Return to Article Details Surveillance technologies in cyberspace: data doubles and simulated identities Download Download PDF