Title Authors PublicationYear
Big data: seizing opportunities, preserving values Podesta, J. 2014 view article
Leaky Geopolitics: The Ruptures and Transgressions of WikiLeaks Springer, S., Chi, H., Crampton, J., McConnell, F., Cupples, J., Glynn, K., Warf, B. and Attewell, W. 2012 view article
RFID Technologies: Emerging Issues and Challenges Van Lieshout, M. and Kool, L. 2007 view article
Identification and the practices of identity and privacy in everyday digital communication Wessels, B. 2012 view article
A framework for the ethical impact assessment of information technology Wright, D. 2011 view article
Constructing a surveillance impact assessment Wright, D. and Raab, C. D. 2012 view article
The state of the art in privacy impact assessment Wright, D. 2012 view article
Questioning surveillance Wright, D., Rodrigues, R., Raab, C., Jones, R., Szekely, I., Ball, K., Bellanova, R. and Bergersen, S. 2015 view article
Free as the air to common use: First amendment constraints on enclosure of the public domain Benkler, Y. 1999 view article
Social Mobilization and the Networked Public Sphere: Mapping the SOPA-PIPA Debate Benkler, Y., Roberts, H., Faris, R., Solow-Niederman, A. and Etling, B. 2015 view article