Models of Internet Governance , 2008, Internet Governance - Infrastructure and Institutions.
[12] Linda A.J. Senden,et al. Soft Law, Self-Regulation and Co-Regulation in European Law: Where Do They Meet? , 2006 .
[13] Milton L. Mueller. Networks and States: The Global Politics of Internet Governance , 2010 .
[14] Rolf H. Weber. Regulatory Models for the Online World , 2002 .
[15] B. Flyvbjerg. Five Misunderstandings About Case-Study Research , 2006, 1304.1186.
[16] Fred H. Cate,et al. Privacy in the Information Age , 1997 .
[17] David Lazer,et al. Governance and Information Technology: From Electronic Government to Information Government , 2007 .
[18] Kathleen Hale,et al. Technology, politics, and e-commerce: Internet sales tax and interstate cooperation , 2011, Government Information Quarterly.
[19] Peter Slominski,et al. Regulation Remixed: Institutional Change Through Self- and Co-Regulation in the Mediamatics Sector , 2004 .
[20] P. Jaeger,et al. Social Information Behavior and the Democratic Process: Information Poverty, Normative Behavior, and Electronic Government in the United States , 2004 .
[21] Omar E. M. Khalil,et al. e-Government readiness: Does national culture matter? , 2011, Gov. Inf. Q..
[22] Gerry Stoker,et al. Governance Theory and Practice: A Cross-Disciplinary Approach , 2008 .
[23] Ingo Take,et al. Regulating the Internet infrastructure: A comparative appraisal of the legitimacy of ICANN, ITU, and the WSIS , 2012 .
[24] Martina Gillen,et al. Internet Co-Regulation: European Law, Regulatory Governance and Legitimacy in Cyberspace , 2012, Int. J. Law Inf. Technol..
[25] R. McNeal,et al. Citizen–Government Interaction and the Internet: Expectations and Accomplishments in Contact, Quality, and Trust , 2008 .
[26] N. Ben Fairweather,et al. The Key Organisational Issues Affecting E-Government Adoption in Saudi Arabia , 2009, Int. J. Electron. Gov. Res..
[27] Barbara B. Flynn,et al. Empirical research methods in operations management , 1990 .
[28] Yuan Long,et al. Synthesizing e-government stage models - a meta-synthesis based on meta-ethnography approach , 2005, Ind. Manag. Data Syst..
[29] Jayoti Das,et al. Global E-Government and the Role of Trust: A Cross Country Analysis , 2009, Int. J. Electron. Gov. Res..
[30] Margaret Reid. How Governments Privatize: The Politics of Divestment in the United States and Germany , 2003 .
[31] Lucas D. Introna. Privacy and the computer: why we need privacy in the information society , 1997 .
[32] Christian Fuchs,et al. Implications of Deep Packet Inspection (DPI) Internet Surveillance for Society , 2012 .
[33] Yuehua Wu. Personal data protection in e -government: Globalization or glocalization? A comparative study of the United States, Germany and China , 2010 .
[34] William J. Long,et al. Personal data privacy protection in an age of globalization: the US-EU safe harbor compromise , 2002 .
[35] Maeve McDonagh. E-Government in Australia: the Challenge to Privacy of Personal Information , 2002, Int. J. Law Inf. Technol..
[36] Graham Greenleaf,et al. China’s Proposed Personal Information Protection Act , 2008 .
[37] Philip Eijlander,et al. Possibilities and Constraints in the Use of Self-Regulation and Co-Regulation in Legislative Policy : Experiences in the Netherlands-Lessons te Be Learned for the EU? , 2007 .
[38] Judee K. Burgoon,et al. Maintaining and Restoring Privacy through Communication in Different Types of Relationships , 1989 .
[39] David G. Post,et al. Law and Borders--The Rise of Law in Cyberspace , 1996 .
[40] Gerda Falkner,et al. Modes of governance: towards a conceptual clarification , 2007 .
[41] Donsia R. Strong. The computer matching and Privacy Protection Act of 1988: necessary relief from the erosion of the Privacy Act of 1974 , 1988 .
[42] France Bélanger,et al. The utilization of e‐government services: citizen trust, innovation and acceptance factors * , 2005, Inf. Syst. J..
[43] A. Chadwick. Bringing E-Democracy Back In , 2003 .
[44] Johannes M. Bauer,et al. Internet Governance: Theory and First Principles , 2005 .
[45] J. Rubenfeld. The Right of Privacy , 1989 .
[46] Robert Gellman,et al. Data privacy law: A study of United States data protection , 1997 .
[47] J. Barlow. A Declaration of the Independence of Cyberspace , 2021, Commonplace.
[48] J. Reidenberg. Lex Informatica: The Formulation of Information Policy Rules through Technology , 1997 .
[49] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[50] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[51] James N. Rosenau,et al. Governance without Government: Order and Change in World Politics , 1992 .
[52] D. West. E‐Government and the Transformation of Service Delivery and Citizen Attitudes , 2004 .
[53] Albert A. Harrison,et al. Living Aloft: Human Requirements for Extended Spaceflight , 2005 .
[54] Thea van der Geest,et al. A cue or two and I'll trust you: Determinants of trust in government organizations in terms of their processing and usage of citizens' personal information disclosed online , 2012, Gov. Inf. Q..
[55] Christine Nadel,et al. Case Study Research Design And Methods , 2016 .
[56] A. Ho. Reinventing Local Governments and the E‐Government Initiative , 2002 .
[57] Devendra Potnis,et al. Measuring e-Governance as an innovation in the public sector , 2010, Gov. Inf. Q..
[58] Jeffery L. Johnson. Privacy and the judgment of others , 1989 .
[59] Saul Levmore,et al. The Offensive Internet: Speech, Privacy, and Reputation , 2011 .
[60] Joel R. Reidenberg,et al. Resolving Conflicting International Data Privacy Rules in Cyberspace , 2000 .
[61] Sandra Braman,et al. Change of state: Information, policy and power , 2007, First Monday.
[62] Stephen M. Mutula. E-Government Readiness , 2010 .