-
1
-
-
84937314949
-
Surveillance and Capture: Two Models of Privacy
-
Agre, P. E. (1994) ‘Surveillance and Capture: Two Models of Privacy’, The Information Society 10: 101–127.
-
(1994)
The Information Society
, vol.10
, pp. 101-127
-
-
Agre, P.E.1
-
8
-
-
84888301236
-
The Digital Persona and its Application to Data Surveillance
-
Clarke, R. A. (1994) ‘The Digital Persona and its Application to Data Surveillance’, The Information Society 10(2): 77–92.
-
(1994)
The Information Society
, vol.10
, Issue.2
, pp. 77-92
-
-
Clarke, R.A.1
-
9
-
-
3042694492
-
-
Seoul: Coalition for the Abolition of the Electronic National ID Card.
-
Coalition for the Abolition of the Electronic National ID Card (1997) Electronic ID Card and the Coming of Electronic Surveillance Society.Seoul: Coalition for the Abolition of the Electronic National ID Card.
-
(1997)
Electronic ID Card and the Coming of Electronic Surveillance Society
-
-
-
12
-
-
0035549269
-
Digital Privacy: Toward a New Politics and Discursive Practice
-
Doty, P. (2001) ‘Digital Privacy: Toward a New Politics and Discursive Practice’, Annual Review of Information Science and Technology 35: 115–245.
-
(2001)
Annual Review of Information Science and Technology
, vol.35
, pp. 115-245
-
-
Doty, P.1
-
15
-
-
84997956594
-
Computer Ethics: Cautionary Tales and Ethical
-
2nd edn. Cambridge, MA: The MIT Press.
-
Forester, T. and Morrison, P. (1994) Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing, 2nd edn. Cambridge, MA: The MIT Press.
-
(1994)
Dilemmas in Computing
-
-
Forester, T.1
Morrison, P.2
-
18
-
-
84937185350
-
A Plague on the Panopticon: Surveillance and Power in the Global Information Economy
-
Green, S. (1999) ‘A Plague on the Panopticon: Surveillance and Power in the Global Information Economy’, Information Communication and Society 2(1): 26–44.
-
(1999)
Information Communication and Society
, vol.2
, Issue.1
, pp. 26-44
-
-
Green, S.1
-
21
-
-
84998098704
-
Privacy is Under Siege at Work, at Home and Online
-
Hawkins, D. and Mannix, M. (2000) ‘Privacy is Under Siege at Work, at Home and Online’, US News and World Report (13) 129-162.
-
(2000)
US News and World Report
, vol.13
, pp. 129-162
-
-
Hawkins, D.1
Mannix, M.2
-
23
-
-
84937313915
-
The Digital Individual
-
Kilger, M. (1994) ‘The Digital Individual’, The Information Society 10(2): 93–99.
-
(1994)
The Information Society
, vol.10
, Issue.2
, pp. 93-99
-
-
Kilger, M.1
-
24
-
-
3042550739
-
Problems of Electronic National ID Card and the Possibility of Electronic Surveillance Society
-
Kim, K. J. (1997) ‘Problems of Electronic National ID Card and the Possibility of Electronic Surveillance Society’, Journal of Cybercommunication Studies 1: 88–110.
-
(1997)
Journal of Cybercommunication Studies
, vol.1
, pp. 88-110
-
-
Kim, K.J.1
-
25
-
-
0009241620
-
Information Technologies and the Shifting Balance between Privacy and Social Control
-
in R. Kling (ed.) 2nd edn, pp. London: Academic Press.
-
Kling, R. (1996) ‘Information Technologies and the Shifting Balance between Privacy and Social Control’, in R. Kling (ed.) Computerization and Controversy: Value Conflicts and Social Choices, 2nd edn, pp. 614–636. London: Academic Press.
-
(1996)
Computerization and Controversy: Value Conflicts and Social Choices
, pp. 614-636
-
-
Kling, R.1
-
26
-
-
0039677247
-
Information Entrepreneurialism, Information Technologies and the Continuing Vulnerability of Privacy
-
in R. Kling (ed.) 2nd edn, pp. London: Academic Press.
-
Kling, R., Ackerman, M. S. and Allen, J. P. (1996) ‘Information Entrepreneurialism, Information Technologies and the Continuing Vulnerability of Privacy’, in R. Kling (ed.) Computerization and Controversy: Value Conflicts and Social Choices, 2nd edn, pp. 727–743. London: Academic Press.
-
(1996)
Computerization and Controversy: Value Conflicts and Social Choices
, pp. 727-743
-
-
Kling, R.1
Ackerman, M.S.2
Allen, J.P.3
-
27
-
-
3042692307
-
Electronic National ID Card and Routinization of the Privacy Invasion
-
Koh, Y. S. (1997) ‘Electronic National ID Card and Routinization of the Privacy Invasion’, Korean Economy and Society 35: 163–184.
-
(1997)
Korean Economy and Society
, vol.35
, pp. 163-184
-
-
Koh, Y.S.1
-
29
-
-
0013205845
-
The Roots of the Information Society Idea
-
in N. Heap et al. (eds) pp. London: Sage.
-
Lyon, D. (1995) ‘The Roots of the Information Society Idea’, in N. Heap et al. (eds) Information Technology and Society: A Reader, pp. 52–73. London: Sage.
-
(1995)
Information Technology and Society: A Reader
, pp. 52-73
-
-
Lyon, D.1
-
31
-
-
0039677246
-
I'll Be Watching You: Reflection on the New Surveillance
-
Marx, G. (1985) ‘I'll Be Watching You: Reflection on the New Surveillance’, Dissent 32(1): 26–34.
-
(1985)
Dissent
, vol.32
, Issue.1
, pp. 26-34
-
-
Marx, G.1
-
32
-
-
0003251302
-
The Case of the Omniscient Organization
-
Marx, G. (1990) ‘The Case of the Omniscient Organization’, Harvard Business Review 90(2): 12–30.
-
(1990)
Harvard Business Review
, vol.90
, Issue.2
, pp. 12-30
-
-
Marx, G.1
-
33
-
-
84998065389
-
Electronic National ID Card, Is it Really Convenient and Efficient?
-
paper presented at the Special Symposium Sponsored by National Lawyers’ Association, 16 June.
-
Park, H. Y. (1997) ‘Electronic National ID Card, Is it Really Convenient and Efficient?’, paper presented at the Special Symposium Sponsored by National Lawyers’ Association, 16 June.
-
(1997)
-
-
Park, H.Y.1
-
35
-
-
84998065369
-
Electronic ID Card and the Coming of Electronic Surveillance
-
Seoul: Progress Network.
-
Progress Network (1997) Electronic ID Card and the Coming of Electronic Surveillance Society, A Sourcebook. Seoul: Progress Network.
-
(1997)
Society, A Sourcebook
-
-
-
36
-
-
3042641283
-
-
Venice, CA: Feral House.
-
Redden, J. (2000) Snitch Culture. Venice, CA: Feral House.
-
(2000)
Snitch Culture
-
-
Redden, J.1
-
37
-
-
0010160875
-
-
New York: Elsevier.
-
Rule, J., McAdam, D., Sterns, L. and Uglow, D. (1984) The Politics of Privacy: Planning for Personal Data System as Powerful Technologies. New York: Elsevier.
-
(1984)
The Politics of Privacy: Planning for Personal Data System as Powerful Technologies
-
-
Rule, J.1
McAdam, D.2
Sterns, L.3
Uglow, D.4
-
38
-
-
0004266379
-
-
Cambridge, MA: Harvard University Press.
-
Thompson, J. J. (1990) The Realm of Rights. Cambridge, MA: Harvard University Press.
-
(1990)
The Realm of Rights
-
-
Thompson, J.J.1
-
39
-
-
3042681852
-
Privacy Protection in Information Systems
-
in M. C. Yovits (ed.)
-
Turn, R. (1977) ‘Privacy Protection in Information Systems’, in M. C. Yovits (ed.) Advances in Computers 16: 221–335.
-
(1977)
Advances in Computers
, vol.16
, pp. 221-335
-
-
Turn, R.1
-
43
-
-
0029478196
-
Managing User Perceptions of Email Privacy
-
Weisband, S. P. and Reinig, B. A. (1995) ‘Managing User Perceptions of Email Privacy’, Communications of the ACM 38(12): 40–47.
-
(1995)
Communications of the ACM
, vol.38
, Issue.12
, pp. 40-47
-
-
Weisband, S.P.1
Reinig, B.A.2
|