Assessing Security Technology’s Impact: Old Tools for New Problems
暂无分享,去创建一个
[1] Daniel J. Solove,et al. Privacy and Power: Computer Databases and Metaphors for Information Privacy , 2001 .
[2] B. Glassner. The Culture of Fear: Why Americans Are Afraid of the Wrong Things , 1999 .
[3] Paul Henman,et al. Alternatives : global, local, political , 2004 .
[4] Claire Haggett. Risk and Responsibility at 30,000 Feet , 2010 .
[5] P. Badke-Schaub,et al. Human Factors: Psychologie Sicheren Handelns in Risikobranchen , 2012 .
[6] N. Luhmann. Risk: A Sociological Theory , 1993 .
[7] A. Giddens. The consequences of modernity , 1990 .
[8] M. Goede,et al. The Politics of Preemption and the War on Terror in Europe , 2008 .
[9] Gernot Böhme,et al. Das Andere der Vernunft : zur Entwicklung von Rationalitätsstrukturen am Beispiel Kants , 1985 .
[10] Didier Bigo,et al. Security and Immigration: Toward a Critique of the Governmentality of Unease , 2002 .
[11] Gary T. Marx. Surveillance Studies , 2015 .
[12] D. Boyd. Facebook's Privacy Trainwreck , 2008 .
[13] David Lyon,et al. The Electronic Eye: The Rise of Surveillance Society , 1994 .
[14] T. Abel,et al. Mind, Self, and Society , 1934 .
[15] S. Brown. The criminology of hybrids , 2006 .
[16] Michaelis Lianos. DANGERIZATION AND THE END OF DEVIANCE The Institutional Environment , 2000 .
[17] R. Ekins,et al. The Transgender Phenomenon , 2006 .
[18] Nikolas Rose,et al. Foucault and Political Reason: Liberalism, Neo-Liberalism, and Rationalities of Government , 1997 .
[19] Coen Van Gulijk,et al. Airport security: An ethnographic study , 2012 .
[20] A. J. Grimes. Normal Accidents: Living with High Risk Technologies , 1985 .
[21] Julie E. Cohen. DRM and privacy , 2003, CACM.
[22] B. Latour. The pasteurization of France , 1988 .
[23] Ulrich Beck,et al. World Risk Society , 1999 .
[24] Lucia Zedner,et al. Pre-crime and post-criminology? , 2007 .
[25] B. Buzan,et al. Security: A New Framework for Analysis , 1997 .
[26] J. Urry,et al. Economies of signs and space , 1994 .
[27] J. Urry. Sociology beyond societies : mobilities for the twenty-first century , 2000 .
[28] Stephen J. Collier,et al. Global assemblages : technology, politics, and ethics as anthropological problems , 2005 .
[29] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[30] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[31] Katayoun Baghai,et al. Privacy as a Human Right: A Sociological Theory , 2012 .
[32] A. Giddens. Modernity and Self-Identity: Self and Society in the Late Modern Age , 1992, The New Social Theory Reader.
[33] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[34] M. Tomasello. Origins of human communication , 2008 .
[35] Reproductive Freedom, Self-Regulation, and the Government of Impairment in Utero , 2005, Hypatia.
[36] J. Habermas. The Structural Transformation of the Public Sphere , 1962 .
[37] A. Giddens. Risk and Responsibility , 1999 .
[38] T. Meyer. Was ist Politik , 2000 .
[39] F. Braudel,et al. Civilization And Capitalism, 15Th-18Th Century , 1981 .
[40] Josef Foschepoth. Überwachtes Deutschland: Post- und Telefonüberwachung in der alten Bundesrepublik , 2014 .
[41] C. B. Macpherson. The Political Theory of Possessive Individualism: Hobbes to Locke , 1962 .
[42] Julien Offray de la Mettrie,et al. Machine Man and Other Writings: Contents , 1996 .
[43] Lucia Zedner. Securing Liberty in the Face of Terror: Reflections from Criminal Justice , 2005 .