Você está na página 1de 4

BIBLIOGRAPHY

Primary Sources

A. Laws and Statutes

1987 Philippine Constitution

Administrative Order No. 308. Adoption of a National Computerized

Identification Reference System.

Republic Act No. 10173

B. Jurisprudence

Blas F. Ople vs. Ruben D. Torres, etc., G.R. No. 127685 July 23,

1998

Secondary Sources

A. Newspaper

The Philippine Daily Inquirer, September 9, 2017

The Philippine Star, September 16, 2017

B. Internet Sources

Atty. Norieva D. de Vega, A. K. (2016). Data Privacy in the Philippines.

Retrieved November 20, 2017, from Nicolas & De Vega Law

Offices: http://ndvlaw.com/data-privacy-in-the-philippines/
Center, N. C. (2003, June 30). Information and Communication

Technology (ICT) Resources Survey 2002-2003.

Centre, P. R. (2006, March 30). National Identity Cards. India, New Delhi.

Retrieved from http://mirzapur.nic.in/nisani/paperNISANI.pdf

Daniel Morgan and William Krouse, R. S. (2005, February 7). Biometric

Identifiers and Border Security: 9/11 Commission

Recommendations and Related Issues. Retrieved from

Congressional Research Service (CRS) Report for Congress.

Davidson, E. (2006). A technological frames perspective on information

technology and organizational change. Retrieved from Journal of

Applied Behavioral .

Demos. (n.d.). Statement in Opposition to a Natonal Voter Identification

Card. Retrieved from http://www.demos.org/ pate337.cfm

Foundation, C. D. (2011, September). Explaining International Leadership:

Electronic Identification Systems. Retrieved from

http://www.itif.org/files/2011-e-id-report-final.pdf

French, A. (2005, October 17). Real ID: Big Brother Could Cost Big

Money. Retrieved from Citizens Against Government Watch

(CAGW).
Gellman, R. (2013, August). Privacy and Biometric ID Systems: An

Approach Using Fair Information Practices for Developing

Countries. Washington DC: Center for Global Development.

Government of the Philippines, W. B. (2003). Philippines: Improving

Government Performance: Discipline, Efficiency and Equity in

Managing Public Resources.

Johnston, A. (2013) Why Australia Card Mark II is Still a Dumb Idea,

Australian Policy Online, Swinburne Institute for Social Research,

Swinburne University of Technology, Australia

http://apo.org.au/commentary/why-australia-card-mark-ii-still-dumb-

idea

Malik, T. (2014). Technology in the Service of Development: The NADRA

Story. Center For Global Development. Retrieved November 16,

2017, from <http://www.cgdev.org/publication/ft/technology-service-

development-nadra-story>

Martin, A. (2016, April). Cyber Studie Programme. Retrieved November

2017, 12, from http://www.politics.ox.ac.uk/centre/cyber-studies-

programme.html
Martin, A. K. (2011). Envisioning Technology through Discourse: A case

study of biometrics in the National Identity Scheme in the United

Kingdom .

Martinovic, A. M. (2016). Security and Privacy Impacts of a Unique

Personal Identifier.

Nguyen, T.-L. (2003, June). National Identication Systems.

Massachusetts Institute of Technology.

Ouziel, P. (2009). The Spanish Identity Card: Historical Legacies and

Contemporary Surveillance. Retrieved from

http://www.pabloouziel.com/Academic%20Essay/The%20Spanish

%20Identity%20Card%20(final).pdf

Parsons, K. M. (2013). A National ID Card by Stealth? The BC Services

Card Privacy Risks, Opportunities and Alternatives . The British

Columbia Civil Liberties Association for The Office of the Privacy

Commissioner of Canada Contributions Program .

Science, L. S. (2005, March). The Identity Project. An Assessment of the

UK Identity Cards Bill and Its Implications. London.

Você também pode gostar