Fear Commerce: Inflationary Effects of Global Security Initiatives
暂无分享,去创建一个
[1] Charles S. Taber,et al. Threat, Anxiety, and Support of Antiterrorism Policies , 2005 .
[2] John F. Canny,et al. The Future of Human-Computer Interaction , 2006, ACM Queue.
[3] Anja J E Dirkzwager,et al. The role of the media and media hypes in the aftermath of disasters. , 2005, Epidemiologic reviews.
[4] J. Braithwaite,et al. Global Business Regulation , 2001 .
[5] Keven G. Ruby,et al. The Insider Threat to Information Systems , 2022 .
[6] L. Benería,et al. Global tensions : challenges and opportunities in the world economy , 2004 .
[7] Thomas Keneally,et al. The Fear , 1965 .
[8] Inspector General,et al. Program and Management Improvement Recommendations Department of Health and Human Services Office of Inspector General The Orange Book , 2000 .
[9] Yaman Akdeniz,et al. The Internet, Law and Society , 2001 .
[10] Brian H. Kleiner,et al. Electronic surveillance in the workplace , 2003 .
[11] L. Cranor,et al. Rethinking Rights and Regulations: Institutional Responses to New Communications Technologies , 2003 .
[12] Scott C. D'Urso,et al. Who’s Watching Us at Work? Toward a Structural–Perceptual Model of Electronic Monitoring and Surveillance in Organizations , 2006 .
[13] John R. Aiello,et al. Computer‐Based Work Monitoring: Electronic Surveillance and Its Effects , 1993 .
[14] S. Kozlowski,et al. A Typology of Virtual Teams , 2002 .
[15] Stefan Linnhoff,et al. The Emergence of Biometrics and Its Effect on Consumers , 2005 .
[16] N. Fairweather. Surveillance in Employment: The Case of Teleworking , 1999 .
[17] Peter Fischer,et al. Terror salience and punishment: Does terror salience induce threat to social order? , 2007 .
[18] M. A. Sey,et al. Mobile Communication and Society: A Global Perspective (Information Revolution & Global Politics) , 2006 .
[19] W. Sine,et al. Revisiting Burns And Stalker: Formal Structure And New Venture Performance In Emerging Economic Sectors , 2006 .
[20] Jeffrey M. Stanton,et al. Analysis of end user security behaviors , 2005, Comput. Secur..
[21] Pramod K. Nayar,et al. Human rights in the global information society , 2007, J. Assoc. Inf. Sci. Technol..
[22] John S. Seiter,et al. Persuasion: Social Inflence and Compliance Gaining , 2015 .
[23] National Identification System : Do We Need One ? , 2005 .
[24] Joy L. Hart,et al. Workplace Surveillance and Managing Privacy Boundaries , 2007 .
[25] David Holman,et al. The Effects of Performance Monitoring on Emotional Labor and Well-Being in Call Centers , 2002 .
[26] D. Davis,et al. Civil Liberties vs. Security: Public Opinion in the Context of the Terrorist Attacks on America , 2004 .
[27] Mark R. Joslyn,et al. Sociotropic Concerns and Support for Counterterrorism Policies , 2007 .
[28] Charles Oppenheim,et al. Legal aspects of the web , 2005, Annu. Rev. Inf. Sci. Technol..
[29] Dhavan V. Shah,et al. Expressive Responses to News Stories about Extremist Groups: a Framing Experiment , 2022 .