- Australian Government (2014), Cloud Computing and Privacy Consumer Factsheet. Department of Communication. Available at: https://www.infrastructure.gov.au/sites/default/files/2014-112101-CLOUD-Consumer-factsheet.pdf
- Cook, C., Diamond, R., Hall, J., List, J., & Oyer, P. (2020). The Gender Earnings Gap in the Gig Economy: Evidence from over a Million Rideshare Drivers. The Review of Economic Studies, 88(5), 2210-2238. Available at: https://web.stanford.edu/~diamondr/UberPayGap.pdf
- Colocation America (2020, January 30). The Future of Data Centers Renewable Energy. Colocation America. https://www.colocationamerica.com/blog/renewable-energy-data-centers
- Determann, L. (2020, June 9), Where data is stored could impact privacy, commerce and even national security and here is why. _World Economic Forum. _Available at: https://www.weforum.org/agenda/2020/06/where-data-is-stored-could-impact-privacy-commerce-and-even-national-security-here-s-why
- European Commission (2020), A European strategy for data. Available at: https://eur-lex.europa.eu/legal-content/ES/TXT/?qid=1593073685620&uri=CELEX%3A52020DC0066
- ITI (2017), Data Localization Snapshot. Available at: https://www.itic.org/public-policy/SnapshotofDataLocalizationMeasures1-19-2017.pdf
- Kumar, S. (2020, August 4), Are Data Centres Helping The Economy? Technative. Available at: https://technative.io/how-data-centres-are-helping-the-economies/
- O’Neill, C. (2016). Weapons of math destruction. How Big Data Increases Inequality and Threatens Democracy, 10, 3002861.
- Rysavy Research (2020). Global 5G: Rise of a Transformational Technology. 5G Americas (2020). https://www.5gamericas.org/global-5g-rise-of-a-transformational-technology/
- Savage, L. (2013, June 17), Trade Agreements, Privacy, and the Cloud. _Maclean’s. _Available at: http://www.macleans.ca/uncategorized/trade-agreements-privacy-and-the-cloud/
- Schryen,G. (2009). Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities. AMCIS 2009 Proceedings, 38. Available at: https://www.researchgate.net/publication/220891308_Security_of_Open_Source_and_Closed_Source_Software_An_Empirical_Comparison_of_Published_Vulnerabilities
- Whittaker, Z. (2013, January 28). What Google does when a government requests your data. ZDNet. Available at: https://www.zdnet.com/article/what-google-does-when-a-government-requests-your-data/
martes, 23 de julio de 2024
References: Core reading: The digital trade agenda
Suscribirse a:
Comentarios de la entrada (Atom)
There's no Alternative to Digital Ecosocialism
So far, the debates on imagining an ecosocialist alternative have fluctuated between the approaches proposed by advocates of degrowth and...
-
Ahora, ¿qué es un algoritmo? En esta era, parece que estamos hablando de esta palabra poco comprendida todo el tiempo. Se menciona "el ...
-
¿Qué dicen los acuerdos de comercio electrónico? Los flujos de datos transfronterizos no serán restringidos entre las Partes mediante: a. ...
-
There have been a huge number of important victories against attempts by states and corporations to wield more power over individuals and s...
No hay comentarios.:
Publicar un comentario