Reloading Data Protection
暂无分享,去创建一个
[1] J. Vervaele. Special procedural measures and respect of human rights : general report , 2009 .
[2] Gary T. Marx,et al. What's New About the "New Surveillance"? Classifying for Change and Continuity. , 2002 .
[3] Charles Fried. Philosophical Dimensions of Privacy: Privacy [a moral analysis] , 1984 .
[4] Joshua Reeves. If You See Something, Say Something: Lateral Surveillance and the Uses of Responsibility , 2012 .
[5] Alisdair A. Gillespie. Regulation of internet surveillance. , 2009 .
[6] David Lyon,et al. The Electronic Eye: The Rise of Surveillance Society , 1994 .
[7] Daniel J. Solove,et al. Privacy and Power: Computer Databases and Metaphors for Information Privacy , 2001 .
[8] G. Armstrong,et al. The Maximum Surveillance Society: The Rise of CCTV , 1999 .
[9] Colin J. Bennett. The governance of privacy , 2003 .
[10] Paul Schwartz. The Computer in German and American Constitutional Law: Towards an American Right of Informational Self-Determination , 1989 .
[11] J. Beatson. Human rights : judicial protection in the United Kingdom , 2008 .
[12] M. Poster. The Mode of Information: Poststructuralism and Social Context , 1990 .
[13] M. Castells. The rise of the network society , 1996 .
[14] M. Mccahill. The surveillance web : the rise of visual surveillance in an English city , 2002 .
[15] M. Foucault,et al. Surveiller et punir: Naissance de la prison , 1993 .
[16] E. Goffman. The Presentation of Self in Everyday Life , 1959 .
[17] J. Naughton. A Brief History of the Future: The Origins of the Internet , 1999 .
[18] B. Simon. The Return of Panopticism: Supervision, Subjection and the New Surveillance , 2002 .
[19] Trevor Darrell,et al. Privacy in Context , 2001, Hum. Comput. Interact..
[20] Darren Cornwell. Recon Scout XT , 2011 .
[21] Jeffrey Rosen,et al. The Right to Be Forgotten , 2012 .
[22] H. Fenwick,et al. Civil Liberties and Human Rights , 2002 .
[23] James Michael. Privacy and human rights : an international and comparative study, with special reference to developments in information technology , 1994 .
[24] E. Böckenförde. Grundrechtstheorie und Grundrechtsinterpretation , 1974 .
[25] J. M. D. Meiklejohn,et al. The Critique of Pure Reason , 2020, A Commentary on Kant’s Critique of Judgment.
[26] S. Davies,et al. Big brother : Britain's web of surveillance and the new technological order , 1996 .
[27] J. Mcculloch,et al. Pre-Crime and Counter-Terrorism Imagining Future Crime in the ‘War on Terror’ , 2009 .
[28] Benjamin J. Goold,et al. Surveillance and the Political Value of Privacy , 2009 .
[29] James Bamford,et al. The Shadow Factory , 2008 .
[30] James B. Rule. Privacy in peril , 2007 .
[31] Simon N. L. Chalton,et al. Data protection law , 1988 .
[32] T. Murphy,et al. Works in Progress: New Technologies and the European Court of Human Rights , 2010 .
[33] Emmanuelle Rial-Sebbag,et al. Legislation on direct-to-consumer genetic testing in seven European countries , 2012, European Journal of Human Genetics.
[34] Gregory Piatetsky-Shapiro,et al. Knowledge Discovery in Databases: An Overview , 1992, AI Mag..
[35] A. Mcharg. Reconciling Human Rights and the Public Interest: Conceptual Problems and Doctrinal Uncertainty in the Jurisprudence of the European Court of Human Rights , 1999 .
[36] J W Gardner and P N Bartlett,et al. Electronic Noses: Principles and Applications , 1999 .
[37] Nora Ni Loideain. Assessing the Evaluation of the EC Data Retention Directive , 2012 .
[38] B. Roessler,et al. Der Wert des Privaten , 2001 .
[39] Lee A. Bygrave,et al. Data protection pursuant to the right to privacy in human rights treaties , 1998, Int. J. Law Inf. Technol..
[40] Omer Tene. What Google Knows: Privacy and Internet Search Engines , 2007 .
[41] Oliver Leistert. Resistance against Cyber-Surveillance within Social Movements and how Surveillance Adapts , 2012 .
[42] Colin J. Bennett. Regulating privacy: data protection and public policy in europe and the u , 1992 .
[43] D. Lyon. Surveillance Studies: An Overview , 2007 .
[44] Roy Want,et al. An Introduction to Ubiquitous Computing , 2010, Ubicomp 2010.
[45] Ada Pellegrini Grinover,et al. Código brasileiro de defesa do consumidor comentado pelos autores do anteprojeto , 1991 .
[46] S. Kraemer. Steps to an Ecology of Mind: Gregory Bateson , 1993, British Journal of Psychiatry.
[47] Robin C. A. White,et al. European Convention on Human Rights , 1972, International and Comparative Law Quarterly.
[48] Stanley H. Cohen,et al. The punitive city: Notes on the dispersal of social control , 1979 .
[49] Isaiah Berlin,et al. Two Concepts of Liberty , 1958 .
[50] Daniel J. Solove. The Digital Person , 2022 .
[51] B. Pieroth. Grundrechte Staatsrecht II , 2006 .
[52] S. Brown. The criminology of hybrids , 2006 .
[53] Manuel Castells,et al. The Information Age: Economy, Society and Culture , 1999 .
[54] D. Lyon. Surveillance after September 11 , 2001 .
[55] C. Raab,et al. Protecting Information Privacy , 2011 .
[56] Anthony Giddens. Modernity and self-identity , 1991 .
[57] Jef Ausloos,et al. The Right to Be Forgotten Across the Pond , 2013, Journal of Information Policy.
[58] G. Jakobs. Burgerstrafrecht und Feindstrafrecht , 2004 .
[59] Lauren D. Adkins,et al. Biometrics: Weighing Convenience and National Security against Your Privacy , 2007 .
[60] Roger A. Clarke,et al. Information technology and dataveillance , 1988, CACM.
[61] Julia Macke,et al. European Union Agency for Fundamental Rights , 2006 .
[62] Marta Kanashiro,et al. Surveillance Cameras in Brazil: exclusion, mobility regulation, and the new meanings of security ∗ , 2002 .
[63] J. Nicolas. Secretary of state for the home department , 2010 .
[64] M. Castells. The Information Age: Economy, Society and Culture , 1999 .
[65] Johannes Andenaes,et al. General Preventive Effects of Punishment , 1966 .
[66] David Aaron,et al. A New Concept , 1974 .
[67] Simone Frattasi,et al. Mobile Positioning and Tracking: From Conventional to Cooperative Techniques , 2010 .
[68] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[69] Ian Brown. Communications Data Retention in an Evolving Internet , 2011, Int. J. Law Inf. Technol..
[70] Michael O'Boyle,et al. Law of the European Convention on Human Rights , 2014 .
[71] Eoghan Casey,et al. Digital Evidence and Computer Crime , 2000 .
[72] Didier Bigo,et al. Fighting cyber crime and protecting privacy in the cloud , 2012 .
[73] Ronald Leenes,et al. Constitutional Rights and New Technologies , 2008 .
[74] K. Haggerty. Tear down the walls: on demolishing the panopticon , 2006 .
[75] Serge Gutwirth,et al. Privacy and the Information Age , 2001 .
[76] Ronald Leenes,et al. Framing Techno-Regulation: An Exploration of State and Non-State Regulation by Technology , 2011 .
[77] Spiros Simitis,et al. Reviewing Privacy In an Information Society , 1987 .
[78] P. Duyne. The phantom and threat of organized crime , 1995 .
[79] P. Agre,et al. Technology and privacy: The new landscape , 1998 .
[80] Bibi van den Berg,et al. The Situated Self: Identity in a world of Ambient Intelligence , 2010 .
[81] B. Hudson. Justice in the risk society , 2003 .
[82] G. Sewell,et al. Coercion Versus Care: Using Irony to Make Sense of Organizational Surveillance , 2006 .
[83] David Lyon,et al. Liquid Surveillance: The Contribution of Zygmunt Bauman to Surveillance Studies , 2010 .
[84] Sjaak Nouwt,et al. Camera Surveillance and Privacy in the Netherlands , 2005 .
[86] D. Bainbridge. Data protection , 2000 .
[87] Paul McBride. Beyond Orwell : the application of unmanned aircraft systems in domestic surveillance operations , 2009 .
[88] François Ost,et al. De la pyramide au réseau ? Pour une théorie dialectique du droit , 2010 .
[89] Brad Amorsino. I have nothing to hide , 2013 .
[90] Rachel Finn,et al. Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications , 2012, Comput. Law Secur. Rev..
[91] R. Ericson,et al. Policing the Risk Society , 1997 .
[92] Danilo Doneda. Da Privacidade à Proteção de Dados Pessoais , 2006 .
[93] Viktor Mayer-Schonberger,et al. Beyond Privacy, beyond Rights - Toward a Systems Theory of Information Governance , 2010 .
[94] Marc Langheinrich,et al. Privacy in Ubiquitous Computing , 2014 .
[95] Viktor Mayer-Schönberger,et al. Generational development of data protection in Europe , 1997 .
[96] K. Ball,et al. Routledge Handbook of Surveillance Studies , 2014 .
[97] R. Williamson. A solution looking for a problem? , 2015, Anaesthesia.
[98] C. Vega. European Union Agency for Fundamental Rights (FRA) , 2013 .
[99] Colin J. Bennett,et al. The Governance of Privacy: Policy Instruments in Global Perspective , 2006 .
[100] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[101] M. Andrejevic. The Work of Watching One Another: Lateral Surveillance, Risk, and Governance , 2002 .
[102] Daniel Pipes. The Real Problem , 1983 .
[103] Andreas Gerstlauer,et al. System Design , 2012 .
[104] D. Bell. The Coming of the Post-Industrial Society , 1973 .
[105] Dear Mr Sotiropoulos. ARTICLE 29 Data Protection Working Party , 2013 .
[106] Viktor Mayer-Schönberger,et al. Delete: The Virtue of Forgetting in the Digital Age , 2009 .
[107] Christopher Soghoian. The Law Enforcement Surveillance Reporting Gap , 2011 .
[108] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[109] G. Elmer. Panopticon—discipline—control , 2012 .
[110] Fred F. Manget. Intelligence and the Criminal Law System , 2006 .
[111] Social Media Sites: New Fora for Criminal, Communication, and Investigation Opportunities , 2011 .
[112] J. Crawford,et al. The margin of appreciation doctrine and the principle of proportionality in the jurisprudence of the ECHR , 2002 .
[113] Andrés Guadamuz González. Habeas Data: The Latin-American response to Data Protection , 2000, Journal of Information, Law and Technology.
[114] D. Brin. The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? , 1998 .
[115] Malcolm M Feeley. Actuarial Justice: the Emerging New Criminal Law , 1994 .
[116] Andrew Z. Drzemczewski. European Human Rights Convention in Domestic Law: A Comparative Study , 1983 .
[117] C. Gearty. The European Court of Human Rights and the Protection of Civil Liberties: an Overview , 1993, The Cambridge Law Journal.
[118] Brian Hayes,et al. What Is Cloud Computing? , 2019, Cloud Technologies.
[119] Gary T. Marx,et al. Undercover: Police Surveillance in America , 1988 .
[120] F. Schoeman,et al. Privacy and Social Freedom , 1992 .
[121] Paul De Hert,et al. Policing, surveillance and law in a pre-crime society: Understanding the consequences of technology based strategies. , 2011 .
[122] B. Turner. European Union (EU) , 1999 .
[123] Wolfgang Hoffmann-Riem,et al. Das Grundrecht auf Schutz der Vertraulichkeit und Integrität eigengenutzter informationstechnischer Systeme , 2008 .
[124] David Murakami Wood,et al. Social Control after Foucault. , 2003 .
[125] Gary T. Marx,et al. Seeing Hazily (But Not Darkly) Through the Lens: Some Recent Empirical Studies of Surveillance Technologies , 2005, Law & Social Inquiry.
[126] M. Goede,et al. The Politics of Preemption and the War on Terror in Europe , 2008 .
[127] W. Hoffmann-riem. Grundrechts- und Funktionsschutz für elektronisch vernetzte Kommunikation , 2009 .
[128] B. Emmerson. Human Rights and Criminal Justice , 2001 .
[129] Mohammad Ilyas,et al. Smart Dust , 2006 .
[130] L. Román. The Institutional Environment , 1999 .
[131] A. Ashworth. Four Threats to the Presumption of Innocence , 2006 .
[132] Michael Friedewald,et al. Sorting out smart surveillance , 2010, Comput. Law Secur. Rev..
[133] Ronald E. Leenes,et al. Audience Segregation in Social Network Sites , 2010, 2010 IEEE Second International Conference on Social Computing.
[134] L. Floridi. The Ontological Interpretation of Informational Privacy , 2005, Ethics and Information Technology.
[135] E. Goffman. Stigma; Notes On The Management Of Spoiled Identity , 1964 .
[136] T. Misa,et al. Modernity and Technology , 2002 .
[137] Diomidis Spinellis,et al. The Athens Affair , 2007, IEEE Spectrum.
[138] Gary T. Marx,et al. A Tack in the Shoe: Neutralizing and Resisting the New Surveillance , 2003 .
[139] C. Marsden. Internet Co-Regulation: European Law, Regulatory Governance and Legitimacy in Cyberspace , 2011 .
[140] I. Brown,et al. Terrorism and the Proportionality of Internet Surveillance , 2009 .
[141] R. Ericson,et al. The New Politics of Surveillance and Visibility , 2006 .
[142] Gang Wei,et al. Biometrics: Applications, Challenges and the Future , 2006 .
[143] Susan Landau,et al. Communications surveillance , 2009, Commun. ACM.
[144] Colin J. Bennett,et al. The Adequacy of Privacy: the European Union Data Protection Directive and the North American Response , 1997, Inf. Soc..
[145] Jim Gemmell,et al. Total Recall: How the E-Memory Revolution Will Change , 2009 .