Hacker, Influencer, Faker, Spy by Robert Dover
Author:Robert Dover
Language: eng
Format: epub, mobi, pdf, azw3
Publisher: Hurst
Published: 2022-10-20T00:00:00+00:00
References
Argomaniz, J. (2009) âWhen the EU is the ânorm-takerâ: The Passenger Name Records Agreement and the EUâs internalization of US border security normsâ. Journal of European Integration 31 (1), 119â136.
Arvidsson, N. (2019) Building a Cashless Society: The Swedish Route to the Future of Cash Payments. Munich: Springer.
Bakshy, E., Messing, S. and Adamic, L. (2015) âExposure to ideologically diverse news and opinion on Facebookâ. Science 348 (6239), 1130â1132.
Balls, K. (2018) âShould the government share full intelligence with Corbyn?â The Spectator, 2 April.
Barnea, M. and Schwartz, S. (1998) âValues and votingâ. Political Psychology 19 (1), 17â40.
Beckett, P. (2017) âData and IP are the new nuclear: Facing up to state-sponsored threatsâ. Network Security 17â19.
Bellamy-Foster, J. and McChesney, R. (2014) âSurveillance capitalism: Monopoly-finance capital, the militaryâindustrial complex, and the digital ageâ. Monthly Review: An Independent Socialist Magazine 1 July, 1â6.
Betz, D. (2017) Cyberspace and the State: Towards a Strategy for Cyber Power. London: Routledge.
BÅachnioa, A., Przepiorkaa, A. and Pantic, I. (2016) âAssociation between Facebook addiction, self-esteem and life satisfaction: A cross-sectional studyâ. Computers in Human Behavior 55, 701â705.
Bloomberg (2019) âThe unfinished business of the Equifax hackâ. Bloomberg. 29 January. Accessed 6 March 2019. https://www.bloomberg.com/opinion/articles/2019-01-29/equifax-hack-remains-unfinished-business
Brandolini, Alberto (2013) Twitter post. Twitter. 11 January.
Casciani, D. (2019) âSecret document reveals police âblacklistingââ. BBC News. 6 March. Accessed 6 March 2019. https://www.bbc.co.uk/news/uk-47457330
Chadwick, A. (2013) The Hybrid Media System: Politics and Power. Oxford: Oxford University Press.
Colantone, I. and Stanig, P. (2018) âGlobal competition and Brexitâ. American Political Science Review 112 (2), 201â218.
David-Fox, M. (2003) âThe fellow travelers revisited: The âcultured Westâ through Soviet eyesâ. The Journal of Modern History 75 (2), 300â335.
De Goede, M. (2012) âThe SWIFT affair and the global politics of European securityâ. Journal of Common Market Studies 50 (2), 214â230.
de Vreese, C. and Boomgaarden. H. (2005) âProjecting EU referendums: Fear of immigration and support for European integrationâ. European Union Politics 56 (1), 9â82.
Dencik, L. and Cable, J. (2017) âThe advent of surveillance realism: Public opinion and activist responses to the Snowden leaksâ. International Journal of Communication 11, 763â781.
Di Matteo, F. (2017). âThe massive and indiscriminate collection of passengersâ data: A congenital defect within the EU PNR Directive?â Diritti umani e diritto internazionale 213â236.
Diakopoulos, N., Trielli, D., Stark, J. and Mussenden, S. (2018) âI vote forâHow search informs our choice of candidateâ. In M. Moore and D. Tambini (eds) Digital Dominance: The Power of Google, Amazon, Facebook, and Apple (p. 22). New York, NY: Oxford University Press.
Dodd, Vikram and Grierson, Jamie (2020) âTerrorism police list Extinction Rebellion as extremist ideologyâ. The Guardian, 10 January.
Dongwon, C. (2015) âPhysical activity level, sleep quality, attention control and self-regulated learning along to smartphone addiction among college studentsâ. Journal of the Korea Academia-Industrial Cooperation Society 16 (1) 429â437.
Dover, R. (2016) Fixing financial plumbing: Tax, leaks and base erosion and profit shifting in Europe. The International Spectator 51(4), 40â50.
âââ (2019) âUK response to hybrid threatsâ. UK Defence Select Committee. 8 January. Accessed 1 March 2019. http://data.parliament.uk/writtenevidence/committeeevidence.svc/evidencedocument/defence-committee/uk-response-to-hybrid-threats/written/94257.pdf
âââ (2020) âSOCMINT: A shifting balance of opportunityâ. Intelligence and National Security 35 (2), 216â232.
Du, L. and Maki, A. (2019) âThese cameras can spot shoplifters even before they stealâ.
Download
Hacker, Influencer, Faker, Spy by Robert Dover.mobi
Hacker, Influencer, Faker, Spy by Robert Dover.pdf
Hacker, Influencer, Faker, Spy by Robert Dover.azw3
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Secret History by Donna Tartt(16675)
The Social Justice Warrior Handbook by Lisa De Pasquale(11495)
Thirteen Reasons Why by Jay Asher(7807)
This Is How You Lose Her by Junot Diaz(5802)
Weapons of Math Destruction by Cathy O'Neil(5055)
Zero to One by Peter Thiel(4840)
The Myth of the Strong Leader by Archie Brown(4796)
Promise Me, Dad by Joe Biden(4459)
Beartown by Fredrik Backman(4441)
How Democracies Die by Steven Levitsky & Daniel Ziblatt(4426)
Stone's Rules by Roger Stone(4426)
The Fire Next Time by James Baldwin(4354)
100 Deadly Skills by Clint Emerson(4091)
A Higher Loyalty: Truth, Lies, and Leadership by James Comey(4044)
Rise and Kill First by Ronen Bergman(4026)
The David Icke Guide to the Global Conspiracy (and how to end it) by David Icke(3899)
The Farm by Tom Rob Smith(3883)
Secrecy World by Jake Bernstein(3792)
The Doomsday Machine by Daniel Ellsberg(3742)