Review
References
Australian Government Public Service Commission (AGPSC) (2007). Tackling wicked problems, Canberra: Publication of the AGPSC. Beck U (1999). What is globalization? Cambridge: Polity Press. |
|
Brugnach M, Ingram H (2017). Ways of knowing and relational knowledge, in: Weber E, Lach D, Steel B (eds.). New strategies for wicked problems, Corvallis: Oregon State University Press 27:43. |
|
Bounfour A (2016). Digital futures - digital transformation, New York: Springer. |
|
Byrne D, Callaghan G (2014). Complexity theory and the social sciences, New York: Routledge. |
|
Cantoni L, Tardini S (2006). Introductions to Media and Communications. Internet, New York: Routledge. |
|
Castells M (2009). The Rise of the Network Society. Volume 1: The Information Age. Economy, Society, and Culture, Hoboken in New Jersey: Wiley-Blackwell. |
|
Churchman CW (1967). "Wicked problems". Management Science 4: 141-142. |
|
Dahlgren P (2005). "The Internet, public spheres, and political communication". Political Communication 22:147-162. |
|
Danken T, Dribbisch K, Lange A (2016). "Studying wicked problems forty years". Der moderne Staat 1:15-34. |
|
Diggelmann O, Cleis N (2014). "How the right to privacy became a human right". Humans Rights Law Review 14:441-458. |
|
Digital Europe (2018). A stronger digital Europe. Brussels: Digital Europe Publishing. |
|
Fischbacher-Smith D (2016). "Framing the UK's counter-terrorism policy within the context of a wicked problem". Public Money and Management 36(6):399-408. |
|
Flecker J, Fibich T, Kraemer K (2017). Socio-economic changes and the reorganization of work. In: Korunka C, Kubicek B (eds.). Job demands in a changing world of work, Berlin: Springer pp. 7-22. |
|
Forde C, Stuart M, Joyce S, Oliver L, Valizade D, Alberti G, Hardy K, Trappmann V, Umney C, Carson C (2017). The social protection of workers in the platform economy, Strasbourg: Publication of the European Parliament's Committee on Employment and Social Affairs. |
|
Frey C, Osborne M (2017). "The future of employment". Technological Forecasting and Social Change 39(3):254-280. |
|
Fuchs C (2008). Internet and society, New York: Routledge. |
|
Fuhr H (2016). Contested public organizations". Der moderne Staat 1: 101-107. |
|
Gadamer HG (1975). Hermeneutics and social science". Cultural Hermeneutics 2(4):307-316. |
|
Gelber K (2011). Speech Matters: Getting Free Speech Right, University of Queensland Press, St Lucia. |
|
Giannopoulos G, Filippini R, Schimmer M (2012). Risk assessment methodologies for critical infrastructure protection. Part I: A state of the art, Luxembourg: Publications office of the European Union. |
|
Goldsmith S, Eggers W (2004). Governing by network, Washington DC: Brookings Institution. |
|
Habermas J (1992). Between facts and norms. Contributions to a discourse theory of law and democracy, Cambridge in Massachusetts: MIT Press. |
|
Head B (2008). "Wicked problems in public policy" Public Policy 2:101-108. |
|
Head B, Alford J (2015). "Wicked problems - implications for public policy and management". Administration and Society 6:711-739. |
|
Heisenberg D (2005). Negotiating privacy. The European Union, the United States, and personal data protection, Boulder in Colorado: Lynne Rienner Publishers. |
|
Hobbs R, Jensen A (2009). "The past, present and future of media literacy". Journal of Media Literacy Education 1:1-11. |
|
Horn R, Weber R (2007). New tools for resolving wicked problems. Mess mapping and resolution mapping processes, Stanford: Publication of the Stanford University. |
|
Hulme M (2009). Why we disagree about climate change. Understanding controversy, inaction and opportunity, Cambridge: Cambridge University Press. |
|
Juteau D (2003). Introducing social differentiation, in: Juteau, Danielle (ed.). Social differentiation. Patterns and processes, Toronto: University of Toronto Press 3:13. |
|
Kaiser B (2019). Targeted. My inside story of Cambridge Analytica, New York: Harper Collins Publishers. |
|
Kaska K, Beckvard H, Minarik T (2019). Huawei, 5G and China as a security threat, Tallinn: CCDCOE. |
|
Lessig L (1997). "The constitution of code". CommLaw Conspectus 5:181-193. |
|
Levin K, Cashore B, Bernstein S, Graeme A (2012). Overcoming the tragedy of super wicked problems. Policy Sciences 4:123-152. |
|
Neale L (2017). Leveraging social capital for knowledge development in clusters, Augsburg: Hampp. |
|
Ogburn W (1957). "Cultural lag as a theory". Sociology and Social Research 1:167-174. |
|
Oh S (2017). Information operations and democracy. What role for global civil society and independent media?, in: Annenberg School for Communication ASC (ed.). Understanding and addressing the disinformation ecosystem, Los Angeles: Publication of the ASC pp. 69-74. |
|
Organization for Economic Cooperation and Development (OECD) (2017). Key issues for digital transformation in the G20 Paris: OECD Publishing. |
|
Organization for Economic Cooperation and Development (OECD) (2019). Going digital Paris: OECD Publishing. |
|
Pariser E (2011). The filter bubble. What the Internet is hiding from you, London: Penguin Books. |
|
Park J (2017). Media literacy, media competence and media policy in the digital age. Hankuk: Publication of the Hankuk University of Foreign Studies. |
|
Rescher N (2013). Dialectics - a classical approach to inquiry. New Brunswick: Ontos. |
|
Ritchey T (2013). Wicked Problems. Modelling social messes with morphological analysis. Acta Morphologica Generalis 1:1-8. |
|
Rittel H, Webber M (1973). "Dilemmas in a general theory of planning". Policy Sciences 4:155-169. |
|
Rosa H (2015). Social acceleration. A new theory of modernity. New York: Columbia University Press. |
|
Schumacher E (1995). A guide for the perplexed, London: Vintage. |
|
Shapiro G (2000). Employee involvement - opening the diversity Pandora's box". Personnel Review 3:304-323. |
|
Spicker P (2016). "Poverty as a wicked problem". Poverty Brief 3:1-4. |
|
Stallings W (2017). Cryptography and network security. Principles and Practice, Essex: Pearson. |
|
Sui D, Caverlee J, Rudesil D (2015). The deep web and the darknet, Washington DC: Publication of the Wilson Center. |
|
Van Asselt MB (2000). Perspectives on uncertainty and risk, New York: Springer pp. 407-417. |
|
Wall D (2007). Cybercrime. The transformation of crime in the information age, Cambridge: Polity Press. |
|
Watkins A, Wilber K (2015). Wicked and wise. Kent: Urbane Publications. |
|
Weber E, Khademian A (2008). Wicked problems, knowledge challenges, and collaborative capacity builders in network settings. Public Administration Review 68(2):334-349. |
|
Weber E, Lach D, Steel B (2017). Science and problem solving for wicked problems. In: Weber E, Lach D, Steel B (eds.). New strategies for wicked problems, Corvallis: Oregon State University Press pp. 1-24. |
|
Whitaker R (2000). The end of privacy. How total surveillance is becoming a reality, New York: New Press. |
|
Winkel O (2007a). "Electronic government and network security". Transforming Government - People, Process and Policy 3:220-229. |
|
Winkel O (2007b). Electronic government in Germany, In: Zapotoczky K, Pracher C, Strunz H (eds.). Administration innovative, Linz: Trauner pp. 163-186. |
|
Winkel O (2016). "The perspectives of democratic decision making in the information society". IJCSIT - International Journal of Computer Science and Information Technology 8(2):101-116. |
|
World Economic Forum (WEF) (2019). Our shared digital future. Responsible digital transformation, Geneva: Publication of the WEF. |
Copyright © 2023 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0