Digital Disaster, Cyber Security, and the Copenhagen School |
Hansen, L. and Nissenbaum, H. |
2009 |
view article
|
Introduction: International perspectives on surveillance, technology and the management of risk |
Hier, S. P. and Lyon, D. |
2004 |
view article
|
Organizational balancing of website interactivity and control: An examination of ideological groups and the duality of goals |
Jensen, M. L., Dunbar, N. E., Connelly, M. S., Taylor, W. D., Hughes, M., Adame, B. and Rozzell, B. |
2014 |
view article
|
Prospects for Poor Neighborhoods in the Broadband Era: Neighborhood-Level Influences on Technology Use at Work |
Kaplan, D. and Mossberger, K. |
2012 |
view article
|
The honest data protection officer's guide to enable citizens to exercise their subject access rights: lessons from a ten-country European study |
L'Hoiry, X. D. and Norris, C. |
2015 |
view article
|
The Internet under siege |
Lessig, L. |
2001 |
view article
|
Regulating the internet at home: Contrasting the perspectives of children and parents |
Livingstone, S. and Bober, M. |
2006 |
view article
|
Strategies of parental regulation in the media-rich home |
Livingstone, S. |
2007 |
view article
|
Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression |
Livingstone, S. |
2008 |
view article
|
Critical reflections on the benefits of ICT in education |
Livingstone, S. |
2012 |
view article
|