Valikko

Unessakävelyllä valvontayhteiskuntaan? - Kymmenen trendiä jotka meidän on tunnettava



Viitteet

ACLU. Surveillance Society Clock.
http://www.aclu.org/technology-and-liberty/surveillance-society-clock.

ACTA. Anti-Counterfeiting Trade Agreement
http://en.wikipedia.org/wiki/Anti-Counterfeiting_Trade_Agreement

Baloo, Jaya, ETSI & Lawful Interception of IP-traffic. RIPE-48 Meeting, May 2004.
http://meetings.ripe.net/ripe-48/presentations/ripe48-eof-etsi.pdf

BBC News (2010), Timeline: China and net censorship. Last update: 23 March 2010.http://news.bbc.co.uk/2/hi/8460129.stm

Bitso, Constance & Fourie, Ina & Bothma, Theo (2012), Trends in transition from classical censorship to Internet censorship: selected country overviews. FAIFE Spotlight, 2012.http://www.ifla.org/faife/spotlight

Boyarsky, Nicholas (2002), The Technique of Space. In: Leon Van Schaik & Peter Lyssiotis, Poetics in Architecture: 82-83. London; New York: Architectural Design; Wiley Academy, 2002.

Cross, Tom (2010), Exploiting Lawful Intercept to Wiretap the Internet.Black Hat Technical Security Conference, Jan 2010. http://www.blackhat.com/presentations/bh-dc-10/Cross_Tom/BlackHat-DC-2010-Cross-Attacking-LawfulI-Intercept-slides.pdf

Digital Economy Act 2010. Wikipedia.http://en.wikipedia.org/wiki/Digital_Economy_Act_2010

Dutton, William H. & Dopatka, Anna & Hills, Michael & Law, Ginette & Nash, Victoria (2010), Freedom of Connection - Freedom of Expression: The Changing Legal and Regulatory Ecology Shaping the Internet. Oxford Internet Institute, University of Oxford. A report prepared for UNESCO's Division for Freedom of Expression, Democracy and Peace. http://www.ifap.ru/library/book478.pdf

Dziech, Andrzej (2011). INDECT: Intelligent information system supporting observation, searching and detection for security of citizens in urban environment. Presentation. 10.4.2011. http://www.indect-project.eu/files/public-stories/presentation-at-the-hq-of-polish-police/INDECT_Dziech_EN.pdf

Erasing David (2010). A documentary about privacy, surveillance and the database state. http://erasingdavid.com/

Etzioni, Amitai (2012), The Privacy Merchants: What Is To Be Done? University of Pennsylvania Journal of Constitutional Law 14.4 (March 2012) p. 929-951http://icps.gwu.edu/files/2010/10/privacy-merchants.pdf

Fay, Joe (2010), Google leaves censorship to China's experts: China crisis not exactly a human rights triumph. The Register. 13.1.2010.http://www.theregister.co.uk/2010/01/13/google_china1/

Firmino, Sandra (2010), Corruption and quality of democracy. 3rd ECPRGraduate Conference. 30.8.-1.9.2010. Dublin.http://www.ecprnet.eu/databases/conferences/papers/878.pdf

Habeas corpus. Wikipedia.http://en.wikipedia.org/wiki/Habeas_corpus

Hadopi law. Wikipedia.http://en.wikipedia.org/wiki/HADOPI_law

Hamilton, Stuart & Moon, Darren (2012), The Struggle to Scale: Keeping Up With the Internet. FAIFE Spotlight, 2012.http://www.ifla.org/faife/spotlight

Johnston, Ian (2009), EU funding 'Orwellian' artificial intelligence plan to monitor public for "abnormal behaviour". The Telegraph, 19.9.2009. http://www.telegraph.co.uk/news/uknews/6210255/EU-funding-Orwellian-artificial-intelligence-plan-to-monitor-public-for-abnormal-behaviour.html

Karhula, Päivikki (2012a), Data driven futures. FAIFE Spotlight, 5.6.2012.http://www.ifla.org/faife/spotlight

Karhula, Päivikki (2012b), Information and communication related control in a ubiquitous environment. (Unpublished article)

Kelly, Sanja & Cook, Sarah (2011), New technologies, innovative repression: Growing Threats to Internet Freedom. In: Freedom on the Net 2011: A Global Assessment of Internet and Digital Media. Freedom House. http://www.freedomhouse.org/sites/default/files/inline_images/Overview%20essay%20FINAL%204%2014%202011.pdf

Khaki, Ateqah (2012), Indefinite Detention is Un-American. ACLU Blog of rights. 6.6.2012. http://www.aclu.org/blog/national-security/indefinite-detention-un-american

La Rue, Frank (2011), Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression. United Nations. Human Rights Council. 16 May 2011. Seventeenth session, Agenda item 3. Promotion and protection of all human rights, civil, political, economic, social and cultural rights, including the right to development. http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/A.HRC.17.27_en.pdf

Lyon, David (2002), Surveillance as Social Sorting: Privacy, Risk and Automated Discrimination. London : Routledge, 2002.

Monahan, Torin (2010), Surveillance in the Time of Insecurity. Rutgers university press, New Brunswick, New Jersey, and London.

Morozov, Evgeny (2011), The net delusion: the dark side of Internet freedom. New York, NY : PublicAffairs, 2011.

Nakashima, Ellen (2007), FBI Prepares Vast Database of Biometrics.Washington Post, 22.12.2007.http://www.washingtonpost.com/wp-dyn/content/article/2007/12/21/AR2007122102544.html

The Office of the Data Protection Ombudsman. Data protection in Finlandhttp://www.tietosuoja.fi/28997.htm

Osterhaus, Anja & Fagan, Craig (2009), Alternative to silence: Whistleblower protection in 10 European countries. Transparency international, 2009. http://www.transparency.org/whatwedo/pub/alternative_to_silence_whistleblower_protection_in_10_european_countries

Presdee, Mike (2000), Cultural Criminology and the Carnival of Crime. London; New York: Routledge, 2000.

Privacy International (2007), The 2007 International Privacy Ranking.Leading surveillance societies in the EU and the World 2007. 28.12.2007.Privacy International. https://www.privacyinternational.org/reports/surveillance-monitor-2007-international-country-rankings/i-summary-of-key-findings

Privacy International (2011a), Our response to the EU consultation on legality of exporting surveillance and censorship technology. 31.10.2011. https://www.privacyinternational.org/reports/our-response-to-the-eu-consultation-on-legality-of-exporting-surveillance-and-censorship

Privacy International (2011b), Surveillance Monitor 2011: Assessment of surveillance across Europe. 26.1.2011. https://www.privacyinternational.org/sites/privacyinternational.org/files/file-downloads/ephr.pdf

Reporters Without Borders (2010), Enemies of the Internet.12 March 2010.

Reporters Without Borders (2012), Beset by online surveillance and content filtering, netizens fight on. 13.3.2012. http://en.rsf.org/beset-by-online-surveillance-and-13-03-2012,42061.html

Saas, Claire (2012), Exceptional Law in Europe with Emphasis on "Enemies". Draft. Conference presentation in: Preventive Detention and Criminal Justice, Ravenna, May 11 - 12, 2012. http://www.law.unc.edu/documents/faculty/adversaryconference/exceptionallawsineuropewithemphasisonenemiesapril2012.pdf

Turow, Joseph (2011), The Daily You. Yale University Press, 2011.

Waugh, Rob (2012). New surveillance cameras will use computer eyes to find 'pre crimes' by detecting suspicious behaviour and calling for guards. Daily Mail Online. Published, 5.6.2012 13:12 GMT, Updated 5.6.2012 13:12 GMT. http://www.dailymail.co.uk/sciencetech/article-2154861/U-S-surveillance-cameras-use-eyes-pre-crimes-detecting-suspicious-behaviour-alerting-guards.htmlg