Data Protection in a Profiled World
暂无分享,去创建一个
[1] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[2] C. Mills,et al. Power Elite , 1956, Encyclopedia of Social Network Analysis and Mining.
[3] W. Brandt. German foreign policy , 1969 .
[4] Albert O. Hirschman,et al. Exit, Voice, and Loyalty , 1970 .
[5] Mark S. Granovetter. The Strength of Weak Ties , 1973, American Journal of Sociology.
[6] Allison M. McCormack,et al. Information Age , 1979 .
[7] Neil C. Livingstone. The war against terrorism , 1982 .
[8] M. Foucault. The Subject and Power , 1982, Critical Inquiry.
[9] Mark S. Granovetter. T H E S T R E N G T H O F WEAK TIES: A NETWORK THEORY REVISITED , 1983 .
[10] F. Schoeman,et al. Philosophical Dimensions of Privacy: Privacy and intimate information , 1984 .
[11] F. Schoeman. Philosophical Dimensions of Privacy: An Anthology , 1984 .
[12] J. Rachels. Why privacy is important , 1985 .
[13] K. Laudon. Dossier Society: Value Choices in the Design of National Information Systems , 1988 .
[14] M. Foucault,et al. Of Other Spaces , 1986 .
[15] Edward B. Blanchard,et al. If it ain't broke, don't fix it , 1987 .
[16] J. Elster. The Multiple Self , 1987 .
[17] Elizabeth Phillips,et al. The Site , 1988, Palestine Is Throwing a Party and the Whole World Is Invited.
[18] R. Putnam. Diplomacy and domestic politics: the logic of two-level games , 1988, International Organization.
[19] K. Ewing. The Illusion of Wholeness: Culture, Self and the Experience of Inconsistency , 1990 .
[20] Don Ihde,et al. Technology and the lifeworld , 1990 .
[21] François Rigaux. La protection de la vie privée et des autres biens de la personnalité , 1990 .
[22] M. Poster. The Mode of Information: Poststructuralism and Social Context , 1990 .
[23] A. Giddens. Modernity and Self-Identity: Self and Society in the Late Modern Age , 1992, The New Social Theory Reader.
[24] David Chaum,et al. Achieving Electronic Privacy , 1992 .
[25] Josh Benaloh,et al. Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.
[26] P. McGregor,et al. Mastering the Internet , 1996 .
[27] Curtis E. A. Karnow. Liability for Distributed Artificial Intelligences , 1996 .
[28] John Maynard Smith,et al. Too good to be true , 1999, Nature.
[29] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .
[30] D. Bainbridge. Data protection , 2000 .
[31] Kazue Sako,et al. Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.
[32] N. Luhmann. Familiarity, Confidence, Trust: Problems and Alternatives , 2000 .
[33] R. Federman,et al. Take It or Leave It , 2000, Science.
[34] Pekka Nikander,et al. Users and Trust in Cyberspace (Transcript of Discussion) , 2000, Security Protocols Workshop.
[35] F. Cunningham,et al. Theories of Democracy: A Critical Introduction , 2001 .
[36] G. Marx. Murky conceptual waters: The public and the private , 2001, Ethics and Information Technology.
[37] F. Cate. Privacy in Perspective , 2001 .
[38] Serge Gutwirth,et al. Privacy and the Information Age , 2001 .
[39] C. Andrew Neff,et al. A verifiable secret shuffle and its application to e-voting , 2001, CCS '01.
[40] Patrick Jaillet,et al. Online Searching , 2001, Oper. Res..
[41] Pm Schwartz,et al. Beyond Lessig's Code for Internet Privacy: Cyberspace Filters, Privacy Control and Fair Information Practices , 2001 .
[42] Dahlia Malkhi,et al. E-Voting Without 'Cryptography' , 2002, Financial Cryptography.
[43] L. Bygrave. Data Protection Law, Approaching Its Rationale, Logic and Limits , 2002 .
[44] Ulrich Beck,et al. The Terrorist Threat , 2002 .
[45] Elizabeth D. Mynatt,et al. Privacy Mirrors: Understanding and Shaping Socio-technical Ubiquitous Computing Systems , 2002 .
[46] Fred H. Cate,et al. The Impact of Opt-In Privacy Rules on Retail Credit Markets: A Case Study of Mbna , 2003 .
[47] Fabio Martinelli,et al. SEAS: A Secure E-Voting Applet System , 2003, ISSS.
[48] Jeffrey O. Kephart,et al. The Vision of Autonomic Computing , 2003, Computer.
[49] Tal Z. Zarsky. "MINE YOUR OWN BUSINESS!": MAKING THE CASE FOR THE IMPLICATIONS OF THE DATA MINING OF PERSONAL INFORMATION IN THE FORUM OF PUBLIC OPINION , 2003 .
[50] André Zúquete,et al. REVS – A ROBUST ELECTRONIC VOTING SYSTEM , 2003 .
[51] Claudio U. Ciborra,et al. Digital Technologies and the Duality of Risk , 2004 .
[52] Tim Storer,et al. Practical Remote Electronic Elections for the UK , 2004, PST.
[53] Bart Jacobs,et al. Counting Votes with Formal Methods , 2004, AMAST.
[54] David A. Wagner,et al. Analyzing internet voting security , 2004, CACM.
[55] Sangjin Kim,et al. A New Universally Verifiable and Receipt-Free Electronic Voting Scheme Using One-Way Untappable Channels , 2004, AWCC.
[56] Ted Selker,et al. Security Vulnerabilities and Problems with VVPT , 2004 .
[57] Lior Jacob Strahilevitz,et al. A Social Networks Theory of Privacy , 2004 .
[58] Anton Vedder,et al. KDD: The challenge to individualism , 1999, Ethics and Information Technology.
[59] Nathanael Paul,et al. Election security: Perception and reality , 2004, IEEE Security & Privacy Magazine.
[60] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[61] Tal Zarsky. Desperately Seeking Solutions: Using Implementation-Based Solutions for the Troubles of Information Privacy in the Age of Data Mining and the Internet Society , 2004 .
[62] Valeria Brusco,et al. Vote Buying in Argentina , 2004 .
[63] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[64] David Chaum,et al. Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.
[65] Danah Boyd,et al. Friendster and publicly articulated social networking , 2004, CHI EA '04.
[66] Wolter Pieters,et al. RIES - Internet Voting in Action , 2005, COMPSAC.
[67] P. Verbeek. What Things Do: Philosophical Reflections on Technology, Agency, and Design , 2005 .
[68] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[69] F. Tödtling,et al. One size fits all?: Towards a differentiated regional innovation policy approach , 2005 .
[70] Oscar Gandy. 15. Data Mining, Surveillance, and Discrimination in the Post-9/11 Environment , 2005 .
[71] Daniel J. Steinbock,et al. Data Matching, Data Mining, and Due Process , 2005 .
[72] Wolter Pieters,et al. Ethics of e-voting: an essay on requirements and values in Internet elections , 2005 .
[73] Markus Jakobsson,et al. Coercion-resistant electronic elections , 2005, WPES '05.
[74] Marinella Petrocchi,et al. SEAS, a secure e-voting protocol: Design and implementation , 2005, Comput. Secur..
[75] Michael Friedewald,et al. Safeguards in a world of ambient intelligence , 2008 .
[76] Roy G. Saltman. The history and politics of voting technology , 2006 .
[77] F. Cate. The Failure of Fair Information Practice Principles , 2006 .
[78] Y. Benkler,et al. The Wealth of Networks , 2008 .
[79] Mark S. Strauss. Behind closed doors , 2006 .
[80] Melanie Volkamer,et al. New Generation of Voting Machines in Germany The Hamburg Way to Verify Correctness , 2006 .
[81] Wolter Pieters,et al. What proof do we prefer? Variants of verifiability in voting , 2006 .
[82] Peggy Valcke,et al. Retaining the data retention directive , 2006, Comput. Law Secur. Rev..
[83] Bert-Jaap Koops,et al. Should ICT Regulation Be Technology-Neutral? , 2006 .
[84] Sjo Anne Hoogcarspel,et al. Regulating Spam: A European Perspective After the Adoption of the E-Privacy Directive , 2006 .
[85] P. Schwartz,et al. Notification of Data Security Breaches , 2006 .
[86] Wolter Pieters,et al. Acceptance of Voting Technology: Between Confidence and Trust , 2006, iTrust.
[87] Y. Poullet. Les aspects juridiques des systèmes d’information , 2006 .
[88] Brian Randell,et al. Voting Technologies and Trust , 2006, IEEE Security & Privacy.
[89] Zeynep Erdeniz. International Herald Tribune , 2007 .
[90] M. Hildebrandt,et al. A vision of ambient law , 2007 .
[91] Walter Peissl. ICT and Privacy in Europe , 2007 .
[92] Tanya Sammut-Bonnici. Consumer Confidence in the Digital Environment , 2007 .
[93] F. Geyer,et al. The Reform Treaty & Justice and Home Affairs - Implications for the Common Area of Freedom, Security and Justice , 2007 .
[94] M.J.W. van Twist,et al. Stemmachines: een verweesd dossier , 2007 .
[95] Jörn Müller-Quade,et al. Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator , 2007, VOTE-ID.
[96] Wolfgang Jung,et al. Compliance of POLYAS with the BSI Protection Profile - Basic Requirements for Remote Electronic Voting Systems , 2007, VOTE-ID.
[97] Jenann Ismael,et al. The Situated Self , 2007 .
[98] D. Citron. Technological Due Process , 2007 .
[99] S. Curley,et al. Ripped from the Headlines: What can the Popular Press Teach us about Software Piracy? , 2008 .
[100] Stephen Baker,et al. The Numerati , 2008 .
[101] Mireille Hildebrandt,et al. Profiling and the Identity of the European Citizen , 2008, Profiling the European Citizen.
[102] Serge Gutwirth,et al. Profiling the European Citizen, Cross-Disciplinary Perspectives , 2008 .
[103] Mireille Hildebrandt,et al. Ambient Intelligence, Criminal Liability and Democracy , 2008 .
[104] James A. Hendler,et al. Information accountability , 2008, CACM.
[105] Wolter Pieters,et al. La volonté machinale: understanding the electronic voting controversy , 2008 .
[106] S. Múgica. Dos derechos emergentes del consumidor: a no ser molestado y a una interacción informativa , 2008 .
[107] Clay Shirky. Here Comes Everybody: The Power of Organizing Without Organizations , 2008 .
[108] Thomas Böckenförde,et al. Auf dem Weg zur elektronischen Privatsphäre , 2008 .
[109] Mireille Hildebrandt,et al. Profiling and the rule of law , 2008 .
[110] Colin J. Bennett. The Privacy Advocates: Resisting the Spread of Surveillance , 2008 .
[111] Jean Allain. Article 13. (Entry into Force) , 2008 .
[112] Gerrit Hornung. Ein neues Grundrecht , 2008 .
[113] Serge Gutwirth,et al. Regulating Profiling in a Democratic Constitutional State , 2008, Profiling the European Citizen.
[114] Prüm: A Model ‘Prêt-à-Exporter’? The 2008 German–US Agreement on Data Exchange. CEPS Challenge Paper No. 13, 12 March 2009 , 2009 .
[115] Burkhard Schafer,et al. The German Constitutional Court on the Right in Confidentiality and Integrity of Information Technology Systems , 2009 .
[116] Y. Poullet,et al. The Right to Informational Self-Determination and the Value of Self-Development: Reassessing the Importance of Privacy for Democracy , 2009 .
[117] Mireille Hildebrandt,et al. Who is Profiling Who? Invisible Visibility , 2009 .
[118] Gerrit Hornung,et al. Data protection in Germany II: Recent decisions on online-searching of computers, automatic number plate recognition and data retention , 2009, Comput. Law Secur. Rev..
[119] Wiebke Abel. Agents, Trojans and tags: The next generation of investigators , 2009 .
[120] Navis Amalraj,et al. Social Networking Site , 2010 .
[121] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[122] L. vanSchalkwyk,et al. Misuse and abuse - IV , 2010 .