Vernacular resistance to data collection and analysis: A political theory of obfuscation
暂无分享,去创建一个
[1] J. Reiman. Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Highway Technology of the Future , 1995 .
[2] Daniel J. Solove,et al. Data Mining and the Security-Liberty Debate , 2007 .
[3] Tal Zarsky. Online Privacy, Tailoring, and Persuasion , 2006 .
[4] Dominick A. Pisano,et al. A Passion for Wings: Aviation and the Western Imagination, 1908-1918 , 1994 .
[5] William W. Stead,et al. Committee on Engaging the Computer Science Research Community in Health Care Informatics , 2009 .
[6] Herbert S. Lin,et al. Computational Technology for Effective Health Care: Immediate Steps and Strategic Directions , 2009 .
[7] Mireille Hildebrandt,et al. Profiling and the rule of law , 2008 .
[8] Helen Nissenbaum,et al. On Notice: The Trouble with Notice and Consent , 2009 .
[9] F. Cohen. The Use of Deception Techniques : Honeypots and Decoys , 2004 .
[10] Helen Nissenbaum,et al. The Meaning of Anonymity in an Information Age , 1999, Inf. Soc..
[11] Qi Xie,et al. FaceCloak: An Architecture for User Privacy on Social Networking Sites , 2009, 2009 International Conference on Computational Science and Engineering.
[12] Guillaume de Syon,et al. The Spectacle of Flight: Aviation and the Western Imagination 1920-1950, by Robert WohlThe Spectacle of Flight: Aviation and the Western Imagination 1920-1950, by Robert Wohl. New Haven, Connecticut, Yale University Press, 2005. x, 364 pp. $39.95 US (cloth). , 2006 .
[13] Suman Nath,et al. Privacy-Preserving Reconstruction of Multidimensional Data Maps in Vehicular Participatory Sensing , 2010, EWSN.
[14] Bryan Pfaffenberger,et al. Technological Dramas , 1992 .
[15] S. Fender. The New York Review of Books , 1986 .
[16] Gary T. Marx,et al. A Tack in the Shoe: Neutralizing and Resisting the New Surveillance , 2003 .
[17] Jonathan M. Smith,et al. Disinformation: A Taxonomy , 2011, IEEE Security & Privacy.
[18] Romit Roy Choudhury,et al. Hiding stars with fireworks: location privacy through camouflage , 2009, MobiCom '09.
[19] Julian Freeman,et al. THE SPECTACLE OF FLIGHT AVIATION AND THE WESTERN IMAGINATION, 1920–1950 , 2006 .
[20] Mani Subramani,et al. How Do Suppliers Benefit from Information Technology Use in Supply Chain Relationships? , 2004, MIS Q..
[21] Gloria González Fuster,et al. Inaccuracy as a privacy-enhancing tool , 2010, Ethics and Information Technology.
[22] Neil Postman,et al. Informing Ourselves to Death , 2013 .
[23] Hugh Kenner,et al. A Passion For Wings: Aviation and the Western Imagination, 1908-1918 , 1995 .
[24] H. Nissenbaum. Toward an Approach to Privacy in Public: Challenges of Information Technology , 1997 .
[25] Katherine J. Strandburg,et al. Privacy and Technologies of Identity: A Cross-Disciplinary Conversation , 2005 .