Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden Leaks
暂无分享,去创建一个
Theodore Tryfonas | Tom Crick | Michael Carter | Panagiotis Andriotis | Panagiotis Andriotis | T. Tryfonas | Tom Crick | Michael Carter
[1] Jason Ditton,et al. Crime and the City , 2000 .
[2] K. Schwalm. National Strategy to Secure Cyberspace , 2006 .
[3] M. Kuefer. The Constitution Of Society Outline Of The Theory Of Structuration , 2016 .
[4] Valerie Verdoodt,et al. From social media service to advertising network: a critical analysis of Facebook’s Revised Policies and Terms , 2015 .
[5] Glenn Greenwald,et al. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State , 2014 .
[6] Madeline Carr,et al. Public–private partnerships in national cyber-security strategies , 2016 .
[7] Samuel D. Gosling,et al. Snoop: What Your Stuff Says About You , 2008 .
[8] Thomas C. Hales,et al. The NSA back door to NIST , 2014 .
[9] G. Lakoff. Metaphors of Terror , 2001 .
[10] Jeremy A. Hansen,et al. Human Aspects of Information Security, Privacy, and Trust , 2013, Lecture Notes in Computer Science.
[11] Theodore Tryfonas,et al. Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps , 2013, HCI.
[12] Andra Giurgiu,et al. No Place to Hide – Edward Snowden, the NSA and the Surveillance State , 2015 .
[13] A. Kellerman,et al. The Constitution of Society : Outline of the Theory of Structuration , 2015 .
[14] Professor Surya P. Subedi. Report of the Special Rapporteur on the Situation of Human Rights in Cambodia , 2010 .
[15] Kirstie Ball,et al. Organization, Surveillance and the Body: Towards a Politics of Resistance , 2005 .
[16] H. Tsoukas. The Missing Link: A Transformational View of Metaphors in Organizational Science , 1991 .
[17] Theo Tryfonas,et al. On Security Metaphors and how they Shape the Emerging Practice of Secure Information Systems Development , 2007 .
[18] Jennifer Granick,et al. We Kill People Based on Metadata , 2017 .
[19] Tom Crick,et al. Changing Faces: Identifying Complex Behavioural Profiles , 2014, HCI.