Security vs. Privacy in an Era of Terror and Technology

被引:0
作者
Lieber, Robert J. [1 ]
机构
[1] Georgetown Univ, Washington, DC 20057 USA
来源
TELOS | 2014年 / 169期
关键词
D O I
暂无
中图分类号
B [哲学、宗教];
学科分类号
01 ; 0101 ;
摘要
引用
收藏
页码:144 / 149
页数:6
相关论文
共 50 条
[1]   Technology vs. terror [J].
Benditt, J .
TECHNOLOGY REVIEW, 2001, 104 (10) :9-9
[2]   Technology vs. terror - Recognizing the enemy [J].
Stikeman, A .
TECHNOLOGY REVIEW, 2001, 104 (10) :48-49
[3]   Technology vs. terror - Will spyware work? [J].
Hogan, K .
TECHNOLOGY REVIEW, 2001, 104 (10) :43-47
[4]   Technology vs. terror - Networking the infrastructure [J].
Roush, W .
TECHNOLOGY REVIEW, 2001, 104 (10) :38-42
[5]   Technology vs. terror - The shock of the old [J].
Tenner, E .
TECHNOLOGY REVIEW, 2001, 104 (10) :50-51
[6]   Security vs. privacy - reframing the debate [J].
Spencer, SB .
DENVER UNIVERSITY LAW REVIEW, 2002, 79 (04) :519-+
[7]   Privacy vs. Security in National Emergencies [J].
Aloudat, Anas .
IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2012, 31 (01) :50-55
[8]   Technology vs. terror - The next computer interface [J].
Tristram, C .
TECHNOLOGY REVIEW, 2001, 104 (10) :52-59
[9]   Technology vs. terror - Digital cas payoff [J].
Schwartz, EI .
TECHNOLOGY REVIEW, 2001, 104 (10) :62-68
[10]   RETENTION OF COMMUNICATION DATA: SECURITY VS. PRIVACY? [J].
Liebwald, Doris .
IDIMT-2006, 2006, 19 :45-54