Andoh, Chris (Author)
Godderis, Andreas (Author)
The evolution of computing cannot be fully explained without consideration of the legal and social friction that challenged individuals at the frontier of computer development. The incorporation of the personal computer into nearly every American household has made the technology central to modern social interaction and has expanded daily life into cyberspace. How do fundamental laws, such as the Fourth Amendment, expand alongside this new media? With the ever-increasing virtualization of our lives, we will be faced with a whole array of legal conundrums and we can learn a great deal about how to alleviate these issues by recognizing the challenges of the past.
...More
Article
Benedict Douglas;
(January 2018)
The mtDNA of Human Rights
(/isis/citation/CBB895767767/)
Article
Jan Kallberg;
(June 2019)
The Second Amendment and Cyber Weapons: Constitutional Relevance of Digital Gun Rights
(/isis/citation/CBB823387464/)
Article
Ilke Turkmendag;
(January 2018)
It Is Just a “Battery”: “Right” to Know in Mitochondrial Replacement
(/isis/citation/CBB838678540/)
Book
Susan C. Lawrence;
(2016)
Privacy and the Past: Research, Law, Archives, Ethics
(/isis/citation/CBB650168542/)
Article
Bronwyn Parry;
(January 2018)
The Social Life of “Scaffolds” Examining Human Rights in Regenerative Medicine
(/isis/citation/CBB220784562/)
Article
Olivier Walusinski;
(2017)
Antoine-Marie Chambeyron (1797–1851): a forgotten disciple of Jean-Etienne Esquirol (1772–1840)
(/isis/citation/CBB311937342/)
Book
Giorgio Giulio Santonocito;
(2022)
Storia del diritto alla salute
(/isis/citation/CBB510089251/)
Article
Noa Vaisman;
(January 2018)
The Human, Human Rights, and DNA Identity Tests
(/isis/citation/CBB181652030/)
Book
John Cheney-Lippold;
(2017)
We are data : Algorithms and the making of our digital selves
(/isis/citation/CBB593815757/)
Article
Siddique Latif;
Adnan Qayyum;
Muhammad Usama;
Junaid Qadir;
Andrej Zwitter;
Muhammad Shahzad;
(September 2019)
Caveat Emptor: The Risks of Using Big Data for Human Development
(/isis/citation/CBB326485886/)
Article
Ons Al-Shamaileh;
(June 2018)
I Have Issues with Facebook: But I Will Keep Using It
(/isis/citation/CBB503279988/)
Chapter
Coopersmith, Jonathan C.;
(1999)
The role of the pornography industry in the development of videotape and the Internet
(/isis/citation/CBB118649229/)
Review
Russell, Andrew;
(2016)
Review of unknown publication
(/isis/citation/CBB100069195/)
Article
Roesner, Franziska;
(Winter 2015)
Computer Security and Privacy: Where Human Factors Meet Engineering
(/isis/citation/CBB605988846/)
Book
Ashley Sweetman;
(2022)
Cyber and the City: Securing London’s Banks in the Computer Age
(/isis/citation/CBB340774234/)
Article
Vijay Sivaraman;
Hassan Habibi Gharakheili;
Clinton Fernandes;
Narelle Clark;
Tanya Karliychuk;
(June 2018)
Smart IoT Devices in the Home: Security and Privacy Implications
(/isis/citation/CBB353680957/)
Article
Kristina Milanovic;
(March 2020)
Smart Home Security: How Safe is Your Data?
(/isis/citation/CBB341237675/)
Chapter
Meg Leta Jones;
(2021)
Chapter 9. Surveillance Capitalism Online: Cookies, Notice and Choice, and Web Privacy
(/isis/citation/CBB517617260/)
Book
Duane C. Wilson;
(2021)
Cybersecurity
(/isis/citation/CBB201310866/)
Article
Ben Collier;
James Stewart;
(2022)
Privacy Worlds: Exploring Values and Design in the Development of the Tor Anonymity Network
(/isis/citation/CBB749753638/)
Be the first to comment!