Works matching Snowden, Edward, 1983-
Results: 245
Beyond Snowden.
- Published in:
- World Affairs, 2014, v. 176, n. 5, p. 13
- By:
- Publication type:
- Article
HACK OR BE HACKED: THE QUASI-TOTALITARIANISM OF GLOBAL TRUSTED NETWORKS.
- Published in:
- New Formations, 2015, n. 84/85, p. 130, doi. 10.3898/NewF:84/85.06.2015
- By:
- Publication type:
- Article
AESTHETICS OF THE SECRET.
- Published in:
- New Formations, 2014, n. 83, p. 25, doi. 10.3898/NEWF.83.03.2014
- By:
- Publication type:
- Article
ШТА НАВОДИ МИЛЕНИЈАЛЦЕ НА УЗБУЊИВАЊЕ? ОД КУЛТУРОЛОШКЕ ДО СОЦИО-ПСИХОЛОШКЕ ПЕРСПЕКТИВЕ УЗБУЊИВАЊА
- Published in:
- Socioloski Pregled, 2021, v. 55, n. 4, p. 1674, doi. 10.5937/socpreg55-34725
- By:
- Publication type:
- Article
Revealing a Necessary Evil: The United States Must Continue to Use Some Form of Domesticated Counter-Terrorism Program.
- Published in:
- New England Law Review, 2019, v. 52, n. 1, p. 51
- By:
- Publication type:
- Article
Secret Law and the Snowden Revelations: A Response to The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age, by Laura K. Donohue.
- Published in:
- New England Law Review, 2019, v. 52, n. 1, p. 5
- By:
- Publication type:
- Article
When You Cannot Be Silent: Whistle-Blowing 2.0.
- Published in:
- ISSA Journal, 2018, v. 16, n. 1, p. 41
- By:
- Publication type:
- Article
Unraveling ' One Country, Two Systems' From the Western Perspective: Reflections on Beijing- Hong Kong Relations From the Snowden Affair.
- Published in:
- Asian Politics & Policy, 2014, v. 6, n. 1, p. 171, doi. 10.1111/aspp.12082
- By:
- Publication type:
- Article
Testing Hong Kong's Liberal Tradition: The Snowden Case and Hong Kong- PRC Relations.
- Published in:
- Asian Politics & Policy, 2014, v. 6, n. 1, p. 168, doi. 10.1111/aspp.12078
- By:
- Publication type:
- Article
'Everyone Has Secrets': Revealing the Whistleblower in Hollwood Film in the Examples of Snowden and The Fifth Estate.
- Published in:
- M/C Journal, 2020, v. 23, n. 4, p. N.PAG, doi. 10.5204/mcj.1668
- By:
- Publication type:
- Article
Adventure into Peacetime Intra-Alliance Espionage: Assessment of the America-Germany Saga.
- Published in:
- Lithuanian Foreign Policy Review, 2015, n. 33, p. 64, doi. 10.1515/lfpr-2016-0010
- By:
- Publication type:
- Article
SECURITY PROTOCOL: A PROCEDURAL ANALYSIS OF THE FOREIGN INTELLIGENCE SURVEILLANCE COURTS.
- Published in:
- University of Illinois Law Review, 2015, v. 2015, n. 3, p. 1363
- By:
- Publication type:
- Article
THE SNOWDEN REVELATIONS, THE TRANSATLANTIC TRADE AND INVESTMENT PARTNERSHIP AND THE DIVIDE BETWEEN U.S.-EU IN DATA PRIVACY PROTECTION.
- Published in:
- University of Arkansas at Little Rock Law Review, 2014, v. 36, n. 2, p. 161
- By:
- Publication type:
- Article
THE NSA, THE METADATA PROGRAM, AND THE FISC.
- Published in:
- New York University Annual Survey of American Law, 2021, v. 76, n. 2, p. 599
- By:
- Publication type:
- Article
AMICI CURIAE IN THE FISA COURTS: A CIVIL LIBERTIES IMPACT ASSESSMENT.
- Published in:
- New York University Annual Survey of American Law, 2021, v. 76, n. 2, p. 499
- By:
- Publication type:
- Article
THE LANGUAGE OF INTELLIGENCE: HOW WORD GAMES HIDE SURVEILLANCE FROM PUBLIC OVERSIGHT (2019 UPDATE).
- Published in:
- New York University Annual Survey of American Law, 2021, v. 76, n. 2, p. 423
- By:
- Publication type:
- Article
Internet Giants as Quasi-Governmental Actors and the Limits of Contractual Consent.
- Published in:
- Missouri Law Review, 2015, v. 80, n. 3, p. 723
- By:
- Publication type:
- Article
AFTER SNOWDEN: REGULATING TECHNOLOGY-AIDED SURVEILLANCE IN THE DIGITAL AGE.
- Published in:
- Capital University Law Review, 2016, v. 44, n. 4, p. 677
- By:
- Publication type:
- Article
En la web, 'un actor mucho más importante es la gente sin organización'.
- Published in:
- 2013
- By:
- Publication type:
- Interview
Gimme Shelter: International Political Asylum in the Information Age.
- Published in:
- Vanderbilt Journal of Transnational Law, 2014, v. 47, n. 4, p. 1167
- By:
- Publication type:
- Article
Developing Privacy Extensions: Is it Advocacy through the Web Browser?
- Published in:
- Surveillance & Society, 2022, v. 20, n. 1, p. 64, doi. 10.24908/ss.v20i1.13958
- By:
- Publication type:
- Article
Security against Surveillance: IT Security as Resistance to Pervasive Surveillance.
- Published in:
- Surveillance & Society, 2018, v. 16, n. 1, p. 39, doi. 10.24908/ss.v16i1.5316
- By:
- Publication type:
- Article
Criticising Surveillance and Surveillance Critique: Why privacy and humanism are necessary but insufficient.
- Published in:
- Surveillance & Society, 2017, v. 15, n. 2, p. 187, doi. 10.24908/ss.v15i2.5441
- By:
- Publication type:
- Article
‘Depends on Who’s Got the Data’: Public Understandings of Personal Digital Dataveillance.
- Published in:
- Surveillance & Society, 2017, v. 15, n. 2, p. 254, doi. 10.24908/ss.v15i2.6332
- By:
- Publication type:
- Article
Counter-Mapping Surveillance: A Critical Cartography of Mass Surveillance Technology After Snowden.
- Published in:
- Surveillance & Society, 2017, v. 15, n. 1, p. 137, doi. 10.24908/ss.v15i1.5307
- By:
- Publication type:
- Article
Slipping Through the Cracks: Background Investigations after Snowden.
- Published in:
- Surveillance & Society, 2017, v. 15, n. 1, p. 123, doi. 10.24908/ss.v15i1.5306
- By:
- Publication type:
- Article
Surveillance Hegemony.
- Published in:
- Surveillance & Society, 2015, v. 13, n. 2, p. 168, doi. 10.24908/ss.v13i2.5299
- By:
- Publication type:
- Article
Contesting a Biopolitics of Information and Communications: The Importance of Truth and Sousveillance After Snowden.
- Published in:
- Surveillance & Society, 2015, v. 13, n. 2, p. 153, doi. 10.24908/ss.v13i2.5331
- By:
- Publication type:
- Article
Surveillance and the Rule of Law.
- Published in:
- Surveillance & Society, 2015, v. 13, n. 2, p. 295, doi. 10.24908/ss.v13i2.5690
- By:
- Publication type:
- Article
Notes Toward A Meteorology of the Cloud.
- Published in:
- 2015
- By:
- Publication type:
- Essay
Before and After Snowden.
- Published in:
- 2015
- By:
- Publication type:
- Editorial
Leaky Apps and Data Shots: Technologies of Leakage and Insertion in NSA-Surveillance.
- Published in:
- Surveillance & Society, 2015, v. 13, n. 2, p. 182, doi. 10.24908/ss.v13i2.5315
- By:
- Publication type:
- Article
The Snowden Stakes: Challenges for Understanding Surveillance Today.
- Published in:
- Surveillance & Society, 2015, v. 13, n. 2, p. 139, doi. 10.24908/ss.v13i2.5363
- By:
- Publication type:
- Article
Datafication, dataism and dataveillance: Big Data between scientific paradigm and ideology.
- Published in:
- Surveillance & Society, 2014, v. 12, n. 2, p. 197, doi. 10.24908/ss.v12i2.4776
- By:
- Publication type:
- Article
The impact of Edward Snowden's revelations and the trends of military securitization of the internet in Brazil.
- Published in:
- Kriminologisches Journal, 2016, v. 48, n. 4, p. 259
- By:
- Publication type:
- Article
Taxonomy of the Snowden Disclosures.
- Published in:
- Washington & Lee Law Review, 2015, v. 72, n. 4, p. 1679
- By:
- Publication type:
- Article
Banning Bulk: Passage of the USA FREEDOM Act and Ending Bulk Collection.
- Published in:
- Washington & Lee Law Review, 2015, v. 72, n. 3, p. 1307
- By:
- Publication type:
- Article
Legitimation and Textual Evidence: How the Snowden Leaks Reshaped the ACLU's Online Writing About NSA Surveillance.
- Published in:
- Written Communication, 2021, v. 38, n. 3, p. 380, doi. 10.1177/07410883211007870
- By:
- Publication type:
- Article
The Snowden Files: The Inside Story of the World's Most Wanted Man.
- Published in:
- 2014
- By:
- Publication type:
- Book Review
RIP RIPA? Snowden, Surveillance, and the Inadequacies of our Existing Legal Framework.
- Published in:
- 2014
- By:
- Publication type:
- Proceeding
Making Sense of Snowden.
- Published in:
- 2013
- Publication type:
- Opinion
Was Snowden virtuous?
- Published in:
- Ethics & Information Technology, 2021, v. 23, n. 3, p. 373, doi. 10.1007/s10676-021-09580-4
- By:
- Publication type:
- Article
Edward Snowden: Permanent record: Metropolitan Books, Henry Holt and Company, New York, 2019, pp. 340, ISBN 978-1250237231.
- Published in:
- 2020
- By:
- Publication type:
- Book Review
Origin and analysis of Brazilian cybernetic fragility.
- Published in:
- Carta Internacional, 2021, v. 16, n. 2, p. 1, doi. 10.21530/ci.v16n2.2021.1109
- By:
- Publication type:
- Article
Technological solutions to privacy questions: what is the role of law?
- Published in:
- Information & Communications Technology Law, 2016, v. 25, n. 1, p. 4, doi. 10.1080/13600834.2015.1134148
- By:
- Publication type:
- Article
The pendulum effect: comparisons between the Snowden revelations and the Church Committee. What are the potential implications for Europe?
- Published in:
- Information & Communications Technology Law, 2014, v. 23, n. 3, p. 192, doi. 10.1080/13600834.2014.970375
- By:
- Publication type:
- Article
The Merry Life of Dragnet Surveillance.
- Published in:
- International Policy Digest, 2017, v. 4, n. 5, p. 144
- By:
- Publication type:
- Article
Automating Warfare: MonsterMind and Cloudy Diplomacy in Cyberspace.
- Published in:
- International Policy Digest, 2014, v. 1, n. 8, p. 1
- By:
- Publication type:
- Article
Hacker who Targeted WikiLeaks is Going after Edward Snowden.
- Published in:
- International Policy Digest, 2014, v. 1, n. 5, p. 26
- By:
- Publication type:
- Article
Revelation of US-Singapore Intelligence Cooperation Won't Hurt Regional Ties.
- Published in:
- International Policy Digest, 2014, v. 1, n. 1, p. 72
- By:
- Publication type:
- Article