[QRC62] Bibliografia personale

Hunter, R. (2013). The Future of Global Information Security. Gartner.

Rifkin, J (2014). The Zero Marginal Cost Society. Palgrave Macmillan

Kurzweil, R. (2005). The Singularity Is Near: When Humans Transcend Biology. Viking.

Pozza, G.; Halamka, J. (2014). The Fifth Domain – Amazon;

Pozza, G.; Napoli, G.; Ciullo, S., don Carlo (2015). Albergo Bellavista – Amazon;

ICSPA. (2013). Project 2020: Scenarios for the Future of Cybercrime – White Paper for Decision Makers. Retrieved from 2020: http://2020.trendmicro.com

TrendLabs. (2013). BLURRING BOUNDARIES – Trend Micro Security Predictions for 2014 and Beyond.Trend Micro.

Christensen, C. (2009). The Innovator’s Prescription. McGraw-Hill Professional.

Austin, R. D., Nolan, R. L., & S., O. (2009). Adventures of an IT Leader. Harvard Business Press.

Turkle, S. (2012). Alone Together: Why We Expect More from Technology and Less from Each Other.

Boyd, D (2015). It’s Complicated. (http://www.danah.org/books/ItsComplicated.pdf)

Varanini, F. (2016). Macchine per pensare: l’informatica come prosecuzione della filosofia con altri mezzi (Guerini)

Lindstrom, M. (2016). Small Data (Hoeply)

Kotter, J., & Rathgeber, H. (2006). Our Iceberg Is Melting. Macmillan.

Watzlawick, P. (1976). How Real Is Real?

Watzlawick, P; Weakland, J; Fisch, R.. (1978). Change.

Turing, A. (1950). Computing machinery and intelligence (http://www.loebner.net/Prizef/TuringArticle.html)

Gotterbarn (et Al.). ACM Code of Ethics (https://www.acm.org/about-acm/acm-code-of-ethics-and-professional-conduct)