An enquiry into the ethical efficacy of the use of radio frequency identification technology
暂无分享,去创建一个
[1] J. S. Adams,et al. Inequity In Social Exchange , 1965 .
[2] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[3] David J. Danelski,et al. Privacy and Freedom , 1968 .
[4] J. Rawls. A Theory of Justice , 1999 .
[5] G. Leventhal. What Should Be Done with Equity Theory? New Approaches to the Study of Fairness in Social Relationships. , 1976 .
[6] G. Leventhal. What Should Be Done with Equity Theory , 1980 .
[7] R. Bies. Interactional justice : communication criteria of fairness , 1986 .
[8] T. Tyler,et al. The Social Psychology of Procedural Justice , 1988 .
[9] R. Folger,et al. Effects of Procedural and Distributive Justice on Reactions to Pay Raise Decisions , 1989 .
[10] H Roberts,et al. Risk Society: Towards a New Modernity , 1994 .
[11] J. Greenberg,et al. The social side of fairness: Interpersonal and informational classes of organizational justice. , 1993 .
[12] F. Fukuyama. Trust: The Social Virtues and the Creation of Prosperity Penguin London , 1995 .
[13] W. Galston. Trust: The Social Virtues and the Creation of Prosperity , 1996 .
[14] Fred H. Cate,et al. Privacy in the Information Age , 1997 .
[15] C. Slade. Privacy and regulation , 1997 .
[16] Kimball P. Marshall,et al. Has Technology Introduced New Ethical Problems? , 1999 .
[17] Reginald Whitaker,et al. The End of Privacy: How Total Surveillance Is Becoming a Reality , 1999 .
[18] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[19] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[20] Richard A. Spinello,et al. Cyberethics: Morality and Law in Cyberspace , 2001 .
[21] Eve M. Caudill,et al. Consumer Online Privacy: Legal and Ethical Issues , 2000 .
[22] Peter Y. Chen,et al. Using Social Exchange Theory to Distinguish Procedural from Interactional Justice , 2002 .
[23] D. Melé. Organizational Humanizing Cultures: Do They Generate Social Capital? , 2003 .
[24] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[25] Meg McGinity. RFID: is this game of tag fair play? , 2004 .
[26] L. R. Shade. Ethical, legal, and policy conundrums of privacy in our knowledge-based society , 1999, Ethics and Information Technology.
[27] Shin’ichi Konomi. Personal Privacy Assistants for RFID Users , 2004 .
[28] Christian Floerkemeier,et al. Issues with RFID Usage in Ubiquitous Computing Applications , 2004, Pervasive.
[29] James A. Landay,et al. Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.
[30] G. E. Gorman. Cyberethics: Morality and Law in Cyberspace (2nd ed.) , 2004 .
[31] D. Vasiljević. Barbara Hudson: Justice in the risk society: Challenging and re-affirming justice in late modernity, Sage Publications, London: Thousand Oaks & New Delhi, str. 258. , 2005 .
[32] Alan Robert Peslak,et al. An Ethical Exploration of Privacy and Radio Frequency Identification , 2005 .
[33] Gal Eschet,et al. FIPs and PETs for RFID: Protecting Privacy in the Web of Radio Frequency Identification , 2005 .
[34] Simson L. Garfinkel,et al. RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.
[35] F. Cate. The Failure of Fair Information Practice Principles , 2006 .
[36] Mary Lou Ingeholm,et al. RFID in healthcare. , 2006, Journal of AHIMA.
[37] Philip Brey,et al. Freedom and Privacy in Ambient Intelligence , 2005, Ethics and Information Technology.
[38] Laurence Ashworth,et al. Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns , 2006 .
[39] Richard S. Rosenberg,et al. RFID: The Next Serious Threat to Privacy , 2005, Ethics and Information Technology.
[40] Gjalt de Graaf,et al. The Autonomy of the Contracting Partners: An Argument for Heuristic Contractarian Business Ethics , 2006 .
[41] Meghna Virick,et al. THE EFFECT OF PERSONALITY ON PERCEPTIONS OF JUSTICE , 2006 .
[42] Richard Marens. Returning to Rawls: Social Contracting, Social Justice, and Transcending the Limitations of Locke , 2007 .
[43] Philip A.E. Brey. Computer Ethics of the Right and the Good. , 2007 .
[44] Koutarou Suzuki,et al. RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.
[45] William Bonner,et al. Locating a Space for Ethics to Appear in Decision-making: Privacy as an Exemplar , 2007 .
[46] P. Maclagan. Hierarchical Control or Individuals' Moral Autonomy? Addressing a Fundamental Tension in the Management of Business Ethics , 2007 .
[47] C. Flanagan,et al. TIES THAT BIND : CORRELATES OF ADOLESCENTS' CIVIC COMMITMENTS IN SEVEN COUNTRIES , 2010 .