Policy Design Based on Risk at Big Data Era: Case Study of Privacy Invasion in South Korea
暂无分享,去创建一个
[1] Mark Cenite. Code and Other Laws of Cyberspace , 2000 .
[2] Agata Sawicka,et al. A Framework for Human Factors in Information Security , 2002 .
[3] James W. DeLoach,et al. Enterprise-wide risk management : strategies for linking risk and opportunity , 2000 .
[4] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[5] P. May,et al. Widespread Policy Disruption: Terrorism, Public Risks, and Homeland Security , 2009 .
[6] P. May,et al. Widespread Policy Disruption and Interest Mobilization , 2009 .
[7] Roger W. Cobb,et al. Agenda Building as a Comparative Political Process , 1976, American Political Science Review.
[8] P. Slovic. Perception of risk. , 1987, Science.
[9] H. Wetzler,et al. Risk /Benefit Analysis , 1983 .
[10] Andreas Norrman,et al. Ericsson’s Proactive Supply Chain Risk Management-approach After a Serious Supplier Accident , 2004 .
[11] M. O'hare,et al. Searching for Safety , 1990 .
[12] M. Douglas,et al. Essays in the Sociology of Perception , 1982 .
[13] P. May. Reconsidering Policy Design: Policies and Publics , 1991, Journal of Public Policy.
[14] Amanat Hussain. Enterprise-wide risk management , 2000 .
[15] M. Douglas,et al. Risk and Culture: An Essay on the Selection of Technological and Environmental Dangers , 1983 .