Cookies, web bugs, webcams and cue cats: Patterns of surveillance on the world wide web
暂无分享,去创建一个
[1] Gary T. Marx,et al. Undercover: Police Surveillance in America , 1988 .
[2] Andrew McLaughlin. The Whale and the Reactor: A Search for Limits in an Age of High Technology , 1987 .
[3] M. Foucault. The Subject and Power , 1982, Critical Inquiry.
[4] Selma C. Etter. Database Nation the Death of Privacy in the 21st Century , 2000, Journal of Computing in Higher Education.
[5] Alan F. Westin,et al. Databanks in a free society : computers, record-keeping, and privacy : report of the Project on Computer Databanks of the Computer Science and Engineering Board, National Academy of Sciences , 1972 .
[6] Ithiel de Sola Pool,et al. Technologies of Freedom: On Free Speech in an Electronic Age , 1984 .
[7] Michael Grüninger,et al. Introduction , 2002, CACM.
[8] J. Reidenberg. Lex Informatica: The Formulation of Information Policy Rules through Technology , 1997 .
[9] H. Dreyfus,et al. Michel Foucault: Beyond Structuralism and Hermeneutics. , 1985 .
[10] A. L. Shapiro. The Control Revolution , 1999 .
[11] Mark Fischetti,et al. Weaving the web - the original design and ultimate destiny of the World Wide Web by its inventor , 1999 .
[12] T. Jordan. Cyberpower: The culture and politics of cyberspace and the Internet , 1999 .
[13] C. Dandeker. Surveillance, Power and Modernity: Bureaucracy and Discipline from 1700 to the Present Day , 1990 .
[14] P. Schwartz. Privacy and Democracy in Cyberspace , 2000 .
[15] L. Winner. The Whale and the Reactor , 2020 .
[16] Joel R. Reidenberg,et al. Resolving Conflicting International Data Privacy Rules in Cyberspace , 2000 .
[17] L. Winner. Autonomous Technology: Technics-out-of-Control as a Theme in Political Thought , 1977 .
[18] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[19] Colin J. Bennett. Computers, Personal Data, and Theories of Technology: Comparative Approaches to Privacy Protection in the 1990s , 1991 .
[20] David Lyon,et al. The Electronic Eye: The Rise of Surveillance Society , 1994 .
[21] Don Tapscott,et al. Who Knows? : Safeguarding Your Privacy in a Networked World , 1995 .
[22] Roger A. Clarke,et al. Information technology and dataveillance , 1988, CACM.