Responsibility Practices and Unmanned Military Technologies |
Noorman, M. |
2014 |
view article
|
Big data: seizing opportunities, preserving values |
Podesta, J. |
2014 |
view article
|
Leaky Geopolitics: The Ruptures and Transgressions of WikiLeaks |
Springer, S., Chi, H., Crampton, J., McConnell, F., Cupples, J., Glynn, K., Warf, B. and Attewell, W. |
2012 |
view article
|
Identification and the practices of identity and privacy in everyday digital communication |
Wessels, B. |
2012 |
view article
|
Constructing a surveillance impact assessment |
Wright, D. and Raab, C. D. |
2012 |
view article
|
The state of the art in privacy impact assessment |
Wright, D. |
2012 |
view article
|
Questioning surveillance |
Wright, D., Rodrigues, R., Raab, C., Jones, R., Szekely, I., Ball, K., Bellanova, R. and Bergersen, S. |
2015 |
view article
|
Free as the air to common use: First amendment constraints on enclosure of the public domain |
Benkler, Y. |
1999 |
view article
|
Networks of Power, Degrees of Freedom |
Benkler, Y. |
2011 |
view article
|
Social Mobilization and the Networked Public Sphere: Mapping the SOPA-PIPA Debate |
Benkler, Y., Roberts, H., Faris, R., Solow-Niederman, A. and Etling, B. |
2015 |
view article
|