- Australian Government (2014), Cloud Computing and Privacy Consumer Factsheet. Department of Communication. Available at: https://www.infrastructure.gov.au/sites/default/files/2014-112101-CLOUD-Consumer-factsheet.pdf
- Cook, C., Diamond, R., Hall, J., List, J., & Oyer, P. (2020). The Gender Earnings Gap in the Gig Economy: Evidence from over a Million Rideshare Drivers. The Review of Economic Studies, 88(5), 2210-2238. Available at: https://web.stanford.edu/~diamondr/UberPayGap.pdf
- Colocation America (2020, January 30). The Future of Data Centers Renewable Energy. Colocation America. https://www.colocationamerica.com/blog/renewable-energy-data-centers
- Determann, L. (2020, June 9), Where data is stored could impact privacy, commerce and even national security and here is why. _World Economic Forum. _Available at: https://www.weforum.org/agenda/2020/06/where-data-is-stored-could-impact-privacy-commerce-and-even-national-security-here-s-why
- European Commission (2020), A European strategy for data. Available at: https://eur-lex.europa.eu/legal-content/ES/TXT/?qid=1593073685620&uri=CELEX%3A52020DC0066
- ITI (2017), Data Localization Snapshot. Available at: https://www.itic.org/public-policy/SnapshotofDataLocalizationMeasures1-19-2017.pdf
- Kumar, S. (2020, August 4), Are Data Centres Helping The Economy? Technative. Available at: https://technative.io/how-data-centres-are-helping-the-economies/
- O’Neill, C. (2016). Weapons of math destruction. How Big Data Increases Inequality and Threatens Democracy, 10, 3002861.
- Rysavy Research (2020). Global 5G: Rise of a Transformational Technology. 5G Americas (2020). https://www.5gamericas.org/global-5g-rise-of-a-transformational-technology/
- Savage, L. (2013, June 17), Trade Agreements, Privacy, and the Cloud. _Maclean’s. _Available at: http://www.macleans.ca/uncategorized/trade-agreements-privacy-and-the-cloud/
- Schryen,G. (2009). Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities. AMCIS 2009 Proceedings, 38. Available at: https://www.researchgate.net/publication/220891308_Security_of_Open_Source_and_Closed_Source_Software_An_Empirical_Comparison_of_Published_Vulnerabilities
- Whittaker, Z. (2013, January 28). What Google does when a government requests your data. ZDNet. Available at: https://www.zdnet.com/article/what-google-does-when-a-government-requests-your-data/
martes, 23 de julio de 2024
References: Core reading: The digital trade agenda
Suscribirse a:
Comentarios de la entrada (Atom)
There's no Alternative to Digital Ecosocialism
So far, the debates on imagining an ecosocialist alternative have fluctuated between the approaches proposed by advocates of degrowth and...
-
Ahora, ¿qué es un algoritmo? En esta era, parece que estamos hablando de esta palabra poco comprendida todo el tiempo. Se menciona "el ...
-
La captura constante de datos por parte de las Grandes Tecnológicas y sus países anfitriones tiene importantes implicaciones para el desarr...
-
Barcelona Quest for Data Sovereignty The Decidim platform embodied Barcelona's commitment to technological sovereignty, offering a...
No hay comentarios.:
Publicar un comentario