-
1
-
-
70350392239
-
GPS data logger widely used by law enforcement
-
UsaCops.com, Oct. 3, Online, Available:, Accessed: Oct. 3
-
"GPS data logger widely used by law enforcement," UsaCops.com, Oct. 3, 2003. [Online]. Available: http://www.usacops.com. [Accessed: Oct. 3, 2008].
-
(2003)
-
-
-
2
-
-
40949092800
-
You are here! Mapping the boundaries of the Fourth Amendment with GPS technology
-
E.M. Dowdell. "You are here! Mapping the boundaries of the Fourth Amendment with GPS technology," Rutgers Computer and Technology Law Journal, vol. 32, no. 1, pp. 109-139, 2005.
-
(2005)
Rutgers Computer and Technology Law Journal
, vol.32
, Issue.1
, pp. 109-139
-
-
Dowdell, E.M.1
-
3
-
-
70350415474
-
-
J. Lowry. Mileage tax considered by Obama transportation secretary LaHood, huffingtonpost.com, Feb. 20, 2009. [Online]. Available: http://www.huffingtonpost.com/2009/02/20/mileage-tax-considered-by-n-168 506. html. [Accessed: Feb. 28, 2009].
-
J. Lowry. "Mileage tax considered by Obama transportation secretary LaHood," huffingtonpost.com, Feb. 20, 2009. [Online]. Available: http://www.huffingtonpost.com/2009/02/20/mileage-tax-considered-by-n-168506. html. [Accessed: Feb. 28, 2009].
-
-
-
-
4
-
-
85131347406
-
-
M. Wigan and R. Clarke. Social impacts of transport surveillance, Prometheus, 24, no. 4, pp. 389-403, Dec. 2006, quoted in M. U. Iqbal and S. Lim. Privacy implications of automated GPS tracking and profiling, The Second Workshop on the Social Implications of National Security: From Dataveillance to Überveillance and the Realpolitik of the Transparent Society, pp. 225, 2007.
-
M. Wigan and R. Clarke. "Social impacts of transport surveillance," Prometheus, vol. 24, no. 4, pp. 389-403, Dec. 2006, quoted in M. U. Iqbal and S. Lim. "Privacy implications of automated GPS tracking and profiling," The Second Workshop on the Social Implications of National Security: From Dataveillance to Überveillance and the Realpolitik of the Transparent Society, pp. 225, 2007.
-
-
-
-
5
-
-
70350432329
-
How radio frequency identification tags will help retailers, from supply chains to store shelves
-
March, Online, Available:, Accessed: Oct. 2
-
"How radio frequency identification tags will help retailers, from supply chains to store shelves," MIT Technology Review, March 2004 [Online], Available: http://www.technologyreview.com/computing/13509/ [Accessed: Oct. 2, 2008].
-
(2004)
MIT Technology Review
-
-
-
7
-
-
42549095599
-
How To: Disable Your Passport's RFID Chip
-
Jan, Online, Available:, Accessed: Sept
-
"How To: Disable Your Passport's RFID Chip," Wired, Jan. 2007 [Online], Available: http://www.wired.com/wired/archive/15.01/start.html? pg=9 [Accessed: Sept 2008]
-
(2007)
Wired
-
-
-
8
-
-
70350396006
-
-
K. Albrecht and L. McIntyre. CASPIAN Consumer Privacy, RFID: Big Brother's barcode, ALEC Policy Forum, 6, no. 3, pp. 49-54, Winter 2004.
-
K. Albrecht and L. McIntyre. CASPIAN Consumer Privacy, "RFID: Big Brother's barcode," ALEC Policy Forum, vol. 6, no. 3, pp. 49-54, Winter 2004.
-
-
-
-
9
-
-
33750879264
-
Enhancing security and privacy in traffic-monitoring systems
-
Oct.-Dec
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Enhancing security and privacy in traffic-monitoring systems," IEEE Pervasive Computing, vol. 5, no. 4, pp. 38-46, Oct.-Dec. 2006.
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.4
, pp. 38-46
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
10
-
-
34848849758
-
Chips, tags and scanners: Ethical challenges for radio frequency identification
-
July
-
D.J. Glasser, K.W. Goodman, and N.G. Einspruch, "Chips, tags and scanners: ethical challenges for radio frequency identification," Ethics and Information Technology, vol. 9, no. 2, pp. 101-109, July 2007.
-
(2007)
Ethics and Information Technology
, vol.9
, Issue.2
, pp. 101-109
-
-
Glasser, D.J.1
Goodman, K.W.2
Einspruch, N.G.3
-
11
-
-
33744461535
-
RFID: The next serious threat to privacy
-
Dec
-
V. Lockton and R.S. Rosenberg, "RFID: the next serious threat to privacy," Ethics and Information Technology, vol. 7, no. 4, pp. 221-231, Dec. 2005.
-
(2005)
Ethics and Information Technology
, vol.7
, Issue.4
, pp. 221-231
-
-
Lockton, V.1
Rosenberg, R.S.2
-
12
-
-
40949146918
-
A research note on ethics in the emerging age of uberveillance (überveillance)
-
M.G. Michael, S.J. Fusco, and K. Michael. "A research note on ethics in the emerging age of uberveillance (überveillance)," Computer Communications, vol. 31, no. 6, pp. 1192-1199, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.6
, pp. 1192-1199
-
-
Michael, M.G.1
Fusco, S.J.2
Michael, K.3
-
13
-
-
34147182880
-
Control, trust, privacy, and security: Evaluating location-based services
-
Spring
-
L. Perusco and K. Michael, "Control, trust, privacy, and security: evaluating location-based services" IEEE Technology and Society Magazine, vol. 26. no. 1, pp. 4-16, Spring 2007.
-
(2007)
IEEE Technology and Society Magazine
, vol.26
, Issue.1
, pp. 4-16
-
-
Perusco, L.1
Michael, K.2
-
14
-
-
23944471341
-
An ethical exploration of privacy and radio frequency identification
-
July
-
A.R. Peslak, "An ethical exploration of privacy and radio frequency identification," Journal of Business Ethics, vol. 59, no. 4, pp. 327-345, July 2005.
-
(2005)
Journal of Business Ethics
, vol.59
, Issue.4
, pp. 327-345
-
-
Peslak, A.R.1
-
15
-
-
46949088301
-
An enquiry into the ethical efficacy of the use of radio frequency identification technology
-
Mar
-
D.M. Wasieleski and M. Gal-Or, "An enquiry into the ethical efficacy of the use of radio frequency identification technology," Ethics and Information Technology, vol. 10, no. 1, pp. 27-40, Mar. 2008.
-
(2008)
Ethics and Information Technology
, vol.10
, Issue.1
, pp. 27-40
-
-
Wasieleski, D.M.1
Gal-Or, M.2
-
16
-
-
0042422943
-
The ethics of privacy protection
-
Summer/Fall
-
J.H. Moor, "The ethics of privacy protection," Library Trends, vol. 39, no. 1-2, pp. 69-82, Summer/Fall 1990.
-
(1990)
Library Trends
, vol.39
, Issue.1-2
, pp. 69-82
-
-
Moor, J.H.1
-
17
-
-
18544372804
-
Toward an approach to privacy in public: Challenges of information technology
-
H. Nissenbaum. "Toward an approach to privacy in public: challenges of information technology," Ethics and Behavior, vol. 7, no. 3, pp. 207-219, 1997.
-
(1997)
Ethics and Behavior
, vol.7
, Issue.3
, pp. 207-219
-
-
Nissenbaum, H.1
-
18
-
-
84973924592
-
Taking the byte out of cookies: Privacy, consent, and the Web
-
June
-
D. Lin and M.C. Loui, "Taking the byte out of cookies: privacy, consent, and the Web," Computers and Society, vol. 28, no. 2, pp. 39-51, June 1998.
-
(1998)
Computers and Society
, vol.28
, Issue.2
, pp. 39-51
-
-
Lin, D.1
Loui, M.C.2
-
19
-
-
7744229341
-
Why privacy is important
-
D. G. Johnson and H. Nissenbaum, eds, Upper Saddle River, N.J, Prentice Hall
-
J. Rachels, "Why privacy is important," in D. G. Johnson and H. Nissenbaum, eds., Computers, Ethics & Social Values, Upper Saddle River, N.J.: Prentice Hall, 1995, pp. 351-357.
-
(1995)
Computers, Ethics & Social Values
, pp. 351-357
-
-
Rachels, J.1
-
20
-
-
57849084443
-
Privacy: A non-existent entity
-
Winter
-
J. Borenstein, "Privacy: a non-existent entity," IEEE Technology and Society Magazine, vol. 27, no. 4, pp. 20-26, Winter 2008.
-
(2008)
IEEE Technology and Society Magazine
, vol.27
, Issue.4
, pp. 20-26
-
-
Borenstein, J.1
|