Entrapment behind the firewall: the ethics of internal cyber-stings
暂无分享,去创建一个
[1] H. Mccloskey,et al. Privacy and the Right to Privacy , 1980, Philosophy.
[2] Elin Palm,et al. Securing privacy at work: the importance of contextualized consent , 2009, Ethics and Information Technology.
[3] Nathan A Bostick,et al. Placebo Use in Clinical Practice: Report of the American Medical Association Council on Ethical and Judicial Affairs , 2008, The Journal of Clinical Ethics.
[4] Seumas Miller. Guarding the Guards: The Right to Privacy, and Workplace Surveillance and Monitoring in Policing , 2005 .
[5] Daniel Groll. What You Don't Know Can Help You: The Ethics of Placebo Treatment , 2011 .
[6] Walter Sinnott-Armstrong. Entrapment in the Net? , 1998, Ethics and Information Technology.
[7] John Weckert,et al. Privacy, the Workplace and the Internet , 1999, WebNet.
[8] L. Thomas,et al. The Theory and Practice of Autonomy , 1990 .
[9] Andrew Carlon. Entrapment, Punishment, and the Sadistic State , 2007 .
[10] Steve Clarke. Informed Consent and Electronic Monitoring in the Workplace , 2005 .
[11] David Hylender,et al. Data Breach Investigations Report , 2011 .