-
1
-
-
34547399387
-
-
P. Barford (Ed.) , Proceedings of the 6th ACM SIGCOMM on Internet measurement New York, NY: ACM Press
-
Abu Rajab, M., Zarfoss, J., Monrose, F., &Terzis, A. (2006). A multifaceted approach to understand the botnet phenomenon. In: P. Barford (Ed.)), Proceedings of the 6th ACM SIGCOMM on Internet measurement (pp. 41-52). New York, NY: ACM Press
-
(2006)
A Multifaceted Approach to Understand the Botnet Phenomenon
, pp. 41-52
-
-
Abu Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
2
-
-
84888245076
-
-
Associated Press. Technology Review, published August 20, 2007, retrieved August 21, 2007, from
-
Associated Press. (2007). New breed of 'compliance software' makes office computer monitoring more sophisticated. Technology Review, published August 20, 2007, retrieved August 21, 2007, from http://www.technologyreview.com/Wire/ 19271/page1/
-
(2007)
New Breed of 'Compliance Software' Makes Office Computer Monitoring More Sophisticated
-
-
-
3
-
-
0034060950
-
-
New Technology, Work and Employment
-
Bain, P., &Taylor, P. (2000). Entraped by the 'electronic panopticon' Worker resistance in the call centre. New Technology, Work and Employment, 15(1), 2-18
-
(2000)
Entraped by the 'Electronic Panopticon' Worker Resistance in the Call Centre
, vol.15
, Issue.1
, pp. 2-18
-
-
Bain, P.1
Taylor, P.2
-
4
-
-
35348917823
-
-
4417749 The New York Times, published August 9, 2006, retrieved September 25, 2007
-
Barbaro, M., &Zeller, T. (2006). A face is exposed for AOL searcher no. 4417749 The New York Times, published August 9, 2006, retrieved September 25, 2007, from http://www.nytimes.com/2006/08/09/technology/09aol.html
-
(2006)
A Face Is Exposed for AOL Searcher
-
-
Barbaro, M.1
Zeller, T.2
-
6
-
-
33748991015
-
-
New Haven, CT: Yale University Press
-
Benkler, Y. (2006). The wealth of networks. New Haven, CT: Yale University Press.
-
(2006)
The Wealth of Networks
-
-
Benkler, Y.1
-
7
-
-
84904777935
-
-
D. Lyon (Ed.) Theorizing surveillance: The panopticon and beyond. Cullompton: Willan Publishing
-
Bogard, W. (2006). Surveillance assemblages and lines of flight. In: D. Lyon (Ed.)), Theorizing surveillance: The panopticon and beyond (pp. 97-122). Cullompton: Willan Publishing
-
(2006)
Surveillance Assemblages and Lines of Flight
, pp. 97-122
-
-
Bogard, W.1
-
8
-
-
0000454826
-
Competition and price dispersion in the U.S. Airline industry
-
Borenstein, S., &Rose, N. (1994). Competition and price dispersion in the U.S. airline industry. The Journal of Political Economy, 102(4), 653-683
-
(1994)
The Journal of Political Economy
, vol.102
, Issue.4
, pp. 653-683
-
-
Borenstein, S.1
Rose, N.2
-
10
-
-
27644527244
-
Panopticon com: Online surveillance and the commodification of privacy
-
Campbell, E., &Carlson, M. (2002). Panopticon.com: Online surveillance and the commodification of privacy. Journal of Broadcasting &Electronic Media, 46(4), 586-606
-
(2002)
Journal of Broadcasting &Electronic Media
, vol.46
, Issue.4
, pp. 586-606
-
-
Campbell, E.1
Carlson, M.2
-
11
-
-
84888241218
-
-
D. Thomas &B. D. Loader (Eds) , Cybercrime: Law enforcement, security and surveillance in the information age London: Routledge
-
Denning, D. E., &Baugh, W. E. (2000). Hiding crimes in cyberspace. In: D. Thomas &B. D. Loader (Eds)), Cybercrime: Law enforcement, security and surveillance in the information age (pp. 105-131). London: Routledge.
-
(2000)
Hiding Crimes in Cyberspace
, pp. 105-131
-
-
Denning, D.E.1
Baugh, W.E.2
-
12
-
-
0033475662
-
Strategic service pricing and yield management
-
Desiraju, R., &Shugan, S. (1999). Strategic service pricing and yield management. Journal of Marketing, 63(1), 44-56
-
(1999)
Journal of Marketing
, vol.63
, Issue.1
, pp. 44-56
-
-
Desiraju, R.1
Shugan, S.2
-
14
-
-
53149114747
-
Lawsuits may illuminate methods of spy program
-
Eggen, D. (2007). Lawsuits may illuminate methods of spy program. The Washington Post, August 14, p. A01
-
(2007)
The Washington Post, August
, vol.14
-
-
Eggen, D.1
-
19
-
-
84861290223
-
-
W. Kellogg &S. Zhai (Eds) , Proceedings of the SIGCHI conference on human factors in computing systems. New York, NY: ACM Press
-
Garfinkel, S., Margrave, D., Schiller, J., Nordlander, E., &Miller, R. (2005). How to make secure email easier to use. In: W. Kellogg &S. Zhai (Eds)), Proceedings of the SIGCHI conference on human factors in computing systems (pp. 701-710). New York, NY: ACM Press.
-
(2005)
How to Make Secure Email Easier to Use
, pp. 701-710
-
-
Garfinkel, S.1
Margrave, D.2
Schiller, J.3
Nordlander, E.4
Miller, R.5
-
20
-
-
48349147668
-
-
Information Week, published September 6, 2007, retrieved September 23, 2007
-
Gaudin, S. (2007). Storm worm botnet more powerful than top supercomputers. Information Week, published September 6, 2007, retrieved September 23, 2007, from http://www.informationweek.com/story/showArticle.jhtml? articleID=201804528
-
(2007)
Storm Worm Botnet More Powerful Than Top Supercomputers
-
-
Gaudin, S.1
-
21
-
-
33745812088
-
-
R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries &G. Olson (Eds) , Proceedings of the SIGCHI conference on human factors in computing systems New York, NY: ACM Press
-
Gaw, S., Felten, E., &Fernandez-Kelly, P. (2006). Secrecy, flagging and paranoia: Adoption criteria in encrypted e-mail. In: R. Grinter, T. Rodden, P. Aoki, E. Cutrell, R. Jeffries &G. Olson (Eds)), Proceedings of the SIGCHI conference on human factors in computing systems (pp. 591-600). New York, NY: ACM Press.
-
(2006)
Secrecy, Flagging and Paranoia: Adoption Criteria in Encrypted
, pp. 591-600
-
-
Gaw, S.1
Felten, E.2
Fernandez-Kelly, P.3
-
22
-
-
30744439551
-
Internet encyclopedias go head to head
-
Giles, J. (2005). Internet encyclopedias go head to head. Nature, 438(7070), 900-901
-
(2005)
Nature
, vol.438
, Issue.7070
, pp. 900-901
-
-
Giles, J.1
-
23
-
-
84967157539
-
-
K.D. Haggerty &R.V. Ericson (Eds) , The new politics of surveillance and visibility. Toronto: University of Toronto Press
-
Gilliom, J. (2006). Struggling with surveillance: Resistance, consciousness, and identity. In: K.D. Haggerty &R.V. Ericson (Eds)), The new politics of surveillance and visibility (pp. 111-129). Toronto: University of Toronto Press.
-
(2006)
Struggling with Surveillance: Resistance, Consciousness, and Identity
, pp. 111-129
-
-
Gilliom, J.1
-
24
-
-
0037985451
-
-
Critical Social Policy
-
Graham, S., &Wood, D. (2003). Digitizing surveillance: Categorization, space, inequality. Critical Social Policy, 23(2), 227-248
-
(2003)
Digitizing Surveillance: Categorization, Space, Inequality
, vol.23
, Issue.2
, pp. 227-248
-
-
Graham, S.1
Wood, D.2
-
25
-
-
84904779819
-
-
D. Lyon (Ed.) Theorizing surveillance: The panopticon and beyond. Cullompton: Willan Publishing
-
Haggerty, K. D. (2006). Tear down the walls: On demolishing the panopticon. In: D. Lyon (Ed.)), Theorizing surveillance: The panopticon and beyond (pp. 23-45). Cullompton: Willan Publishing
-
(2006)
Tear Down the Walls: On Demolishing the Panopticon
, pp. 23-45
-
-
Haggerty, K.D.1
-
26
-
-
0034566648
-
The surveillant assemblage
-
Haggerty, K. D., &Ericson, R. V. (2000). The surveillant assemblage. The British Journal of Sociology, 51(4), 605-622
-
(2000)
The British Journal of Sociology
, vol.51
, Issue.4
, pp. 605-622
-
-
Haggerty, K.D.1
Ericson, R.V.2
-
27
-
-
84967194929
-
-
K. D. Haggerty &R. V. Ericson (Eds) , The new politics of surveillance and visibility. Toronto: University of Toronto Press
-
Haggerty, K. D., &Ericson, R. V. (2006). The new politics of surveillance and visibility. In: K. D. Haggerty &R. V. Ericson (Eds)), The new politics of surveillance and visibility (pp. 3-25). Toronto: University of Toronto Press.
-
(2006)
The New Politics of Surveillance and Visibility
, pp. 3-25
-
-
Haggerty, K.D.1
Ericson, R.V.2
-
28
-
-
46449122098
-
-
The Telegraph published January 13, 2007, retrieved September 16, 2007, from
-
Harding, T. (2007). Terrorists 'use Google maps to hit UK troops'. The Telegraph, published January 13, 2007, retrieved September 16, 2007, from http://www.telegraph.co.uk/news/
-
(2007)
Terrorists 'Use Google Maps to Hit UK Troops
-
-
Harding, T.1
-
29
-
-
77949733379
-
Jeremy bentham and the new south wales convicts
-
Jackson, R. V. (1998). Jeremy Bentham and the New South Wales convicts. International Journal of Social Economics, 25(2/3/4), 370-379
-
(1998)
International Journal of Social Economics
, vol.25
, Issue.2-3
, pp. 370-379
-
-
Jackson, R.V.1
-
32
-
-
33645220540
-
The transformation of the web: How emerging comm unities shape the information we consume
-
Kolbitsch, J., &Maurer, H. (2006). The transformation of the web: How emerging comm unities shape the information we consume. Journal of Universal Computer Science, 12(2), 186-213
-
(2006)
Journal of Universal Computer Science
, vol.12
, Issue.2
, pp. 186-213
-
-
Kolbitsch, J.1
Maurer, H.2
-
36
-
-
84967104334
-
-
K. D. Haggerty &R. V. Ericson (Eds) , The new politics of surveillance and visibility, . Toronto: University of Toronto Press
-
Lyon, D. (2006). 9/11, synopticon and scopophilia: Watching and being watched. In: K. D. Haggerty &R. V. Ericson (Eds)), The new politics of surveillance and visibility, (pp. 35-54). Toronto: University of Toronto Press.
-
(2006)
9/11, Synopticon and Scopophilia: Watching and Being Watched
, pp. 35-54
-
-
Lyon, D.1
-
37
-
-
0038803998
-
A tack in the shoe: Neutralizing and resisting the new surveillance
-
Marx, G. T. (2003). A tack in the shoe: Neutralizing and resisting the new surveillance. Journal of Social Issues, 59(2), 369-390
-
(2003)
Journal of Social Issues
, vol.59
, Issue.2
, pp. 369-390
-
-
Marx, G.T.1
-
38
-
-
85055403921
-
Rocky Bottoms: Techno-fallacies of an age of information
-
Marx, G. T. (2007). Rocky Bottoms: Techno-fallacies of an age of information. International Political Sociology, 1(1), 83-110
-
(2007)
International Political Sociology
, vol.1
, Issue.1
, pp. 83-110
-
-
Marx, G.T.1
-
39
-
-
0039364913
-
The viewer society: Michel foucault's 'panopticon' revisited
-
Mathiesen, T. (1997). The viewer society: Michel Foucault's 'Panopticon' revisited. Theoretical Criminology, 1(2), 215-234
-
(1997)
Theoretical Criminology
, vol.1
, Issue.2
, pp. 215-234
-
-
Mathiesen, T.1
-
40
-
-
84888271092
-
-
CNET News.com, published September 12, 2006, retrieved September 15, 2007, from
-
Meyer, D. (2006). Google, Microsoft vie for earth domination. CNET News.com, published September 12, 2006, retrieved September 15, 2007, from http://www.news.com/
-
(2006)
Google, Microsoft Vie for Earth Domination
-
-
Meyer, D.1
-
41
-
-
0004255422
-
-
Chicago, IL: The University of Chicago Press
-
Monmonier, M. (1991). How to lie with maps. Chicago, IL: The University of Chicago Press.
-
(1991)
How to Lie with Maps
-
-
Monmonier, M.1
-
42
-
-
31244434953
-
Is the Internet a US invention? An economic and technological history of computer networking
-
Mowery, D. C., &Simcoe, T. (2002). Is the Internet a US invention? An economic and technological history of computer networking. Research Policy, 31(8-9), 1369-1387
-
(2002)
Research Policy
, vol.31
, Issue.8-9
, pp. 1369-1387
-
-
Mowery, D.C.1
Simcoe, T.2
-
44
-
-
77953891458
-
-
University of Colorado Law Legal Studies Research Paper No. 07-14 retrieved September 28, 2007, from
-
Ohm, P. (2007). The myth of the superuser: Fear, risk, and harm online. University of Colorado Law Legal Studies Research Paper No. 07-14, retrieved September 28, 2007, from http://www.ssrn.com/abstract=967372
-
(2007)
The Myth of the Superuser: Fear, Risk, and Harm Online
-
-
Ohm, P.1
-
45
-
-
84993778159
-
The limits of coercive surveillance: Social and penal control in the german democratic republic
-
Pfaff, S. (2001). The limits of coercive surveillance: Social and penal control in the German Democratic Republic. Punishment &Society, 3(3)
-
(2001)
Punishment &Society
, vol.3
, pp. 3
-
-
Pfaff, S.1
-
49
-
-
85044916411
-
Hardt and Negri's information empire: A critical response
-
Poster, M. (2005). Hardt and Negri's information empire: A critical response. Cultural Politics, 1(1), 101-118
-
(2005)
Cultural Politics
, vol.1
, Issue.1
, pp. 101-118
-
-
Poster, M.1
-
50
-
-
42149195827
-
-
Reuters. USA Today, published July 16, 2006, retrieved on September 3, 2007, from
-
Reuters. (2006). YouTube serves up 100 million videos a day online. USA Today, published July 16, 2006, retrieved on September 3, 2007, from http://www.usatoday.com/tech/news/2006-07-16-youtube-views-x.htm
-
(2006)
YouTube Serves Up 100 Million Videos A Day Online
-
-
-
51
-
-
84888256548
-
-
Los Angeles Times, published August 6, 2007, retrieved September 11, 2007, from
-
Rodriguez, G. (2007). YouTube vigilantes. Los Angeles Times, published August 6, 2007, retrieved September 11, 2007, from http://www.latimes.com/news/ opinion/
-
(2007)
YouTube Vigilantes
-
-
Rodriguez, G.1
-
53
-
-
84965409764
-
-
Sociology
-
Sewell, G., &Wilkinson, B. (1992). 'Someone to watch over me': Surveillance, discipline and the just-in-time labour process. Sociology, 26(2), 271-286
-
(1992)
Someone to Watch over Me': Surveillance, Discipline and the Just-in-time Labour Process
, vol.26
, Issue.2
, pp. 271-286
-
-
Sewell, G.1
Wilkinson, B.2
-
54
-
-
84893144720
-
The return of panopticism: Supervision, subjection and the new surveillance
-
Simon, B. (2005). The return of panopticism: Supervision, subjection and the new surveillance. Surveillance and Society, 3(3), 1-20
-
(2005)
Surveillance and Society
, vol.3
, Issue.3
, pp. 1-20
-
-
Simon, B.1
-
57
-
-
33644887567
-
-
Cambridge: Cambridge University Press
-
Tilly, C. (2005). Trust and rule. Cambridge: Cambridge University Press.
-
(2005)
Trust and Rule
-
-
Tilly, C.1
-
59
-
-
0002177405
-
-
D. Kahneman, P. Slovic &A. Tversky (Eds) , Judgement under uncertainty: Heuristics and biases Cambridge: Cambridge University Press
-
Tversky, A., &Kahneman, D. (1982). Judgement under uncertainty: Heuristics and biases. In: D. Kahneman, P. Slovic &A. Tversky (Eds)), Judgement under uncertainty: Heuristics and biases (pp. 3-20). Cambridge: Cambridge University Press.
-
(1982)
Judgement under Uncertainty: Heuristics and Biases
, pp. 3-20
-
-
Tversky, A.1
Kahneman, D.2
-
60
-
-
84882348435
-
-
Wired, published September 10, 2007, retrieved September 25, 2007, from
-
Zetter, K. (2007). Rogue nodes turn to anonymiser's into eavesdropper's paradise. Wired, published September 10, 2007, retrieved September 25, 2007, from http://www.wired.com/politics/security/news/2007/09/embassy-hacks
-
(2007)
Rogue Nodes Turn to Anonymiser's into Eavesdropper's Paradise
-
-
Zetter, K.1
|