Information technology and dataveillance
暂无分享,去创建一个
[1] V. Packard,et al. The Naked Society , 1964 .
[2] Myron Brenton. The privacy invaders , 1964 .
[3] Robert Boguslaw,et al. Privacy and Freedom , 1968 .
[4] L. Hoffman. Computers and Privacy in the Next Decade , 1980 .
[5] Z Cowen. The private man. , 1971, The Medical journal of Australia.
[6] Gary T. Marx,et al. Routinizing the Discovery of Secrets , 1984 .
[7] Roger Clarke,et al. JUST ANOTHER PIECE OF PLASTIC FOR YOUR WALLET: THE ‘AUSTRALIA CARD’ SCHEME , 1987 .
[8] W. Dutton. : Dossier Society: Value Choices in the Design of National Information Systems , 1988 .
[9] Kenneth C. Laudon,et al. Data quality and due process in large interorganizational record systems , 1986, CACM.
[10] D. Burnham. The rise of the computer state , 1983 .
[11] John C. Raines. Attack on privacy , 1974 .
[12] Richard S. Rosenberg. Computers and the information society , 1986 .
[13] Ralph W. Thomas,et al. The Oxford Dictionary , 1907 .
[14] Rob Kling,et al. Automated welfare client-tracking and service integration: the political economy of computing , 1978, CACM.
[15] Richard P. Kusserow. The government needs computer matching to root out waste and fraud , 1984, CACM.
[16] Jerry Martin Rosenberg,et al. The death of privacy , 1969 .
[17] Theodore Roszak. Cult of Information , 1986 .
[18] A. Westin,et al. The assault on privacy , 1971 .
[19] James B. Rule,et al. Documentary Identification and Mass Surveillance in the United States , 1983 .
[20] Jonathan Rosenhead,et al. The technology of political control , 1977 .
[21] James Bamford,et al. The Puzzle Palace , 1982 .
[22] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[23] Crispin Aubrey,et al. Who's Watching You? , 1981 .
[24] James A. Thom,et al. Privacy Legislation and the Right of Access , 1983, Aust. Comput. J..
[25] Colin J. Bennett. Federal government information technology: Electronic record systems and individual privacy , 1988 .
[26] Michael Batty,et al. The Cult of Information , 1988 .
[27] A. D. RITCHIE. Authority and the Individual , 1949, Nature.
[28] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[29] Rob Kling,et al. Value conflicts and social choice in electronic funds transfer system developments , 1981, CSOC.
[30] Michael A. Baker,et al. Databanks in a free society , 1973, CSOC.
[31] Martin L. Gross,et al. The Brain Watchers , 1962 .
[32] Antony Allert Thompson. Big Brother in Britain today , 1970 .
[33] Records, Computers and the Rights of Citizens , 1973 .
[34] J. Rule. Private Lives and Public Surveillance; Social Control in the Computer Age , 1974 .
[35] C. G. Weeramantry,et al. The slumbering sentinels : law and human rights in the wake of technology , 1984 .
[36] Howard Falk,et al. The Technological Society , 1965 .
[37] G. W. Greenleaf,et al. Database Retrieval Technology and Subject Access Principles , 1984, Aust. Comput. J..
[38] Jan Yestingsmeier,et al. Electronic funds transfer system: the continuing need for privacy legislation , 1984, CSOC.
[39] A. Westin. Information technology in a democracy , 1971 .
[40] K. Laudon. Dossier Society: Value Choices in the Design of National Information Systems , 1988 .
[41] Milton R. Wessel. Freedom's edge: The computer threat to society , 1974 .
[42] M J Helquist. Public policy issues , 1990, AIDS.