Network tourism: A fallacy of location privacy!
暂无分享,去创建一个
[1] Alex Pentland,et al. Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.
[2] O. Silven,et al. A real-time system for monitoring of cyclists and pedestrians , 1999, Proceedings Second IEEE Workshop on Visual Surveillance (VS'99) (Cat. No.98-89223).
[3] Erik Wilde,et al. Tourism, Peer Production, and Location-Based Service Design , 2008, 2008 IEEE International Conference on Services Computing.
[4] B. Davies,et al. Public International Law , 2016 .
[5] Philip Brey. Editorial Introduction – Surveillance and Privacy , 2006, Ethics and Information Technology.
[6] Marco Gruteser,et al. Privacy-Aware Location Sensor Networks , 2003, HotOS.
[7] Simon Rogerson. Ethical Aspects of Information Technology: Issues for Senior Executives , 1998 .
[8] J. Rachels. Why privacy is important , 1985 .
[9] Bernd Carsten Stahl,et al. Privacy as a shared feature of the e-phenomenon: a comparison of privacy policies in e-government, e-commerce and e-teaching , 2007, Int. J. Inf. Technol. Manag..
[10] Albrecht Schmidt,et al. There is more to context than location , 1999, Comput. Graph..
[11] Göran Collste. Globalisation, ICT-ethics and Value Conflicts , 2007 .
[12] Annika Hinze,et al. Locations- and Time-Based Information Delivery in Tourism , 2003, SSTD.
[13] Hans J. Morgenthau,et al. Politics among nations;: The struggle for power and peace , 1948 .
[14] Pramod Sharma,et al. Emerging issues in location based tourism systems , 2005, International Conference on Mobile Business (ICMB'05).
[15] Vijayalakshmi Atluri,et al. A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).
[16] B. Eden. The Rise of the Network Society. The Information Age: Economy, Society and Culture, Vol. 1, 2nd ed. , 2001 .
[17] Lars Kulik,et al. Location privacy and location-aware computing , 2006 .
[18] Leonidas Kazatzopoulos,et al. Applying privacy on the dissemination of location information , 2006, Telematics Informatics.
[19] C. Ess. Ethical pluralism and global information ethics , 2006, Ethics and Information Technology.
[20] Soraj Hongladarom,et al. Floridi and Spinoza on global information ethics , 2008, Ethics and Information Technology.
[21] P. H. Liotta. Boomerang Effect: the Convergence of National and Human Security , 2002 .
[22] J. Moor,et al. The internet and Japanese conception of privacy , 2004, Ethics and Information Technology.
[23] Steffen Staab,et al. Intelligent Systems for Tourism , 2002, IEEE Intell. Syst..
[24] Helmut Berger,et al. User-Oriented Evaluation of a Natural Language Tourism Information System , 2003, J. Inf. Technol. Tour..
[25] D. Kanellopoulos,et al. Wireless multimedia communications impacts on tourism destination value chain. , 2007 .
[26] Charles Ess,et al. “Lost in Translation”?: Intercultural Dialogues on Privacy and Information Ethics (Introduction to Special Issue on Privacy and Data Privacy Protection in Asia) , 2005, Ethics and Information Technology.
[27] Amitava Mukherjee,et al. Pervasive Computing: A Paradigm for the 21st Century , 2003, Computer.
[28] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[29] Kenneth Einar Himma,et al. The intercultural ethics agenda from the point of view of a moral objectivist , 2008, J. Inf. Commun. Ethics Soc..
[30] Maya Gadzheva,et al. Privacy concerns pertaining to location-based services , 2007 .
[31] M. Nakada,et al. Japanese Conceptions of Privacy: An Intercultural Perspective , 2005, Ethics and Information Technology.
[32] R. Burchfield. Oxford English dictionary , 1982 .
[33] Jonathan Grudin,et al. Toward Understanding Preferences for Sharing and Privacy , 2004 .