Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet199/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   195   196   197   198   199   200   201   202   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

194
CHAPTER 14
Social media and Big Data
Pell, S.K., 2012. Systematic government access to private-sector data in the United States. Int. 
Data Privacy Law 2 (4), 245–254.
Reidenberg, J., 2013. The Data Surveillance State in the US and Europe. 
Wake Forest Law Rev.
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2349269
#!.
Rubinstein, I.S., 2013. Big Data: the end of privacy or a new beginning? 
Int. Data Privacy Law
3 (2), 74–87. 
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2157659
.
Schwartz, P.M., 2012. Systematic government access to private-sector data in Germany. Int. 
Data Privacy Law 2 (4), 289–301.
Schwartz, P.M., Solove, D.J., 2011. The PII problem: privacy and a new concept of personally 
identifiable information. New York University L. Rev. 86, 1841–1845.
Svantesson, D.B.J., 2012. Systematic government access to private-sector data in Australia. 
Int. Data Privacy Law 2 (4), 268–276.
Sweeney, L., 2000a. Foundations of Privacy Protection from a Computer Science Perspective. 
In: Proc. Joint Statistical Meeting. AAAS, Indianapolis.
Sweeney, L., 2000b. Simple Demographics Often Identify People Uniquely. Data Privacy 
Working Paper 3 Carnegie Mellon University, Pittsburgh.
Swire, P., 2012. From real-time intercepts to stored records: why encryption drives the govern-
ment to seek access to the cloud. Int. Data Privacy Law 2 (4), 200–206.
Tene, O., Polonetsky, J., 2013. Big Data for all: privacy and user control in the age of analytics. 
Nw. J. Tech. Intell. Prop 11, 239–274. 
http://papers.ssrn.com/sol3/papers.cfm?abstract_
id=2149364
[10.12.13].
Tene, O., Polonetsky, J., 2012. Privacy in the age of big data: a time for big decisions. Stan. L. 
Rev. Online 64, 63–69.
Tene, O., 2012. Systematic government access to private-sector data in Israel. Int. Data Privacy 
Law 2 (4), 277–288.
The Aspen Institute, 2010. 
The Promise and Peril of Big Data
. David Bollier Rapporteur, 
Washington. 
http://www.aspeninstitute.org/sites/default/files/content/docs/pubs/The_
Promise_and_Peril_of_Big_Data.pdf
 [10.12.13].
Zang, H., Bolot, J., 2011. Anonymization of location data does not work: a large-scale mea-
surement study. In: Proc. MobiCom '11 Proceedings of the 17th Annual International 
Conference on Mobile Computing and Networking. pp. 145–156.
The Decision of the Standing Committee of the National People’s Congress on Strengthening 
Internet Information Protection, adopted at the 30th Session of Standing Committee of the 
11th National People’s Congress on December 28, 2012. 
http://ishimarulaw.com/strength-
ening-network-information-protectionoctober-china-bulletin/
[25.10.13].
The European Cloud Partnership (ECP), 
https://ec.europa.eu/digital-agenda/node/609
[Dec. 
10, 2013].
Tsuchiya, M., 2012. Systematic government access to private-sector data in Japan. Int. Data 
Privacy Law 2 (4), 239–244.
Turow, J., Hoofnagle, C., Mulligan, D., Good, N., Grossklags, J., 2007. The Federal Trade 
Commission and Consumer Privacy in the Coming Decade. 
ISJLP
3, 723–749. 
http://
scholarship.law.berkeley.edu/facpubs/935
.
United States General Accounting Office, 2011. Record Linkage and Privacy. Issues in 
creating New Federal Research and Statistical Information. 
http://www.gao.gov/ 
assets/210/201699.pdf
[10.12.13].
van Hoboken, J.V.J., Arnbak, A.M., van Eijk, N.A.N.M., 2012. Cloud Computing in Higher 
Education and Research Institutions and the USA Patriot Act. Institute for Information 



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   195   196   197   198   199   200   201   202   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish