martes, 23 de julio de 2024

References: Core reading: The digital trade agenda

  •     Australian Government (2014), Cloud Computing and Privacy Consumer Factsheet. Department of Communication. Available at: https://www.infrastructure.gov.au/sites/default/files/2014-112101-CLOUD-Consumer-factsheet.pdf
  •     Cook, C., Diamond, R., Hall, J., List, J., & Oyer, P. (2020). The Gender Earnings Gap in the Gig Economy: Evidence from over a Million Rideshare Drivers. The Review of Economic Studies, 88(5), 2210-2238. Available at: https://web.stanford.edu/~diamondr/UberPayGap.pdf
  •     Colocation America (2020, January 30). The Future of Data Centers Renewable Energy. Colocation America. https://www.colocationamerica.com/blog/renewable-energy-data-centers
  •     Determann, L. (2020, June 9), Where data is stored could impact privacy, commerce and even national security and here is why. _World Economic Forum. _Available at: https://www.weforum.org/agenda/2020/06/where-data-is-stored-could-impact-privacy-commerce-and-even-national-security-here-s-why
  •     European Commission (2020), A European strategy for data. Available at: https://eur-lex.europa.eu/legal-content/ES/TXT/?qid=1593073685620&uri=CELEX%3A52020DC0066
  •     ITI (2017), Data Localization Snapshot. Available at: https://www.itic.org/public-policy/SnapshotofDataLocalizationMeasures1-19-2017.pdf
  •     Kumar, S. (2020, August 4), Are Data Centres Helping The Economy? Technative. Available at: https://technative.io/how-data-centres-are-helping-the-economies/
  •     O’Neill, C. (2016). Weapons of math destruction. How Big Data Increases Inequality and Threatens Democracy, 10, 3002861.
  •     Rysavy Research (2020). Global 5G: Rise of a Transformational Technology. 5G Americas (2020). https://www.5gamericas.org/global-5g-rise-of-a-transformational-technology/
  •     Savage, L. (2013, June 17), Trade Agreements, Privacy, and the Cloud. _Maclean’s. _Available at: http://www.macleans.ca/uncategorized/trade-agreements-privacy-and-the-cloud/
  •     Schryen,G. (2009). Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities. AMCIS 2009 Proceedings, 38. Available at: https://www.researchgate.net/publication/220891308_Security_of_Open_Source_and_Closed_Source_Software_An_Empirical_Comparison_of_Published_Vulnerabilities
  •     Whittaker, Z. (2013, January 28). What Google does when a government requests your data. ZDNet. Available at: https://www.zdnet.com/article/what-google-does-when-a-government-requests-your-data/


No hay comentarios.:

Publicar un comentario

There's no Alternative to Digital Ecosocialism

 So far, the debates on imagining an ecosocialist alternative have fluctuated between the approaches proposed by advocates of degrowth and...