Title Authors PublicationYear
Responsibility Practices and Unmanned Military Technologies Noorman, M. 2014 view article
Big data: seizing opportunities, preserving values Podesta, J. 2014 view article
Leaky Geopolitics: The Ruptures and Transgressions of WikiLeaks Springer, S., Chi, H., Crampton, J., McConnell, F., Cupples, J., Glynn, K., Warf, B. and Attewell, W. 2012 view article
Identification and the practices of identity and privacy in everyday digital communication Wessels, B. 2012 view article
Constructing a surveillance impact assessment Wright, D. and Raab, C. D. 2012 view article
The state of the art in privacy impact assessment Wright, D. 2012 view article
Questioning surveillance Wright, D., Rodrigues, R., Raab, C., Jones, R., Szekely, I., Ball, K., Bellanova, R. and Bergersen, S. 2015 view article
Free as the air to common use: First amendment constraints on enclosure of the public domain Benkler, Y. 1999 view article
Networks of Power, Degrees of Freedom Benkler, Y. 2011 view article
Social Mobilization and the Networked Public Sphere: Mapping the SOPA-PIPA Debate Benkler, Y., Roberts, H., Faris, R., Solow-Niederman, A. and Etling, B. 2015 view article