Privacy, Due Process and the Computational Turn : The Philosophy of Law Meets the Philosophy of Technology
暂无分享,去创建一个
[1] Helen Nissenbaum,et al. Trackmenot: Resisting Surveillance in Web Search , 2015 .
[2] J. Reiman. Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Highway Technology of the Future , 1995 .
[3] Helen Nissenbaum,et al. On Notice: The Trouble with Notice and Consent , 2009 .
[4] Helen Nissenbaum,et al. The Meaning of Anonymity in an Information Age , 1999, Inf. Soc..
[5] Jonathan M. Smith,et al. Disinformation: A Taxonomy , 2011, IEEE Security & Privacy.
[6] James C. Scott,et al. Weapons of the Weak: Everyday Forms of Peasant Resistance. , 1985, The Journal of Asian Studies.
[7] J. Waldron,et al. Security and Liberty: The Image of Balance* , 2003 .
[8] Francisco Goldman,et al. The Art of Political Murder: Who Killed the Bishop? , 2007 .
[9] Chris Jay Hoofnagle,et al. Model Regime of Privacy Protection, A , 2006 .
[10] William W. Stead,et al. Computational Technology for Effective Health Care , 2009 .
[11] Daniel J. Solove,et al. Data Mining and the Security-Liberty Debate , 2007 .
[12] Tal Zarsky. Online Privacy, Tailoring, and Persuasion , 2006 .
[13] Christopher Soghoian. Manipulation and Abuse of the Consumer Credit Reporting Agencies , 2009, First Monday.
[14] Gloria González Fuster,et al. Inaccuracy as a privacy-enhancing tool , 2010, Ethics and Information Technology.
[15] Qi Xie,et al. FaceCloak: An Architecture for User Privacy on Social Networking Sites , 2009, 2009 International Conference on Computational Science and Engineering.