暂无分享,去创建一个
Paul van Schaik | Karen Renaud | Alastair Irons | Sara Wilford | K. Renaud | A. Irons | P. Schaik | S. Wilford
[1] Jeremy Bentham,et al. The Panopticon Writings , 1995 .
[2] Lorrie Faith Cranor,et al. Security and Usability: Designing Secure Systems that People Can Use , 2005 .
[3] William G. Holt. The Communitarian Reader: Beyond the Essentials , 2006 .
[4] Tamara Dinev,et al. Internet privacy concerns and beliefs about government surveillance - An empirical investigation , 2008, J. Strateg. Inf. Syst..
[5] William Sadera,et al. Cyberethics, Cybersafety, and Cybersecurity , 2011 .
[6] J. Potterat,et al. Partner notification for sexually transmitted infections in the modern world: a practitioner perspective on challenges and opportunities , 2011, Sexually Transmitted Infections.
[7] William Bülow,et al. Nothing to Hide : The False Tradeoff between Privacy and Security by Daniel J. Solove , 2012 .
[8] Alan D. Schrift,et al. Discipline and Punish , 2013 .
[9] Simone Wannemaker. Security And Usability Designing Secure Systems That People Can Use , 2016 .
[10] Kyung Kyu Kim,et al. Information and communication technology overload and social networking service fatigue: A stress perspective , 2016, Comput. Hum. Behav..
[11] Lisa Grow Sun,et al. War Rhetoric and Disaster Transparency , 2016 .
[12] David Lyon. Bentham’s Panopticon: From Moral Architecture to Electronic Surveillance , 2017 .
[13] Robin Kleer,et al. Walking Parallel Paths or Taking the Same Road? The Effect of Collaborative Incentives in Innovation Contests , 2017, Managing Innovation.
[14] Lorrie Faith Cranor,et al. Putting Privacy Notices to the Test , 2017 .
[15] Matthew Deaves,et al. General Data Protection Regulation (GDPR) , 2017 .
[16] J. Murphy. The General Data Protection Regulation (GDPR) , 2018, Irish medical journal.
[17] Sandra J Valenti. About Being Accessible: Your Communication from a Universal Design Perspective , 2018 .
[18] J. Mulderrig. Multimodal strategies of emotional governance: a critical analysis of ‘nudge’ tactics in health policy , 2018 .
[19] Nathaniel J. S. Ashby,et al. The effect of switching costs on choice-inertia and its consequences , 2019, PloS one.
[20] Carl Landwher,et al. 2018 , 2019, Communications of the ACM.
[21] Shoshana Zuboff. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power , 2019 .
[22] Lucie Abeler-Dörner,et al. Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing , 2020, Science.
[23] Lorrie Faith Cranor,et al. Ask the Experts: What Should Be on an IoT Privacy and Security Label? , 2020, 2020 IEEE Symposium on Security and Privacy (SP).
[24] Florimond Houssiau,et al. Blogpost: Evaluating COVID-19 contact tracing apps? Here are 8 privacy questions we think you should ask , 2020 .
[25] Mark Zastrow,et al. South Korea is reporting intimate details of COVID-19 cases: has it helped? , 2020, Nature.
[26] Kristie B. Hadden,et al. 2020 , 2020, Journal of Surgical Orthopaedic Advances.