Locating mobile devices : balancing privacy and national security
暂无分享,去创建一个
[1] E. J. Koops. Tendensen in opsporing en technologie: Over twee honden en een kalf , 2006 .
[2] F. Miedema,et al. Evaluatie pilot elektronische volgsystemen , 2006 .
[3] J. Dempsey,et al. Terrorism and the constitution : sacrificing civil liberties in the name of national security , 2006 .
[4] Richard S. Rosenberg,et al. RFID: The Next Serious Threat to Privacy , 2005, Ethics and Information Technology.
[5] Paul Müller,et al. Tackling Security and Privacy Issues in Radio Frequency Identification Devices , 2004, Pervasive.
[6] Colin J. Bennett,et al. The Distribution of Privacy Risks: Who Needs Protection? , 1998, Inf. Soc..
[7] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[8] M. Zimmer,et al. Surveillance, Privacy and the Ethics of Vehicle Safety Communication Technologies , 2005, Ethics and Information Technology.
[9] Gary T. Marx,et al. What's New About the "New Surveillance"? Classifying for Change and Continuity. , 2002 .
[10] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[11] Jacques Penders,et al. Privacy in (mobile) Telecommunications Services , 2004, Ethics and Information Technology.
[12] J. Snow. On the Mode of Communication of Cholera , 1856, Edinburgh medical journal.
[13] J. E. Ross. Germany's Federal Constitutional Court and the Regulation of GPS surveillance , 2005, German Law Journal.
[14] S. Margulis. On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .
[15] E. J. Koops,et al. Opsporing versus privacy : de beleving van burgers , 2001 .
[16] Gary T. Marx,et al. A Tack in the Shoe: Neutralizing and Resisting the New Surveillance , 2003 .
[17] Verena Zöller. Liberty Dies by Inches: German Counter-Terrorism Measures and Human Rights , 2004, German Law Journal.
[18] M. Levi,et al. Technologies, Security, and Privacy in the Post-9/11 European Information Society , 2004 .
[19] Eija Kaasinen,et al. User acceptance of location-aware mobile guides based on seven field studies , 2005, Behav. Inf. Technol..
[20] I. Cameron. National Security and the European Convention on Human Rights , 2000 .
[21] A. Westin. Social and Political Dimensions of Privacy , 2003 .
[22] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[23] Gerald L. Lohse,et al. International Differences in Information Privacy Concerns: A Global Survey of Consumers , 2004, Inf. Soc..
[24] Gregory J. Walters,et al. Privacy and security: an ethical analysis , 2001, CSOC.
[25] Nicole Jacoby. The Decision of the Bundesverfassungsgericht of April 12, 2005 – Concerning Police Use of Global Position Systems as a Surveillance Tool , 2005, German Law Journal.
[26] R. Ericson,et al. The surveillant assemblage. , 2000, The British journal of sociology.
[27] Ronald Leenes,et al. ‘Code’ and the Slow Erosion of Privacy , 2005 .
[28] J. Crawford,et al. The margin of appreciation doctrine and the principle of proportionality in the jurisprudence of the ECHR , 2002 .
[29] B. V. Loenen. Developing geographic information infrastructure: The role of information policies , 2006 .
[30] Gary T. Marx,et al. An Ethics For The New Surveillance , 1998, Inf. Soc..
[31] Wonil Kim,et al. An Effective Method for Location Privacy in Ubiquitous Computing , 2005, EUC Workshops.
[32] H. Albrecht,et al. Rechtswirklichkeit und Effizienz der Überwachung der Telekommunikation nach den §§ 100a, 100b StPO und anderer verdeckter Ermittlungsmaßnahmen , 2003 .