|
Reference
|
|
*** (2016) Internet of Things and opportunities. u: CompTia
|
|
Adey, P. (2012) Borders, identification and surveillance: New regimes of border control. u: Ball Kristie;Haggerty Kevin;Lyon David [ur.] Routledge Handbook of Surveillance Studies, London - New York: Routledge
|
|
Alohali, B. (2017) Detection Protocol of Possible Crime Scenes Using Internet of Things (IoT). u: Moore M. [ur.] Cybersecurity Breaches and Issues Surrounding Online Threat Protection, Pennsylvania: IGI Global
|
|
Andrejevic, M. (2012) Ubiquitous Surveillance. u: Ball K., Haggerty K., Lyon D. [ur.] The Routledge Handbook of Surveillance Studies, Abingdon Oxon: Routledge
|
|
Ashton, M. (2017) Debugging the Real World: Robust Criminal Prosecution in the Internet of Things. Arizona Law Review, 59(3)
|
|
Atzori, L., Iera, A., Morabito, G. (2010) The Internet of Things: A survey. Computer Networks, 54(15)
|
|
Baig, Z.A., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M., et al. (2017) Future challenges for smart cities: Cyber-security and digital forensics. Digital Investigation, 22
|
|
Baras, K., Brito, L. (2018) Introduction to the Internet of Things. u: Hassan Q., Khan A. R., Madani S. [ur.] Internet of Things: Challenges, Advances, Applications, Boca Raton-London-New York: CRC Press
|
|
Barrett, J. (2012) The Internet of Things. u: TEDxCIT, Tedx Talks You Tube
|
1
|
Bauman, Z., Lyon, D. (2013) Liquid Surveillance. Cambridge: Polity
|
|
Beer, D. (2009) Power through the algorithm?: Participatory Web cultures and the technological unconscious. New Media & Society, 11(6)
|
|
Bonnefon, J.F., Shariff, A., Rahwan, I. (2016) The social dilemma of autonomous vehicles. Science, 352(6293)
|
|
Brouwer, E. (2008) Digital Borders and Real Rights: Effective Remedies for Third-Country Nationals in the Schengen Information System. Leiden: Martinus Nijhoff Publishers
|
|
Browne, S. (2012) Race and Surveillance. u: Ball K., Haggerty K., Lyon D. [ur.] Routledge Handbook of Surveillance Studies, London - New York: Routledge
|
|
Bunz, M., Meikle, G. (2018) The Internet of Things. Cambridge - Medford: Polity
|
|
Burgess, M. (2018) What is the Internet of Things?: WIRED explains. u: Wired
|
|
CBC Radio (2019) 'Alexa, who did it?': What happens when a judge in a murder trial wants data from a smart home speaker. 11 September 2019, https://www.cbc.ca/radio/day6/ alexa-who-did-it-what-happens-when-a-judge-in-a-murder-trial-wants-the-datafrom-a-smart-home-speaker-1.4916556?fbclid=IwAR0fBKsXEanePMcs-7ejyqhX5--_ u
|
1
|
Ceyhan, A. (2008) Technologization of Security: Management of Uncertainty and Risk in the Age of Biometrics. Surveillance and Society, 5 (2)
|
|
Chabinsky, S. (2019) 'What Does the Future of Cyber Crime Hold for You?'. Security: Solutions for Enabling and Assuring Business, 11 September, https://www.securitymagazine. com/articles/86135-what-does-the-future-of-cyber-crime-hold-for-you
|
|
Claveria, K. 'Meet Kevin Ashton, the visionary technologist who named the Internet of Things'. https://www.visioncritical.com/blog/kevin-ashton-internet-of-things
|
|
Claypoole, T. (2016) Smarter Devices = More Vulnerability to Government and Criminals. Computer and Internet Lawyer, 33 (11)
|
|
Cote-Boucher, K. (2008) The Diffuse Border: Intelligence-Sharing, Control and Confinement along Canada's 'Smart Border'. Surveillance and Society, 5 (2)
|
|
Crump, C., Harwood, M. (2019) Invasion of the Data Snatchers: Big Data and the Internet of Things Means the Surveillance of Everything. ACLU, 11 September 2019., https://www. aclu.org/blog/speakeasy/invasion-data-snatchers-big-data-and-internet-things-meanssurveillance-everything
|
|
Dekker, R., Engbersen, G. (2014) How social media transform migrant networks and facilitate migration. Global Networks, 14(4)
|
|
Denisco, R. A. (2019) DDoS attacks increased 91% in 2017 thanks to IoT. Tech Repubic, 11 September 2019., https://www.techrepublic.com/article/ddos-attacks-increased-91-in-2017-thanks-to-iot
|
|
Dixon, H. (2017) The Wonderful and Scary Internet of Things. Judges' Journal, 56 (3)
|
|
Ferguson, A.G. (2017) The Rise of Big Data Policing: Surveillance, Race, and the Future of Law Enforcement. New York: New York University Press
|
|
Foote, K. (2019) A Brief History of the Internet of Things. 13 September 2019., https://www. dataversity.net/brief-history-internet-things
|
|
Foucault, M. (2002) Power: essential works of Foucault 1954-1984. London: Penguin Books
|
|
Fried, C. (1968) Privacy. Yale Law Journal, 77
|
|
Goodman, M. (2016) Future Crimes: Inside the Digital Underground and the Battle for Our Connected World. New York: Anchor Books
|
1
|
Greengard, S. (2015) The Internet of Things. Cambridge - London: MIT Press
|
2
|
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M. (2013) Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7)
|
|
Haggerty, K., Ericson, R. (2000) The surveillant assemblage. British Journal of Sociology, 51(4)
|
|
Howard, P. (2015) Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up. New Haven-London: Yale University Press
|
|
Hunter, T. (2010) Police track myki users. Age Melbourne, Fairfax
|
|
International Telecommunications Union (2005) ITU Internet reports: The Internet of Things. Geneva
|
|
Ives, S. (2015) IoT and drones to drive wireless video surveillance. Security System News, 18(11)
|
|
Kearns, I. (2018) Crime and the pros and cons of the internet of things. u: The Police Foundation [ur.] The Police Foundation
|
|
Koslowski, R. (2019) New Technologies of Border Control in an Enlarged Europe. Wilson Center, 11 September 2019., https://www.wilsoncenter.org/publication/299-new-technologies-border-control-enlarged-europe
|
|
Lee, H.J. (2015) A Study on Social Issue Solutions Using the 'Internet of Things': Focusing on a Crime Prevention Camera System. International Journal of Distributed Sensor Networks, 11(9)
|
|
Li, S. (2017) Introduction: Securing the Internet of Things. u: Li S., Xu L. D. [ur.] Securing the Internet of Things, New York: Elsevier
|
|
Lianos, M. (2003) Social Control after Foucault. Surveillance & Society, 1 (3)
|
|
Lyon, D. (2007) Surveillance Studies. Cambridge: Polity
|
|
Lyon, D. (2018) The Culture of Surveillance. Cambridge: Polity
|
|
Lyon, D., Haggerty, K., Ball, K. (2012) Introducing surveillance studies. u: Ball K., Haggerty K., Lyon D. [ur.] Routledge Handbook of Surveillance Studies, London - New York: Routledge
|
|
Mcguire, M. (2012) Technology, Crime and Justice: The Question Concerning Technomia. London - New York: Routledge
|
|
Means, C., Robin, R., Brunton, D.W. (2016) 'You might not know her, but you know her brother': Surveillance Technology, Respectability Policing, and the Murder of Janese Talton Jackson. Souls, 18 (2-4)
|
|
Milivojevic, S. (2013) Borders, technology and mobility: 'Cyber-Fortress Europe' and its emerging Southeast frontier. Australian Journal of Human Rights, 19(3)
|
|
Milivojevic, S. (2019) 'Stealing the fire', 2.0 style?: Technology, the pursuit of mobility, social memory and de-securitization of migration. Theoretical Criminology, 23(2)
|
|
Milivojevic, S. (2019) Border Policing and Security Technologies. London - New York: Routledge
|
|
Monbiot, G. (2017) Big data's power is terrifying. That could be good news for democracy. Guardian, London
|
|
Muller, B. (2010) Security, Risk and the Biometric State. New York: Routledge
|
|
Neal, A. (2009) Securitization and risk at the EU border: the origins of FRONTEX. Journal of Common Market Studies, 47(2)
|
|
Orr, D., Sanchez, L. (2018) Alexa, did you get that?: Determining the evidentiary value of data stored by the Amazon® Echo. Digital Investigation, 24
|
|
Popescu, G. (2015) Controlling Mobility: Embodying Borders. u: Amilhat Szary A. L., Giraut F. [ur.] Borderities and the Politics of Contemporary Mobile Borders, Basingstoke-New York: Palgrave
|
|
Roman, R., Najera, P., Lopez, J. (2011) Securing the Internet of Things. Computer, 44(9)
|
|
TEDx Talks (2018) IoT and Machine Learning -Changing the Future Dr Dennis Ong. https://www.youtube.com/watch?v=mlE03Fj2T9s
|
|
Thrift, N. (2004) Remembering the Technological Unconscious by Foregrounding Knowledges of Position. Environment and Planning D: Society and Space, 22(1)
|
|
Thrift, N. (2005) Knowing Capitalism. London: Sage
|
|
Tuptuk, N., Hailes, S. (2019) Crime in the age of the Internet of Things. u: Wortley R., Sidebottom A., Tilley N., Laycock G. [ur.] Routledge Handbook of Crime Science, London - New York: Routledge
|
|
Tzezana, R. (2016) Scenarios for crime and terrorist attacks using the internet of things. European Journal of Futures Research, 4(1)
|
|
Vaughan-Williams, N. (2010) The UK Border Security Continuum: Virtual Biopolitics and the Simulation of the Sovereign Ban. Environment and Planning D: Society and Space, 28 (6)
|
|
Vos, M. (2018) Organizational Implementation and Management Challenges in the Internet of Things. u: Hassan Q., Khan A. R., Madani S. [ur.] Internet of Things: Challenges, Advances, Applications, Boca Raton-London-New York: CRC Press
|
|
Weber, V. (2017) The Synergetic Smart City Framework: From Idea to Reality. Real Estate Issues
|
1
|
Weiser, M. (1991) The Computer for the 21st Century. Scientific American, 265 (3)
|
|
Williams, J. (2016) Privacy in the Age of the Internet of Things. Human Rights, 41 (4)
|
|
Wood, M.A. (2016) Antisocial media and algorithmic deviancy amplification: Analysing the id of Facebook's technological unconscious. Theoretical Criminology, 21 (2)
|
|
Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M. (2014) Internet of Things for Smart Cities. IEEE Internet of Things Journal, 1 (1)
|
|
Zimmer, A. (2017) Boots on the Ground, Eyes in the Sky. Law Enforcement Technology, cover story, 44 (9)
|
|
|