Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Data quality and due process in large interorganizational record systems
Communications of the ACM
Computers and the information society
Computers and the information society
Dossier society: value choices in the design of national information systems
Dossier society: value choices in the design of national information systems
Computer matching is a serious threat to individual rights
Communications of the ACM
The government needs computer matching to root out waste and fraud
Communications of the ACM
Automated welfare client-tracking and service integration: the political economy of computing
Communications of the ACM
Value conflicts and social choice in electronic funds transfer system developments
Communications of the ACM
Electronic funds transfer system: the continuing need for privacy legislation
ACM SIGCAS Computers and Society
Cult of Information
The Rise of the Computer State
The Rise of the Computer State
Computers and Privacy in the Next Decade
Computers and Privacy in the Next Decade
Information Technology in a Democracy
Information Technology in a Democracy
Privacy policies and practices: inside the organizational maze
Communications of the ACM
Computer matching and personal privacy: can they be compatible?
Proceedings of the symposium on Computers and the quality of life
Internet privacy concerns confirm the case for intervention
Communications of the ACM
ACM SIGCAS Computers and Society
Cookies, web bugs, webcams and cue cats: Patterns of surveillance on the world wide web
Ethics and Information Technology
Preface: proceedings of the ICDM 2002 workshop on privacy, security, and data mining
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Implementing privacy dimensions within an electronic storefront
Managing e-commerce and mobile computing technologies
Beyond concern: a privacy-trust-behavioral intention model of electronic commerce
Information and Management
Beyond concern: a privacy-trust-behavioral intention model of electronic commerce
Information and Management
Journal of Theoretical and Applied Electronic Commerce Research
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
Internet Privacy Concerns and Social Awareness as Determinants of Intention to Transact
International Journal of Electronic Commerce
A research note on ethics in the emerging age of überveillance
Computer Communications
Internet privacy concerns and beliefs about government surveillance - An empirical investigation
The Journal of Strategic Information Systems
Collective information practice: emploring privacy and security as social and cultural phenomena
Human-Computer Interaction
Information and Organization
Online privacy, government surveillance and national ID cards
Communications of the ACM - Finding the Fun in Computer Science Education
Privacy-value-control harmonization for RFID adoption in retail
IBM Journal of Research and Development
Cellular telephony and the question of privacy
Communications of the ACM
The loss of location privacy in the cellular age
Communications of the ACM
Personal computing ethics: Beliefs and behaviour
International Journal of Information Management: The Journal for Information Professionals
Hi-index | 48.28 |
Data surveillance is now supplanting conventional surveillance techniques. With this trend come new monitoring methods such as personal dataveillance and mass dataveillance that require more effective safeguards and a formal policy framework.