This repository has been archived by the owner on Aug 17, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy path10-safety.bib
127 lines (115 loc) · 4.51 KB
/
10-safety.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
@inproceedings{Amro2018,
doi = {10.1109/aiccsa.2018.8612876},
url = {https://doi.org/10.1109/aiccsa.2018.8612876},
year = {2018},
month = {Oct},
publisher = {{IEEE}},
author = {Belal M. Amro and Mohanad O. Al-Jabari and Hussein M. Jabareen and Yousef S. Khader and Adel Taweel},
title = {Design and Development of Case Studies in Security and Privacy for Health Informatics Education},
booktitle = {2018 Conference on Computer Systems and Applications}
}
@book{Blue2015,
author = {Violet Blue},
title = {The Smart Girl's Guide to Privacy: Practical Tips for Staying Safe Online},
publisher = {No Starch Press},
year = {2015},
isbn = {978-1593276485},
note = {Practical tips from someone on the front lines.}
}
@article{Cove2018,
doi = {10.1016/j.maturitas.2018.04.008},
url = {https://doi.org/10.1016/j.maturitas.2018.04.008},
year = {2018},
month = {Jul},
publisher = {Elsevier {BV}},
volume = {113},
pages = {48--52},
author = {Lynne Coventry and Dawn Branley},
title = {Cybersecurity in healthcare: A narrative review of trends, threats and ways forward},
journal = {Maturitas}
}
@misc{EFF,
author = {{Electronic Frontier Foundation}},
title = {Surveillance Self-Defense: Tips, Tools and How-Tos for Safer Online Communications},
howpublished = {https://ssd.eff.org/},
year = {Viewed 2020-01-25}
}
@misc{EFJ2015,
author = {{European Federation of Journalists}},
title = {Cyber security training for journalists: Tips and tricks to keep your communications safe},
howpublished = {https://europeanjournalists.org/blog/2015/01/22/cyber-security-training-for-journalists/},
year = {Viewed 2020-01-25}
}
@article{Filk2016,
title = {Privacy and security in the era of digital health: what should translational researchers know and do about it?},
author = {Barbara Filkins and Ju Young Kim and Bruce L. Roberts and Winston Armstrong and Mark A. Miller and Michael L Hultner and Anthony P Castillo and Jean-Christophe Ducom and Eric J. Topol and Steven R. Steinhubl},
journal = {American Journal of Translational Research},
year = {2016},
volume = {8},
number = {3},
pages = {1560-80}
}
@misc{FLD,
author = {{Front Line Defenders}},
title = {Digital Security Resources},
howpublished = {https://www.frontlinedefenders.org/en/digital-security-resources},
year = {Viewed 2020-01-25}
}
@article{Leit2019,
doi = {10.1080/07370024.2019.1685883},
url = {https://doi.org/10.1080/07370024.2019.1685883},
year = {2019},
month = {Dec},
publisher = {Informa {UK} Limited},
pages = {1--40},
author = {Roxanne Leit{\~{a}}o},
title = {Technology-Facilitated Intimate Partner Abuse: a qualitative analysis of data from online domestic abuse forums},
journal = {Human--Computer Interaction},
note = {Reports a qualitative analysis of data gathered from three online discussion forums for victims and survivors of domestic abuse covering three main themes: forms of technology-facilitated abuse being discussed on the forums, the ways in which forum members are using technology within the context of intimate partner abuse, and the digital privacy and security advice being exchanged between victims/survivors on the forums.}
}
@article{Natu2010,
doi = {10.1038/468345a},
url = {https://doi.org/10.1038/468345a},
year = {2010},
month = {Nov},
publisher = {Springer Science and Business Media {LLC}},
volume = {468},
number = {7322},
pages = {345--345},
author = {{The Editors}},
title = {Closing the Climategate},
journal = {Nature}
}
@misc{Schn2019,
author = {Bruce Schneier},
title = {ToTok Is an Emirati Spying Tool},
howpublished = {https://www.schneier.com/blog/archives/2019/12/totok\_is\_an\_emi.html},
year = {Viewed 2020-01-25}
}
@misc{SchnBlog,
author = {Bruce Schneier},
title = {Schneier on Security},
howpublished = {https://www.schneier.com/},
year = {Viewed 2020-11-03}
}
@book{Snow2019,
author = {Edward Snowden},
title = {Permanent Record},
year = {2019},
publisher = {Metropolitan Books},
isbn = {978-1250237231}
}
@article{Stan2016,
doi = {10.1109/mitp.2016.84},
url = {https://doi.org/10.1109/mitp.2016.84},
year = {2016},
month = {Sep},
publisher = {Institute of Electrical and Electronics Engineers ({IEEE})},
volume = {18},
number = {5},
pages = {26--32},
author = {Brian Stanton and Mary F. Theofanos and Sandra Spickard Prettyman and Susanne Furman},
title = {Security Fatigue},
journal = {{IT} Professional},
note = {Describes the all-too-common phenomenon of people giving up because security takes too much effort.}
}