Privacy: Difference between revisions

40 bytes removed ,  12 years ago
no edit summary
No edit summary
No edit summary
Line 53:
|
|}
 
 
 
 
 
 
 
 
 
===Select References===
 
Bradner, Scott. 2011. [http://www.networkworld.com/columnists/2011/092011-bradner.html Internet privacy: Cookies as a weapon: How will European cookie and other Internet privacy rules impact US companies?]. September 20. 'Net Insider - Network World.
 
jrepin. 2011. [http://news.slashdot.org/story/11/07/30/2046206/Whats-Needed-For-Freedom-In-the-Cloud What's Needed For Freedom In the Cloud?]. July 30. news.slashdot.org.
 
O'Reilly, Tim. 2011. [http://radar.oreilly.com/2011/10/pseudonymity-will-disappear.html Pseudonymity will increasingly disappear: Once we accept a new technological reality, we can come to grips with what to do about it]. October 4. radar.oreilly.com.
 
phobos. 2011. [https://blog.torproject.org/blog/real-name-internet-versus-reality Real Name Internet versus Reality]. July 31. Cambridge, MA: blog.torproject.org.
 
Roberts, Hal, Ethan Zuckerman, John Palfrey. 2011. [http://cyber.law.harvard.edu/publications/2011/2011_Circumvention_Tool_Evaluation Circumvention Tool Evaluation] August 18. Cambridge, MA: cyber.law.harvard.edu.
 
Stanley, Mark. 2011. [http://www.cdt.org/blogs/mark-stanley/219shielding-messengers-section-230-and-free-speech-online Shielding the Messengers: Section 230 and Free Speech Online]. September 21. Center for Democracy and Technology.
 
sTeF. 2011. [http://yro.slashdot.org/story/11/07/03/2315222/US-Wiretap-Report-Released US Wiretap Report Released]. July 3. yro.slashdot.org
 
 
'''Android'''
 
Gibbs-Duhem. 2011. [http://ask.slashdot.org/story/11/07/28/2153248/Ask-Slashdot-How-Do-You-Protect-Data-On-Android Ask Slashdot: How Do You Protect Data On Android?]. July 28. ask.slashdot.org.
 
 
 
 
 
 
Line 104 ⟶ 71:
===Publish my article in a WUaS academic journal in this subject===
 
Open Journal Systems. 2012. [http://pkp.sfu.ca/?q=ojs Open Journal Systems]. Public Knowledge Project.
 
 
Line 176 ⟶ 143:
 
===Select References===
 
Bradner, Scott. 2011. [http://www.networkworld.com/columnists/2011/092011-bradner.html Internet privacy: Cookies as a weapon: How will European cookie and other Internet privacy rules impact US companies?]. September 20. 'Net Insider - Network World.
 
jrepin. 2011. [http://news.slashdot.org/story/11/07/30/2046206/Whats-Needed-For-Freedom-In-the-Cloud What's Needed For Freedom In the Cloud?]. July 30. news.slashdot.org.
 
O'Reilly, Tim. 2011. [http://radar.oreilly.com/2011/10/pseudonymity-will-disappear.html Pseudonymity will increasingly disappear: Once we accept a new technological reality, we can come to grips with what to do about it]. October 4. radar.oreilly.com.
 
phobos. 2011. [https://blog.torproject.org/blog/real-name-internet-versus-reality Real Name Internet versus Reality]. July 31. Cambridge, MA: blog.torproject.org.
 
Roberts, Hal, Ethan Zuckerman, John Palfrey. 2011. [http://cyber.law.harvard.edu/publications/2011/2011_Circumvention_Tool_Evaluation Circumvention Tool Evaluation] August 18. Cambridge, MA: cyber.law.harvard.edu.
 
Stanley, Mark. 2011. [http://www.cdt.org/blogs/mark-stanley/219shielding-messengers-section-230-and-free-speech-online Shielding the Messengers: Section 230 and Free Speech Online]. September 21. Center for Democracy and Technology.
 
sTeF. 2011. [http://yro.slashdot.org/story/11/07/03/2315222/US-Wiretap-Report-Released US Wiretap Report Released]. July 3. yro.slashdot.org
 
 
'''Android'''
 
Gibbs-Duhem. 2011. [http://ask.slashdot.org/story/11/07/28/2153248/Ask-Slashdot-How-Do-You-Protect-Data-On-Android Ask Slashdot: How Do You Protect Data On Android?]. July 28. ask.slashdot.org.
 
 
Line 215 ⟶ 201:
===Select Websites===
 
Stay Safe Online. [http://www.staysafeonline.org/ Stay Safe Online]. National Cyber Security Alliance.
 
 
Anonymous user