Surveillance or Security?: The Risks Posed by New Wiretapping Technologies

被引:0
|
作者
Boyle, Philip [1 ]
机构
[1] Newcastle Univ, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
关键词
D O I
10.1177/0094306112438190ff
中图分类号
C91 [社会学];
学科分类号
030301 ; 1204 ;
摘要
引用
收藏
页码:221 / 223
页数:3
相关论文
共 50 条
  • [31] Understanding the risks posed by management
    Redmill, Felix
    Developments in Risk-Based Approaches to Safety, 2006, : 155 - 169
  • [32] Risks Posed by Space Debris
    Qi Yongliang
    AerospaceChina, 1994, (01) : 29 - 30
  • [33] Assessing Security Risks Posed by State-Owned Enterprises in the Context of International Investment Agreements
    Mendenhall, James E.
    ICSID REVIEW-FOREIGN INVESTMENT LAW JOURNAL, 2016, 31 (01) : 36 - 44
  • [34] Infectious risks of blood transfusions: Recent advances in testing technologies and new approaches to surveillance and decision-making
    Busch, M. P.
    STATE OF THE ART PRESENTATIONS, 2014, 9 (01): : 276 - 280
  • [35] NEW TECHNOLOGIES - NEW RISKS - NEW DEMANDS ON THE ANALYSIS OF WORK
    BOHLE, F
    MILKAU, B
    ZEITSCHRIFT FUR SOZIOLOGIE, 1989, 18 (04): : 249 - 262
  • [36] NEW WEAPONS TECHNOLOGIES AND EUROPEAN SECURITY
    BURT, R
    ORBIS-A JOURNAL OF WORLD AFFAIRS, 1975, 19 (02): : 514 - 532
  • [37] New Technologies in Education for Security and Safety
    Gawlik-Kobylinska, Malgorzata
    Maciejewski, Pawel
    PROCEEDINGS OF 2019 8TH INTERNATIONAL CONFERENCE ON EDUCATIONAL AND INFORMATION TECHNOLOGY (ICEIT 2019), 2019, : 198 - 202
  • [38] New technologies to serve security needs
    Cappaert, Sylvie
    Dufays, Tony
    Public Transport International, 2004, 53 (06): : 28 - 29
  • [39] Moving the goalposts while scoring―the dilemma posed by new PET technologies
    Julian M.M. Rogasch
    Ronald Boellaard
    Lucy Pike
    Peter Borchmann
    Peter Johnson
    Jürgen Wolf
    Sally F. Barrington
    Carsten Kobe
    European Journal of Nuclear Medicine and Molecular Imaging, 2021, 48 : 2696 - 2710
  • [40] Security views - FCC rules that VoIP companies are subject to wiretapping
    Schultz, E
    COMPUTERS & SECURITY, 2005, 24 (07) : 513 - 513