À propos de cet article

Citez

[1] Islam, SMR; Kwak, D ; Kabir, MH; Hossain, Kwak, KS, The Internet of Things for Health Care: A Comprehensive Survey, available on http://ieeexplore.ieee.org/document/7113786/Search in Google Scholar

[2] J.Gubbi et al, Internet of Things (IoT): A vision, architectural elements, and future directions, Future Generation Computer Systems, 29(2013), pp. 1645-1660. Search in Google Scholar

[3] www.waymo.roSearch in Google Scholar

[4] https://www.linkedin.com/in/petertlewisSearch in Google Scholar

[5] http://www.theverge.com/2016/10/21/13362354/dyn-dns-ddos-attack-cause-outagestatus- explainedSearch in Google Scholar

[6] https://krebsonsecurity.com/2017/01/who-is-anna-senpai-the-mirai-worm-author/Search in Google Scholar

[7] https://www.theguardian.com/technology/2016/nov/03/cyberattack-internet-liberia-ddoshack- botnetSearch in Google Scholar

[8] http://www.washingtonexaminer.com/wikileaks-warns-cia-can-hack-cars-forundetectable-assassinations/article/2616661Search in Google Scholar

[9] https://www.symantec.com/security_response/writeup.jsp?docid=2010-071400-3123-99Search in Google Scholar

[10] http://ec.europa.eu/eurostat/statistics-explained/index.php/Ecommerce_statistics_for_individualsSearch in Google Scholar

[11] https://www.bigcommerce.com/blog/ecommerce-trends/Search in Google Scholar

[12] https://deviceatlas.com/blog/16-mobile-market-statistics-you-should-know-2016Search in Google Scholar

[13] https://privacy.google.com/your-data.html accesat la 01 aprilie 2017Search in Google Scholar

[14] https://www.google.ro/adwords/ accesat la 01 aprilie 2017Search in Google Scholar

[15] Thomas J. Holt, Olga Smirnova & Yi Ting Chua (2016), Exploring and Estimating the Revenues and Profits of Participants in Stolen Data Markets, Deviant Behavior, DOI: 10.1080/01639625.2015.102676610.1080/01639625.2015.1026766Search in Google Scholar

[16] Michael Trusov, Liye Ma, Zainab Jamal (2016,) Crumbs of the Cookie: User Profiling in Customer-Base Analysis and Behavioral Targeting. Marketing Science Published online in Articles in Advance 28 Apr 2016 . http://dx.doi.org/10.1287/mksc.2015.095610.1287/mksc.2015.0956Search in Google Scholar

[17] https://zephoria.com/top-15-valuable-facebook-statistics/Search in Google Scholar

[18] https://www.facebook.com/policy.php accessed on April 2017Search in Google Scholar

[19] Montgomery, K. C. Youth and surveillance in the Facebook era: Policy interventions and social implications. Telecommunications Policy (2015), Volume: 39 Issue: 9 Pages: 771-786, http://dx.doi.org/10.1016/j.telpol.2014.12.006iSearch in Google Scholar

[20] https://jtlr.wordpress.com/2011/12/11/facebook-issues-people-moan-too-much/Search in Google Scholar

[21] https://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-dataSearch in Google Scholar

[22] Reddick, Christopher G. ; Chatfield, Akemi Takeoka; Jaramillo, Patricia A. - Public opinion on National Security Agency surveillance programs: A multi-method approach, available at http://apps.webofknowledge.com.am.enformation.ro/full_record.do?product=WOS&search_mode=GeneralSearch&qid=7&SID=X2PUkelOYUMPmkZUtY6&page=2&doc=55Search in Google Scholar

[23] Working document no. 3, Claude Moraes, Jan Philipp Albrecht http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/dt/1011/1011370/1011370ro.pdfSearch in Google Scholar

[24] Bauman, Zygmunt et al. (2014) After Snowden: Rethinking the Impact of Surveillance. International Political Sociology , doi: 10.1111/ips.12048, p. 123Search in Google Scholar

[25] http://www.telesurtv.net/english/news/NSA-Spies-on-Venezuelas-Oil-Company-Snowden-Leak-Reveals-20151118-0010.htmlSearch in Google Scholar

[26] http://www.nydailynews.com/news/national/wikileaks-documents-show-alleged-ciaprogram- hack-smart-tvs-article-1.2991141Search in Google Scholar