Sousveillance: Inventing and Using Wearable Computing Devices to Challenge Surveillance
暂无分享,去创建一个
[1] E. Goffman. Behavior in public places : notes on the social organization of gatherings , 1964 .
[2] Hannah Arendt,et al. Eichmann in Jerusalem. A Report on the Banality of Evil , 1964 .
[3] Aldous Huxley,et al. Brave New World revisited , 2002, Nature Neuroscience.
[4] Nelson Minar,et al. Wearable computing meets ubiquitous computing: reaping the best of both worlds , 1999, Digest of Papers. Third International Symposium on Wearable Computers.
[5] Steve Mann,et al. Cyborg: Digital Destiny and Human Possibility in the Age of the Wearable Computer , 2001 .
[6] Jean-Baptiste Lully,et al. The collected works , 1996 .
[7] R. Spears,et al. Panacea or Panopticon? , 1994 .
[8] Steve Mann,et al. Comparametric equations with practical applications in quantigraphic image processing , 2000, IEEE Trans. Image Process..
[9] E. C. Richard,et al. The collected works , 1954 .
[10] Steve Mann,et al. Humanistic computing: "WearComp" as a new framework and application for intelligent signal processing , 1998, Proc. IEEE.
[11] Friedrich Dürrenmatt,et al. The Assignment: or, On the Observing of the Observer of the Observers , 1986 .
[12] Robert Graves,et al. The Greek Myths , 1955 .
[13] B. J. Fogg,et al. Captology: the study of computers as persuasive technologies , 1997, CHI Extended Abstracts.
[14] Steve Mann,et al. The Witnessential Net , 2001, Proceedings Fifth International Symposium on Wearable Computers.
[15] John Berger,et al. A Question Of Geography , 1987 .
[16] B. Wellman. Physical Place and Cyberplace: The Rise of Personalized Networking , 2001 .
[17] M. Foucault,et al. Power/Knowledge: Selected Interviews and Other Writings 1972-1977 , 1980 .
[18] B. J. Fogg,et al. Persuasive computers: perspectives and research directions , 1998, CHI.
[19] J. Jacobs. The Death and Life of Great American Cities , 1962 .
[20] Martha Fehsenfeld,et al. Samuel Beckett: A Biography , 1978 .
[21] Steve Mann. Computer Architectures for Protection of Personal Informatic Property: Putting Pirates, Pigs, and Rapists in Perspective , 2000, First Monday.
[22] Alex Pentland,et al. Face Recognition for Smart Environments , 2000, Computer.
[23] A. D. Jones,et al. Obedience to Authority , 1974 .
[24] Steve Mann. Can Humans Being Clerks make Clerks be Human? – Exploring the Fundamental Difference between UbiComp and WearComp (Können Menschen, die sich wie Angestellte benehmen, Angestellte zu menschlichem Verhalten bewegen? Zum fundamentalen Unterschied zwischen UbiComp und WearComp) , 2001, Informationstechnik Tech. Inform..
[25] Steve Mann,et al. “Reflectioriism” and “Diffusionism”: New Tactics for Deconstructing the Video Surveillance Superhighway , 2017 .
[26] Aldous Huxley,et al. Brave New World Revisited , 1959 .
[27] G. Brady. Governing the Commons: The Evolution of Institutions for Collective Action , 1993 .
[28] David Bell,et al. The Cybercultures Reader , 2000 .
[29] Simon Sheikh. The Production of Space , 1996 .
[30] Steve Mann,et al. Wearable Computing: A First Step Toward Personal Imaging , 1997, Computer.
[31] Morton Feldman,et al. For Samuel Beckett , 1987 .
[32] William W. Gaver,et al. Projected realities: conceptual design for cultural effect , 1999, CHI '99.
[33] Lou Cannon,et al. Official Negligence: How Rodney King and the Riots Changed Los Angeles and the LAPD , 1998 .
[34] Wendy S. Ark,et al. At What Cost Pervasive? A Social Comuting View of Mobile Computing Systems , 1999, IBM Syst. J..
[35] H. Garfinkel. Studies in Ethnomethodology , 1968 .