Surveillance/Attributions: Difference between revisions

No edit summary
No edit summary
Line 1: Line 1:
=== '''Articles:''' ===
=== '''Articles:''' === AbuHmed, T. Mohaisen, A. Nyang, D. (2008). 'A Survey on Deep Packet Inspection for Intrusion Detection Systems.' ''eprint arXiv.org''. 0803.0037, 3, 2008.&nbsp;[http://arxiv.org/abs/0803.0037v1 http://arxiv.org/abs/0803.0037v1] Licence: © 2010 AbuHmed et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.<br> <br> Artikis, A. Paliouras, G. (2009). 'A Logic Programming Approach to Behaviour Recognition.' ''eprint arXiv.org''. 0905.4614. 5, 2009.&nbsp;[http://arxiv.org/abs/0905.4614v1 http://arxiv.org/abs/0905.4614v1] Licence: © 2009 Artikis et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.<br> <br> Benabbas, Y., Ihaddadene, N. and Djeraba, C.(2011) “Motion Pattern Extraction and Event Detection for Automatic Visual Surveillance,” ''EURASIP Journal on Image and Video Processing'', vol. 2011, Article ID 163682, 4, 2011. [http://www.hindawi.com/journals/ivp/2011/163682/ doi:10.1155/2011/163682] Licence: © 2011 Benabbas et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Chan EH, Sahai V, Conrad C, Brownstein JS, 2011 'Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance.' ''PLoS ''Negl Trop Dis 5(5): e1206. [http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 doi:10.1371/journal.pntd.0001206] Licence: © 2011 Chan et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Chandramohan D, Shibuya K, Setel P, Cairncross S, Lopez AD, et al. (2008) 'Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers?' ''PLoS Med'' 5(2): e57. [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.0050057 doi:10.1371/journal.pmed.0050057] Licence: © 2008 Chandramohan. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> De Nardi, R. Holland, O. (2007). 'SwarMav: A Swarm of Miniature Aerial Vehicles.' Conference Presentation. ''Cogprints''. 5569. 5, 2007.&nbsp;[http://cogprints.org/5569/ http://cogprints.org/5569/] Licence: © 2007 De Nardi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Gayo-Avello, D. (2010). 'All liaisons are dangerous when all your friends are known to us.' ''eprint arXiv.org''.&nbsp;1012.5913, 12, 2010.&nbsp;[http://arxiv.org/abs/1012.5913 http://arxiv.org/abs/1012.5913] Licence: © 2010 Gayo-Avello. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Kholghi, M. Keyvanpour, M. (2011). 'An analytical framework for data stream mining techniques based on challenges and requirements.' ''eprint arXiv.org''. 1105.1950, 5, 2011.&nbsp;[http://arxiv.org/abs/1105.1950 http://arxiv.org/abs/1105.1950] Licence: © 2011 Khoglhi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Lee SH, Kim P-J, Ahn Y-Y, Jeong H, (2010). 'Googling Social Interactions: Web Search Engine Based Social Network Construction.' PLoS ONE 5(7): e11233. 3, 2010.&nbsp;[http://www.plosone.org/article/info:doi/10.1371/journal.pone.0011233 doi:10.1371/journal.pone.0011233] Licence: © 2010 Lee et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Najafabadi, AT. Pourhassan, M. (2010) 'Web GIS and Public Health Data.' ''Online Journal of Health and Allied Sciences''. ''Cogprints''. 6972. 9, 2010.&nbsp;[http://cogprints.org/6972/ http://cogprints.org/6972/] Licence: © 2010 Najafabadi et. al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Ohm, Paul, (2008) 'The Rise and Fall of Invasive ISP Surveillance' (August 30, 2008). University of Illinois Law Review, 2009; U of Colorado Law Legal Studies Research Paper No. 08-22. Available at SSRN: [http://ssrn.com/abstract=1261344 http://ssrn.com/abstract=1261344] Licence: © 2008 Ohm. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Pushpavathi, TP. Selvarani, R. Shahsi Kumar, NR. (2010). 'GPRS video Streaming Surveillance System GVSS.' ''eprint arXiv.org'' 1002.3011. 2, 2010.&nbsp;[http://arxiv.org/abs/1002.3011v1 http://arxiv.org/abs/1002.3011v1] Licence: © 2010 Pushpavathi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Rennie S, Turner AN, Mupenda B, Behets F, (2009) 'Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns.' ''PLoS Med'' 6(1): e1000004. [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.1000004 doi:10.1371/journal.pmed.1000004] Licence: © 2009. Rennie et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Solove, Daniel J., (2008) 'Data Mining and the Security-Liberty Debate.' ''University of Chicago Law Review'', Vol. 74, p. 343, 2008; GWU Law School Public Law Research Paper No. 278. Available at SSRN: [http://ssrn.com/abstract=990030 http://ssrn.com/abstract=990030] Licence: © 2008 Solove. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Tene, Omer, 'What Google Knows: Privacy and Internet Search Engines' (October 1, 2007). Utah Law Review, Vol 2008, No4. Available at SSRN: [http://ssrn.com/abstract=1021490 http://ssrn.com/abstract=1021490] Licence: © 2007 Tene. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Warren, S. Brandeis, L. (1890). 'The Right to Privacy' ''Harvard Law Review''. Vol IV, No. 5. 12, 1890.&nbsp;[http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html] License: Public Domain. === '''In the Appendix'''<br>Bond, David. Erasing David. 2009. Available online at: http://erasingdavid.com/<br>Morgan, T. 'Location Makes mobile Mobile.' Momo Amsterdam Talk. 1, 2010. Available online at: http://www.youtube.com/watch?v=bIJyWi9YsYU<br>Steel, E. "A Web Pioneer Profiles Users by Name." &amp; 'Cracking the Code.' Wall Street Journal. October 25, 2010. Available online at: http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html and http://s.wsj.net/public/resources/documents/st_RAPLEAF_20101018.html<br>Timoner, Ondi. We Live in Public. 2009. Available online at: http://www.hulu.com/watch/192218/we-live-in-public ===
 
AbuHmed, T. Mohaisen, A. Nyang, D. (2008). 'A Survey on Deep Packet Inspection for Intrusion Detection Systems.' ''eprint arXiv.org''. 0803.0037, 3, 2008.&nbsp;[http://arxiv.org/abs/0803.0037v1 http://arxiv.org/abs/0803.0037v1]  
 
Licence: © 2010 AbuHmed et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.<br>  
 
<br>  
 
Artikis, A. Paliouras, G. (2009). 'A Logic Programming Approach to Behaviour Recognition.' ''eprint arXiv.org''. 0905.4614. 5, 2009.&nbsp;[http://arxiv.org/abs/0905.4614v1 http://arxiv.org/abs/0905.4614v1]  
 
Licence: © 2009 Artikis et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.<br>  
 
<br>  
 
Benabbas, Y., Ihaddadene, N. and Djeraba, C.(2011) “Motion Pattern Extraction and Event Detection for Automatic Visual Surveillance,” ''EURASIP Journal on Image and Video Processing'', vol. 2011, Article ID 163682, 4, 2011. [http://www.hindawi.com/journals/ivp/2011/163682/ doi:10.1155/2011/163682]  
 
Licence: © 2011 Benabbas et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.  
 
<br>  
 
Chan EH, Sahai V, Conrad C, Brownstein JS, 2011 'Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance.' ''PLoS ''Negl Trop Dis 5(5): e1206. [http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 doi:10.1371/journal.pntd.0001206]  
 
Licence: © 2011 Chan et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.  
 
<br>  
 
Chandramohan D, Shibuya K, Setel P, Cairncross S, Lopez AD, et al. (2008) 'Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers?' ''PLoS Med'' 5(2): e57. [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.0050057 doi:10.1371/journal.pmed.0050057]  
 
Licence: © 2008 Chandramohan. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.  
 
<br>  
 
De Nardi, R. Holland, O. (2007). 'SwarMav: A Swarm of Miniature Aerial Vehicles.' Conference Presentation. ''Cogprints''. 5569. 5, 2007.&nbsp;[http://cogprints.org/5569/ http://cogprints.org/5569/]  
 
Licence: © 2007 De Nardi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.  
 
<br>  
 
Gayo-Avello, D. (2010). 'All liaisons are dangerous when all your friends are known to us.' ''eprint arXiv.org''.&nbsp;1012.5913, 12, 2010.&nbsp;[http://arxiv.org/abs/1012.5913 http://arxiv.org/abs/1012.5913]  
 
Licence: © 2010 Gayo-Avello. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.  
 
<br>  
 
Kholghi, M. Keyvanpour, M. (2011). 'An analytical framework for data stream mining techniques based on challenges and requirements.' ''eprint arXiv.org''. 1105.1950, 5, 2011.&nbsp;[http://arxiv.org/abs/1105.1950 http://arxiv.org/abs/1105.1950]  
 
Licence: © 2011 Khoglhi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.  
 
<br>  
 
Lee SH, Kim P-J, Ahn Y-Y, Jeong H, (2010). 'Googling Social Interactions: Web Search Engine Based Social Network Construction.' PLoS ONE 5(7): e11233. 3, 2010.&nbsp;[http://www.plosone.org/article/info:doi/10.1371/journal.pone.0011233 doi:10.1371/journal.pone.0011233]  
 
Licence: © 2010 Lee et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.  
 
<br>  
 
Najafabadi, AT. Pourhassan, M. (2010) 'Web GIS and Public Health Data.' ''Online Journal of Health and Allied Sciences''. ''Cogprints''. 6972. 9, 2010.&nbsp;[http://cogprints.org/6972/ http://cogprints.org/6972/]  
 
Licence: © 2010 Najafabadi et. al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.  
 
<br>  
 
Ohm, Paul, (2008) 'The Rise and Fall of Invasive ISP Surveillance' (August 30, 2008). University of Illinois Law Review, 2009; U of Colorado Law Legal Studies Research Paper No. 08-22. Available at SSRN: [http://ssrn.com/abstract=1261344 http://ssrn.com/abstract=1261344]  
 
Licence: © 2008 Ohm. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.  
 
<br>  
 
Pushpavathi, TP. Selvarani, R. Shahsi Kumar, NR. (2010). 'GPRS video Streaming Surveillance System GVSS.' ''eprint arXiv.org'' 1002.3011. 2, 2010.&nbsp;[http://arxiv.org/abs/1002.3011v1 http://arxiv.org/abs/1002.3011v1]  
 
Licence: © 2010 Pushpavathi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.  
 
<br>  
 
Rennie S, Turner AN, Mupenda B, Behets F, (2009) 'Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns.' ''PLoS Med'' 6(1): e1000004. [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.1000004 doi:10.1371/journal.pmed.1000004]  
 
Licence: © 2009. Rennie et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.  
 
<br>  
 
Solove, Daniel J., (2008) 'Data Mining and the Security-Liberty Debate.' ''University of Chicago Law Review'', Vol. 74, p. 343, 2008; GWU Law School Public Law Research Paper No. 278. Available at SSRN: [http://ssrn.com/abstract=990030 http://ssrn.com/abstract=990030]  
 
Licence: © 2008 Solove. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.  
 
<br>  
 
Tene, Omer, 'What Google Knows: Privacy and Internet Search Engines' (October 1, 2007). Utah Law Review, Vol 2008, No4. Available at SSRN: [http://ssrn.com/abstract=1021490 http://ssrn.com/abstract=1021490]  
 
Licence: © 2007 Tene. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.  
 
<br>  
 
Warren, S. Brandeis, L. (1890). 'The Right to Privacy' ''Harvard Law Review''. Vol IV, No. 5. 12, 1890.&nbsp;[http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html]  
 
License: Public Domain.  
 
 
 
=== '''In the Appendix'''<br>Bond, David. Erasing David. 2009. Available online at: http://erasingdavid.com/<br>Morgan, T. 'Location Makes mobile Mobile.' Momo Amsterdam Talk. 1, 2010. Available online at: http://www.youtube.com/watch?v=bIJyWi9YsYU<br>Steel, E. "A Web Pioneer Profiles Users by Name." &amp; 'Cracking the Code.' Wall Street Journal. October 25, 2010. Available online at: http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html and http://s.wsj.net/public/resources/documents/st_RAPLEAF_20101018.html<br>Timoner, Ondi. We Live in Public. 2009. Available online at: http://www.hulu.com/watch/192218/we-live-in-public ===

Revision as of 16:42, 21 August 2011

Articles: === AbuHmed, T. Mohaisen, A. Nyang, D. (2008). 'A Survey on Deep Packet Inspection for Intrusion Detection Systems.' eprint arXiv.org. 0803.0037, 3, 2008. http://arxiv.org/abs/0803.0037v1 Licence: © 2010 AbuHmed et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Artikis, A. Paliouras, G. (2009). 'A Logic Programming Approach to Behaviour Recognition.' eprint arXiv.org. 0905.4614. 5, 2009. http://arxiv.org/abs/0905.4614v1 Licence: © 2009 Artikis et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Benabbas, Y., Ihaddadene, N. and Djeraba, C.(2011) “Motion Pattern Extraction and Event Detection for Automatic Visual Surveillance,” EURASIP Journal on Image and Video Processing, vol. 2011, Article ID 163682, 4, 2011. doi:10.1155/2011/163682 Licence: © 2011 Benabbas et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Chan EH, Sahai V, Conrad C, Brownstein JS, 2011 'Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance.' PLoS Negl Trop Dis 5(5): e1206. doi:10.1371/journal.pntd.0001206 Licence: © 2011 Chan et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Chandramohan D, Shibuya K, Setel P, Cairncross S, Lopez AD, et al. (2008) 'Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers?' PLoS Med 5(2): e57. doi:10.1371/journal.pmed.0050057 Licence: © 2008 Chandramohan. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
De Nardi, R. Holland, O. (2007). 'SwarMav: A Swarm of Miniature Aerial Vehicles.' Conference Presentation. Cogprints. 5569. 5, 2007. http://cogprints.org/5569/ Licence: © 2007 De Nardi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Gayo-Avello, D. (2010). 'All liaisons are dangerous when all your friends are known to us.' eprint arXiv.org. 1012.5913, 12, 2010. http://arxiv.org/abs/1012.5913 Licence: © 2010 Gayo-Avello. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Kholghi, M. Keyvanpour, M. (2011). 'An analytical framework for data stream mining techniques based on challenges and requirements.' eprint arXiv.org. 1105.1950, 5, 2011. http://arxiv.org/abs/1105.1950 Licence: © 2011 Khoglhi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Lee SH, Kim P-J, Ahn Y-Y, Jeong H, (2010). 'Googling Social Interactions: Web Search Engine Based Social Network Construction.' PLoS ONE 5(7): e11233. 3, 2010. doi:10.1371/journal.pone.0011233 Licence: © 2010 Lee et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Najafabadi, AT. Pourhassan, M. (2010) 'Web GIS and Public Health Data.' Online Journal of Health and Allied Sciences. Cogprints. 6972. 9, 2010. http://cogprints.org/6972/ Licence: © 2010 Najafabadi et. al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Ohm, Paul, (2008) 'The Rise and Fall of Invasive ISP Surveillance' (August 30, 2008). University of Illinois Law Review, 2009; U of Colorado Law Legal Studies Research Paper No. 08-22. Available at SSRN: http://ssrn.com/abstract=1261344 Licence: © 2008 Ohm. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Pushpavathi, TP. Selvarani, R. Shahsi Kumar, NR. (2010). 'GPRS video Streaming Surveillance System GVSS.' eprint arXiv.org 1002.3011. 2, 2010. http://arxiv.org/abs/1002.3011v1 Licence: © 2010 Pushpavathi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Rennie S, Turner AN, Mupenda B, Behets F, (2009) 'Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns.' PLoS Med 6(1): e1000004. doi:10.1371/journal.pmed.1000004 Licence: © 2009. Rennie et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Solove, Daniel J., (2008) 'Data Mining and the Security-Liberty Debate.' University of Chicago Law Review, Vol. 74, p. 343, 2008; GWU Law School Public Law Research Paper No. 278. Available at SSRN: http://ssrn.com/abstract=990030 Licence: © 2008 Solove. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Tene, Omer, 'What Google Knows: Privacy and Internet Search Engines' (October 1, 2007). Utah Law Review, Vol 2008, No4. Available at SSRN: http://ssrn.com/abstract=1021490 Licence: © 2007 Tene. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Warren, S. Brandeis, L. (1890). 'The Right to Privacy' Harvard Law Review. Vol IV, No. 5. 12, 1890. http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html License: Public Domain. === In the Appendix
Bond, David. Erasing David. 2009. Available online at: http://erasingdavid.com/
Morgan, T. 'Location Makes mobile Mobile.' Momo Amsterdam Talk. 1, 2010. Available online at: http://www.youtube.com/watch?v=bIJyWi9YsYU
Steel, E. "A Web Pioneer Profiles Users by Name." & 'Cracking the Code.' Wall Street Journal. October 25, 2010. Available online at: http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html and http://s.wsj.net/public/resources/documents/st_RAPLEAF_20101018.html
Timoner, Ondi. We Live in Public. 2009. Available online at: http://www.hulu.com/watch/192218/we-live-in-public