Locating mobile devices : balancing privacy and national security

[1]  E. J. Koops Tendensen in opsporing en technologie: Over twee honden en een kalf , 2006 .

[2]  F. Miedema,et al.  Evaluatie pilot elektronische volgsystemen , 2006 .

[3]  J. Dempsey,et al.  Terrorism and the constitution : sacrificing civil liberties in the name of national security , 2006 .

[4]  Richard S. Rosenberg,et al.  RFID: The Next Serious Threat to Privacy , 2005, Ethics and Information Technology.

[5]  Paul Müller,et al.  Tackling Security and Privacy Issues in Radio Frequency Identification Devices , 2004, Pervasive.

[6]  Colin J. Bennett,et al.  The Distribution of Privacy Risks: Who Needs Protection? , 1998, Inf. Soc..

[7]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[8]  M. Zimmer,et al.  Surveillance, Privacy and the Ethics of Vehicle Safety Communication Technologies , 2005, Ethics and Information Technology.

[9]  Gary T. Marx,et al.  What's New About the "New Surveillance"? Classifying for Change and Continuity. , 2002 .

[10]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[11]  Jacques Penders,et al.  Privacy in (mobile) Telecommunications Services , 2004, Ethics and Information Technology.

[12]  J. Snow On the Mode of Communication of Cholera , 1856, Edinburgh medical journal.

[13]  J. E. Ross Germany's Federal Constitutional Court and the Regulation of GPS surveillance , 2005, German Law Journal.

[14]  S. Margulis On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .

[15]  E. J. Koops,et al.  Opsporing versus privacy : de beleving van burgers , 2001 .

[16]  Gary T. Marx,et al.  A Tack in the Shoe: Neutralizing and Resisting the New Surveillance , 2003 .

[17]  Verena Zöller Liberty Dies by Inches: German Counter-Terrorism Measures and Human Rights , 2004, German Law Journal.

[18]  M. Levi,et al.  Technologies, Security, and Privacy in the Post-9/11 European Information Society , 2004 .

[19]  Eija Kaasinen,et al.  User acceptance of location-aware mobile guides based on seven field studies , 2005, Behav. Inf. Technol..

[20]  I. Cameron National Security and the European Convention on Human Rights , 2000 .

[21]  A. Westin Social and Political Dimensions of Privacy , 2003 .

[22]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[23]  Gerald L. Lohse,et al.  International Differences in Information Privacy Concerns: A Global Survey of Consumers , 2004, Inf. Soc..

[24]  Gregory J. Walters,et al.  Privacy and security: an ethical analysis , 2001, CSOC.

[25]  Nicole Jacoby The Decision of the Bundesverfassungsgericht of April 12, 2005 – Concerning Police Use of Global Position Systems as a Surveillance Tool , 2005, German Law Journal.

[26]  R. Ericson,et al.  The surveillant assemblage. , 2000, The British journal of sociology.

[27]  Ronald Leenes,et al.  ‘Code’ and the Slow Erosion of Privacy , 2005 .

[28]  J. Crawford,et al.  The margin of appreciation doctrine and the principle of proportionality in the jurisprudence of the ECHR , 2002 .

[29]  B. V. Loenen Developing geographic information infrastructure: The role of information policies , 2006 .

[30]  Gary T. Marx,et al.  An Ethics For The New Surveillance , 1998, Inf. Soc..

[31]  Wonil Kim,et al.  An Effective Method for Location Privacy in Ubiquitous Computing , 2005, EUC Workshops.

[32]  H. Albrecht,et al.  Rechtswirklichkeit und Effizienz der Überwachung der Telekommunikation nach den §§ 100a, 100b StPO und anderer verdeckter Ermittlungsmaßnahmen , 2003 .