[图书][B] Obfuscation: A user's guide for privacy and protest
F Brunton, H Nissenbaum - 2015 - books.google.com
How we can evade, protest, and sabotage today's pervasive digital surveillance by
deploying more data, not less—and why we should. With Obfuscation, Finn Brunton and …
deploying more data, not less—and why we should. With Obfuscation, Finn Brunton and …
The public domain: Surveillance in everyday life
A Marwick - Surveillance & Society, 2012 - ojs.library.queensu.ca
People create profiles on social network sites and Twitter accounts against the background
of an audience. This paper argues that closely examining content created by others and …
of an audience. This paper argues that closely examining content created by others and …
Transparent predictions
TZ Zarsky - U. Ill. L. Rev., 2013 - HeinOnline
Can human behavior be predicted? A broad variety of governmental initiatives are using
computerized processes to try. Vast datasets of personal information enhance the ability to …
computerized processes to try. Vast datasets of personal information enhance the ability to …
The un-territoriality of data
J Daskal - Yale lJ, 2015 - HeinOnline
Territoriality looms large in our jurisprudence, particularly as it relates to the government's
authority to search and seize. Fourth Amendment rights turn on whether the search or …
authority to search and seize. Fourth Amendment rights turn on whether the search or …
Social privacy in networked publics: Teens' attitudes, practices, and strategies
D Boyd, AE Marwick - A decade in internet time: Symposium on the …, 2011 - papers.ssrn.com
This paper examines how teens understand privacy in highly public networked
environments like Facebook and Twitter. We describe both teens' practices, their privacy …
environments like Facebook and Twitter. We describe both teens' practices, their privacy …
Snitching: Criminal informants and the erosion of American justice
A Natapoff - Snitching, 2022 - degruyter.com
Curtis Flowers spent twenty-three years on death row for a murder he did not commit. Atlanta
police killed 92-year-old Kathryn Johnston during a misguided raid on her home. Rachel …
police killed 92-year-old Kathryn Johnston during a misguided raid on her home. Rachel …
[图书][B] Control and protect: Collaboration, carceral protection, and domestic sex trafficking in the United States
J Musto - 2016 - books.google.com
" Control and Protect explores the meaning and significance of efforts designed to combat
sex trafficking in the United States. A striking case study of the new ways in which law …
sex trafficking in the United States. A striking case study of the new ways in which law …
[图书][B] Privacy as Trust: Information Privacy for an Information Age
AE Waldman - 2018 - books.google.com
It seems like there is no such thing as privacy anymore. But the truth is that privacy is in
danger only because we think about it in narrow, limited, and outdated ways. In this …
danger only because we think about it in narrow, limited, and outdated ways. In this …
Industrial cyber vulnerabilities: Lessons from Stuxnet and the Internet of Things
LJ Trautman, PC Ormerod - U. Miami L. Rev., 2017 - HeinOnline
Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things Page 1
Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things LAWRENCE J …
Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things LAWRENCE J …
Plausible cause: Explanatory standards in the age of powerful machines
K Brennan-Marquez - Vand. L. Rev., 2017 - HeinOnline
Suppose, in the near future, that police start using an algorithmic tool-the Contraband
Detector-to locate residences likely to contain illegal weapons. When the tool was first …
Detector-to locate residences likely to contain illegal weapons. When the tool was first …