Profiles and correlatable humans
暂无分享,去创建一个
[1] Colin J. Bennett. Convergence revisited: toward a global policy for the protection of personal data? , 1997 .
[2] M. Merleau-Ponty. Phénoménologie de la perception , 1950 .
[3] Ronald Leenes,et al. ‘Code’: Privacy's death or saviour? , 2005 .
[4] Roger Brownsword,et al. Code, control, and choice: why East is East and West is West , 2005, Legal Studies.
[5] Melvin Kranzberg. Technology and History: "Kranzberg's Laws" , 1986 .
[6] Philip E. Agre. Beyond the mirror world: privacy and the representational practices of computing , 1997 .
[7] J. Scott Armstrong,et al. How to avoid exploratory research , 2005 .
[8] G. Mead. Mind, Self, and Society: From the Standpoint of a Social Behaviorist (Works of George Herbert Mead, Vol. 1) , 1934 .
[9] Lee Tien. ARCHITECTURAL REGULATION AND THE EVOLUTION OF SOCIAL NORMS , 2005 .
[10] Lawrence Lessig. The Law of the Horse: What Cyberlaw Might Teach , 1999 .
[11] K. Blamey,et al. Oneself as Another , 1992 .
[12] J. Reidenberg. Lex Informatica: The Formulation of Information Policy Rules through Technology , 1997 .
[13] Frederick Schauer,et al. Profiles, Probabilities, and Stereotypes , 2006 .
[14] G. Vattimo. The Transparent Society , 1992 .
[15] B. Wynne,et al. Risk Society: Towards a New Modernity. , 1994 .