Title Authors PublicationYear
Policy matters now and in the future: Net neutrality, corporate data mining, and government surveillance McKee, H. A. 2011 view article
Big data: seizing opportunities, preserving values Podesta, J. 2014 view article
Leaky Geopolitics: The Ruptures and Transgressions of WikiLeaks Springer, S., Chi, H., Crampton, J., McConnell, F., Cupples, J., Glynn, K., Warf, B. and Attewell, W. 2012 view article
RFID Technologies: Emerging Issues and Challenges Van Lieshout, M. and Kool, L. 2007 view article
Identification and the practices of identity and privacy in everyday digital communication Wessels, B. 2012 view article
A framework for the ethical impact assessment of information technology Wright, D. 2011 view article
Constructing a surveillance impact assessment Wright, D. and Raab, C. D. 2012 view article
The state of the art in privacy impact assessment Wright, D. 2012 view article
Questioning surveillance Wright, D., Rodrigues, R., Raab, C., Jones, R., Szekely, I., Ball, K., Bellanova, R. and Bergersen, S. 2015 view article
The Management of Visibilities in the Digital Age Flyverbom, M., Leonardi, P. M., Stohl, C. and Stohl, M. 2016 view article