References
- Bansal, G., Sinha, A. P., & Zhao, H. (2008). Tuning data mining methods for cost-sensitive regression: A study in loan charge-off forecasting. Journal of Management Information Systems, 25(3), 315–336. doi:10.2753/MIS0742-1222250309
- Enzle, M. E., & Anderson, S. C. (1993). Surveillant intentions and intrinsic motivation. Journal of Personality and Social Psychology, 64(2), 257. doi:10.1037/0022-3514.64.2.257
- Eubanks, V. (2018). Automating inequality: How high-tech tools profile, police, and punish the poor. New York, NY: St. Martin’s Press.
- Ghoshal, S. (2005). Bad management theories are destroying good management practices. Academy of Management Learning & Education, 4(1), 75–91. doi:10.5465/amle.2005.16132558
- Lee, K.-F. (2018). AI superpowers: China, silicon valley, and the new world order. New York, NY: Houghton Mifflin Harcourt.
- Nahapiet, J., & Ghoshal, S. (1998). Social capital, intellectual capital, and the organizational advantage. Academy of Management Review, 23(2), 242–266. doi:10.5465/amr.1998.533225
- O’Neil, C. (2016). Weapons of math destruction: How big data increases inequality and threatens democracy. Crown Publishing Group, NY.
- UNCTD. (2019, May 29). Data protection and privacy legislation worldwide. Retrieved from https://unctad.org/en/Pages/DTL/STI_and_ICTs/ICT4D-Legislation/eCom-Data-Protection-Laws.aspx.