Quantcast
Channel: Mendeley group feed for 'Social, Legal and Ethical Issues of Emergency Management'
Browsing all 92 articles
Browse latest View live

Computer and Democracy - A Scandinavian Challenge

Avebury (1987). Gro Bjerknes, Pelle Ehn, Morten Kyng et al.Published using Mendeley: The reference software for researchers

View Article


User participation and democracy: A discussion of Scandinavian research on...

Scandinavian Journal of Information Systems (1995). Volume: 7, Issue: 1. Pages: 73-98. Gro Bjerknes, Tone Bratteteig et al.Stichw: Collective Resources AnsatzPublished using Mendeley: Academic software...

View Article


Participatory Design: Issues and Concerns

Computer Supported Cooperative Work (1998). Volume: 7, Issue: 3. Pages: 167-185. Finn Kensing, Jeanette Blomberg et al.We characterize Participatory Design (PD) as a maturing area of research and as an...

View Article

Shifting Boundaries of Public and Private Life

Theory, Culture & Society (2011). Volume: 28, Issue: 4. Pages: 49-70. J B Thompson et al.High-profile political scandals are symptomatic of a profound transformation of the relations between public...

View Article

Data Mining and the Security-Liberty Debate

The University of Chicago Law Review (2008). Volume: 75, Issue: 1. Pages: 343-362. Daniel J Solove et al.In this essay, written for a symposium on surveillance for the University of Chicago Law Review,...

View Article


From high tech to human tech: Empowerment, measurement, and social studies of...

Computer Supported Cooperative Work (1995). Volume: 3, Issue: 2. Pages: 167-195. Philip E Agre et al.Empowerment has become a pervasive term of art in business practice, particularly in the United...

View Article

Public security versus privacy in technology law: A balancing act?

Computer Law Security Review (2010). Volume: 26, Issue: 2. Pages: 130-143. Kevin Aquilina et al.Technology invades a person's privacy but this has been justified in law on public security grounds. The...

View Article

Face recognition technology: security versus privacy

Volume: 23, Issue: 1. Pages: 9-20. K W Bowyer et al.Video surveillance and face recognition systems have become the subject of increased interest and controversy after the September 11 terrorist...

View Article


Big brother at the door: balancing national security with privacy under the...

Denver University Law Review (2002). Volume: 80, Issue: 2. Pages: 375-425. Patricia Mell et al.In the futuristic world created by George Orwell, there is no personal privacy. ... Initially, the...

View Article


Smart City Dynamics: Smart Cities in Europe

No description available.Published using Mendeley: The research paper manager

View Article

Online Privacy: Towards Informational Self-Determination on the Internet...

Informatik- … (2011). S Fischer-Hübner et al.Published using Mendeley: The research paper manager

View Article

Intrusion in the Sphere of Personal Communications

Socioeconomic and Legal Implications of Electronic … (2009). J Rauhofer et al.Published using Mendeley: Academic software for researchers

View Article

Closed circuit television for inside your head: Blanket traffic data...

Duke Law & Technology Review (2002). C Bowden et al.Published using Mendeley: The research tool for desktop & web

View Article


Privacy groups tell U.S. to stop lobbying EU on data law changes | Politics...

No description available.Published using Mendeley: The research tool for desktop & web

View Article

European data retention rule could violate fundamental E.U. law, Austrian...

No description available.Published using Mendeley: The reference manager for researchers

View Article


German crime stats deal blow to EU's data retention laws - PC Advisor

No description available.Published using Mendeley: The reference software for researchers

View Article

Google vs. Europe in Data-Protection Debate | NewsFactor Business - Digital...

No description available.Published using Mendeley: The library management tool for researchers

View Article


Online Privacy: Towards Informational Self-Determination on the Internet...

Informatik- … (2011). S Fischer-Hübner et al.Published using Mendeley: The research tool for desktop & web

View Article

Whole Community | FEMA.gov

FEMA et al.Published using Mendeley: The reference software for researchers

View Article

Crisis Mapping in Action: How Open Source Software and Global Volunteer...

Journal of Map & Geography Libraries (2012). Volume: 8, Issue: 2. Pages: 89-100. Patrick Meier et al.The purpose of this paper is to share the stories behind some extraordinary maps?live crisis...

View Article
Browsing all 92 articles
Browse latest View live