共 68 条
[1]
Bostrom N(2019)The vulnerable world hypothesis Glob. Policy 10 455-476
[2]
Benjamin R(2019)Race after technology: abolitionist tools for the new Jim code Polity 43 19-39
[3]
Lazer D(2017)Data ex machina: introduction to big data Annu Rev Sociol 25 325-339
[4]
Radford J(2020)How to regulate algorithmic decision-making: a framework of regulatory requirements for different applications Regul. Gov. 46 505-524
[5]
Krafft T(2009)Measuring and modeling repeat and near-repeat burglary effects J. Quant. Criminol. 28 360-381
[6]
Zweig KA(1981)Social inequality and predatory criminal victimization: an exposition and test of formal theory Am. Sociol. Rev. 15 503-525
[7]
Konig PD(2011)Risk terrain modeling: brokering criminological theory and GIS methods for crime forecasting Justice Q. 30 671-690
[8]
Short MB(2018)Illuminating black data policing Ohio State J. Crim. Law 2 97-109
[9]
D’Orsogna MR(2021)Between security and convenience: Facial recognition technology in the eyes of citizens in China, Germany, the United Kingdom, and the United States Public Underst. Sci. 54 390-422
[10]
Brantingham PJ(2004)Ethical aspects of facial recognition systems in public places J. Inf. Commun. Ethics Soc. 81 1-15