The information infrastructures of 1985 and 2018: The sociotechnical context of computer law & security
暂无分享,去创建一个
[1] Howard Rheingold,et al. Virtual Community , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[2] Roger Clarke,et al. Big Data's Big Unintended Consequences , 2013, Computer.
[3] Frederick Hayes-Roth,et al. Building expert systems , 1983, Advanced book program.
[4] E. Higgs. The Information State in England: The Central Collection of Information on Citizens since 1500 , 2004 .
[5] Roger Clarke,et al. Big data, big risks , 2016, Inf. Syst. J..
[6] David Lyon,et al. The Electronic Eye: The Rise of Surveillance Society , 1994 .
[7] András Kornai. Digital language death , 2013 .
[8] Esther H. Highland. Insurance and the hacker: David Davies Computer Control Quarterly, Spring 1988, pp. 28–30 , 1988 .
[9] Jay F. Nunamaker,et al. Information Technology to Support Electronic Meetings , 1988, MIS Q..
[10] Roger Clarke,et al. Property rights in knowledge-based products and applications , 1989 .
[11] Jay F. Nunamaker,et al. Electronic Meeting System Experience at IBM , 1989, J. Manag. Inf. Syst..
[12] Roger Clarke,et al. Electronic interaction research 1988 – 2012 through the lens of the Bled eConference , 2013, Electron. Mark..
[13] Roger Clarke,et al. The Feasibility of Consumer Device Security , 2007 .
[14] Frank A. Pasquale. The Black Box Society: The Secret Algorithms That Control Money and Information , 2015 .
[15] Wendell Bell,et al. The Third Wave. , 1982 .
[16] Richard E. Susskind,et al. Latent Damage Law - the Expert System , 1988 .
[17] Roger Clarke. How reliable is cloudsourcing? A review of articles in the technical media 2005-11 , 2012, Comput. Law Secur. Rev..
[18] Shoshana Zuboff,et al. Big other: surveillance capitalism and the prospects of an information civilization , 2015, J. Inf. Technol..
[19] Sarah Spiekermann,et al. Networks of Control: A Report on Corporate Surveillance, Digital Tracking, Big Data & Privacy , 2016 .
[20] Graham Greenleaf,et al. Subverting ID from Above and Below: The Uncertain Shaping of India's New Instrument of E-Governance , 2013 .
[21] H. Dauncey. A Cultural Battle , 1997 .
[22] Richard S. Rosenberg. Computers and the information society , 1986 .
[23] Robert J. Kauffman,et al. Strategies for Internet Middlemen in the Intermediation/Disintermediation/Reintermediation Cycle , 1999, Electron. Mark..
[24] J. Schumpeter,et al. Business Cycles: A Theoretical, Historical, and Statistical Analysis of the Capitalist Process , 1940 .
[25] R. Kurzweil,et al. The Singularity Is Near: When Humans Transcend Biology , 2006 .
[26] Ronald L. Larsen,et al. Computer and Information Technology in the Year 2000-Projection , 1985, Computer.
[27] Roger Clarke. Quality Assurance for Security Applications of Big Data , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).
[28] Roger Clarke,et al. Understanding the drone epidemic , 2014, Comput. Law Secur. Rev..
[29] Mark Andrejevic,et al. The big data divide , 2014 .
[30] Cacm Staff. Information wants to be free , 2013 .
[31] Nitin Agarwal,et al. Raising and Rising Voices in Social Media , 2012, Bus. Inf. Syst. Eng..
[32] Roger A. Clarke. Information Technology: Weapon of Authoritarianism or Tool of Democracy? , 1994, IFIP Congress.
[33] Frank F. Land,et al. Evaluation in a Socio-technical Context , 2000, Organizational and Social Perspectives on IT.
[34] Colin Tapper. Computer Law , 1978 .
[35] Roger Clarke,et al. You are where you’ve been: the privacy implications of location and tracking technologies , 2011, J. Locat. Based Serv..
[36] Roger Clarke,et al. Person location and person tracking - Technologies, risks and policy implications , 2001, Inf. Technol. People.
[37] Roger Clarke,et al. Risks inherent in the digital surveillance economy: A research agenda , 2019, Journal of Information Technology.
[38] Simone Fischer Hübner,et al. Teaching Privacy-Enhancing Technologies , 2001 .
[39] Peter Buck,et al. What is cyberspace? , 1992, Comput. Law Secur. Rev..
[40] Roger Clarke,et al. A Framework for the Evaluation of CloudSourcing Proposals , 2012 .
[41] Roger A. Clarke,et al. Information technology and dataveillance , 1988, CACM.
[43] P. Parijs. Basic Income : A Simple and Powerful Idea for the 21st century , 2003 .
[44] Jakob Nielsen,et al. Hypertext and hypermedia , 1990 .
[45] Donald A. Norman,et al. Affordance, conventions, and design , 1999, INTR.
[46] Roger Clarke,et al. Data Risks in the Cloud , 2013, J. Theor. Appl. Electron. Commer. Res..
[47] Roger A. Clarke,et al. A contingency approach to the application software generations , 1991, DATB.
[48] Roger Clarke,et al. Technological Protections for Digital Copyright Objects , 2000, ECIS.
[49] Roger Clarke. Extra-Organisational Systems: A Challenge to the Software Engineering Paradigm , 1992, IFIP Congress.
[50] Roger Clarke. The Cloudy Future of Consumer Computing , 2011, Bled eConference.
[51] Donald J. McCubbrey,et al. Disintermediation and Reintermediation in the U.S. Air Travel Distribution Industry: A Delphi Study , 1999, Commun. Assoc. Inf. Syst..
[52] T. H. Nelson,et al. Complex information processing: a file structure for the complex, the changing and the indeterminate , 1965, ACM '65.
[53] C. Fuchs. Digital Demagogue: Authoritarian Capitalism in the Age of Trump and Twitter , 2018 .
[54] Starr Roxanne Hiltz,et al. Network Nation: Human Communication Via Computer , 1979 .
[55] J. J. Gibson. The theory of affordances , 1977 .
[56] Roger Clarke,et al. Guidelines for the responsible application of data analytics , 2017, Comput. Law Secur. Rev..
[57] Ian Sommerville,et al. Socio-technical systems: From design methods to systems engineering , 2011, Interact. Comput..
[58] Katina Michael,et al. National Security: The Social Implications of the Politics of Transparency , 2006 .
[59] Stephen B. Wicker,et al. The future of three-dimensional printing: Intellectual property or intellectual confinement? , 2016, New Media Soc..
[60] M. G. Michael,et al. From Dataveillance to Überveillance (Uberveillance) and the Realpolitik of the Transparent Society , 2007 .
[61] Roger Clarke,et al. Web 2.0 as Syndication , 2008, J. Theor. Appl. Electron. Commer. Res..
[62] Gerardine DeSanctis,et al. Group decision support systems: a new frontier , 1984, DATB.
[63] Marcus R. Wigan. Data Ownership , 1991, Managing Information Technology's Organisational Impact.
[64] Roger Clarke. A major impediment to B2C success is...the concept 'B2C' , 2006, ICEC '06.
[65] Kate Williams,et al. Research note: Measuring the globalization of knowledge: The case of community informatics , 2013, First Monday.
[66] Roger Clarke. Who is liable for software errors? Proposed new product liability law in Australia , 1989, Comput. Law Secur. Rev..
[67] Starr Roxanne Hiltz,et al. The evolution of user behavior in a computerized conferencing system , 1981, CACM.
[68] Alan Tyree. Expert Systems in Law , 1989 .
[69] Jon Bing,et al. A Decade of Computers and Law , 1981 .
[70] Benjamin Kuipers,et al. Computer power and human reason , 1976, SGAR.
[71] Roger Clarke,et al. Surfing the third wave of computing: A framework for research into eObjects , 2015, Comput. Law Secur. Rev..
[72] Roger Clarke. What 'Uberveillance' Is, and What To Do About It , 2007 .
[73] Barrie Gunter,et al. Consumer Profiles: An Introduction to Psychographics , 1992 .
[74] Roger Clarke,et al. The Digital Persona and Its Application to Data Surveillance , 1994, Inf. Soc..
[75] Deborah Lupton. The Quantified Self: A Sociology of Self-Tracking , 2016 .
[76] Hubert L. Dreyfus,et al. What computers still can't do - a critique of artificial reason , 1992 .
[77] Hans P. Moravec. Robot: Mere Machine to Transcendent Mind , 1998 .
[78] A. Westin,et al. The assault on privacy , 1971 .
[79] Roger Clarke,et al. Ethics and the Internet: The Cyberspace Behaviour of People, Communities and Organisations , 1999 .
[80] Fabian Hungerland,et al. The Digital Economy , 2021, Introduction to Digital Economics.
[81] Rob Kling,et al. What Is Social Informatics and Why Does It Matter? , 2007, D Lib Mag..
[82] Roger Clarke. A framework for analysing technology’s negative and positive impacts on freedom and privacy , 2016, Datenschutz und Datensicherheit - DuD.
[83] A. Tellegen,et al. An alternative "description of personality": the big-five factor structure. , 1990, Journal of personality and social psychology.
[84] Shane Harris,et al. The Watchers: The Rise of America's Surveillance State , 2010 .
[85] Richard Kemp,et al. Legal rights in data , 2011, Comput. Law Secur. Rev..
[86] Roger Clarke,et al. Computing Clouds on the Horizon? Benefits and Risks from the User's Perspective , 2010, Bled eConference.
[87] M. Porat. The Information Economy: Definition and Measurement. , 1977 .
[88] Yoneji Masuda. The information society as post-industrial society , 1980 .
[89] Eric Schmidt,et al. The New Digital Age: Reshaping the Future of People, Nations and Business , 2001 .
[90] Roger Clarke,et al. Can small users recover from the cloud? , 2017, Comput. Law Secur. Rev..
[91] Roger Clarke,et al. User Requirements for Cloud Computing Architecture , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.
[92] Gillian Dempsey. Revisiting Intellectual Property Policy: Information Economics for the Information Age , 1999 .
[93] M R Wigan,et al. COMPUTER COOPERATIVE WORK: COMMUNICATIONS, COMPUTERS AND THEIR CONTRIBUTION TO WORKING IN GROUPS , 1989 .
[94] James R. Beniger. The Control Revolution: Technological and Economic Origins of the Information Society , 1986 .