-
1
-
-
85023834403
-
How internet cookies work
-
Retrieved June 30, 2003, from http://computer.howstuffworks.com/cookie.htm
-
Brain, M. (2003), “How Internet Cookies Work,” How Stuff Works. Retrieved June 30, 2003, from http://computer.howstuffworks.com/cookie.htm
-
(2003)
How Stuff Works
-
-
Brain, M.1
-
2
-
-
85023883162
-
-
May 19. Retrieved June 30, 2003, from http://www. microsoft.com/info/cookies.htm
-
Microsoft Profile Center (2002), “Cookies: What They Are, Why You Are In Charge,” May 19. Retrieved June 30, 2003, from http://www. microsoft.com/info/cookies.htm
-
(2002)
Cookies: What they Are, Why You are in Charge
-
-
-
3
-
-
0036509779
-
The tale of cookies (Dr. jekyll and mr. hyde)
-
Spring, 239
-
Gyorgy, P. (2002), “The Tale of Cookies (Dr. Jekyll and Mr. Hyde),” Social Research, 69(1), Spring, 239.
-
(2002)
Social Research
, vol.69
, Issue.1
-
-
Gyorgy, P.1
-
4
-
-
85023869947
-
-
Resources, April 16. Retrieved July 8, 2003, from http://www.privacyfoundation.org/resources/montulli.asp
-
Privacy Foundation (2001), “Cookie Maker,” Resources, April 16. Retrieved July 8, 2003, from http://www.privacyfoundation.org/resources/montulli.asp
-
(2001)
Cookie Maker
-
-
-
5
-
-
85023795262
-
-
June 14. Retrieved June 30, 2003, from http://help.netscape.com/kb/consumer/19970226-2.html
-
Netscape (2001), “Cookies: What They Are and How They Work,” June 14. Retrieved June 30, 2003, from http://help.netscape.com/kb/consumer/19970226-2.html
-
(2001)
Cookies: What they are and How they Work
-
-
-
6
-
-
77956223011
-
Are cookies hazardous to your privacy?
-
May/June, 52
-
Cunningham, P.J. (2002), “Are Cookies Hazardous to Your Privacy?,” Information Management Journal, 36(3), May/June, 52.
-
(2002)
Information Management Journal
, vol.36
, Issue.3
-
-
Cunningham, P.J.1
-
7
-
-
85023853632
-
The unofficial cookie faq version 2.6
-
Whalen, D. (2002), “The Unofficial Cookie FAQ Version 2.6,” Cookie Central, June 8. Retrieved June 19, 2003, from http://www.cookiecentral. com/faq
-
(2002)
Cookie Central
-
-
Whalen, D.1
-
8
-
-
85023856056
-
-
Retrieved July 3, 2003, from http://www. iab.net/resources/privacy_edu_info.asp
-
Interactive Advertising Bureau Resources & Research (2003), “Privacy-Educational Information.” Retrieved July 3, 2003, from http://www. iab.net/resources/privacy_edu_info.asp
-
(2003)
Privacy-Educational Information
-
-
-
9
-
-
85023850966
-
A cookie by any other name — is it safe to use cookies again?
-
April 1, 16
-
Williams, A. (2002), “A Cookie by Any Other Name — Is It Safe to Use Cookies Again?,” New Architect, April 1, 16.
-
(2002)
New Architect
-
-
Williams, A.1
-
10
-
-
0036497393
-
Indexing aids at corporate web sites: The use of robots.txt and meta tags
-
March, 209
-
Drott, C.M. (2002), “Indexing Aids at Corporate Web Sites: The Use of Robots.txt and META Tags,” Information Processing & Management, 38(2), March, 209.
-
(2002)
Information Processing & Management
, vol.38
, Issue.2
-
-
Drott, C.M.1
-
11
-
-
0032058015
-
Internet privacy: The internet and privacy legislation: Cookies for a treat?
-
May 6, 166
-
Mayer-Schönberger, V. (1998), “Internet Privacy: The Internet and Privacy Legislation: Cookies for a Treat?,” Computer Law & Security Report, 14(3), May 6, 166.
-
(1998)
Computer Law & Security Report
, vol.14
, Issue.3
-
-
Mayer-Schönberger, V.1
-
12
-
-
84889051720
-
-
Retrieved June 24, 2003, from http://www.microsoft.com/technet/treeview/default. asp?url=/technet/prodtechnol/winxppro/proddocs/sec_cook.asp
-
Microsoft TechNet (2003), “Understanding Cookies.” Retrieved June 24, 2003, from http://www.microsoft.com/technet/treeview/default. asp?url=/technet/prodtechnol/winxppro/proddocs/sec_cook.asp
-
Understanding Cookies
-
-
-
13
-
-
84873908870
-
The privacy hoax
-
October 14
-
Goldman, E. (2002), “The Privacy Hoax,” Forbes, 170(8), October 14, 42.
-
(2002)
Forbes
, vol.170
, Issue.8
, pp. 42
-
-
Goldman, E.1
-
15
-
-
34250340406
-
E-commerce and privacy issues: An analysis of the personal data protection bill
-
Azmi, I.M. (2002), “E-Commerce and Privacy Issues: An Analysis of the Personal Data Protection Bill,” International Review of Law, Computers & Technology, 16(3), 317.
-
(2002)
International Review of Law, Computers & Technology
, vol.16
, Issue.3
, pp. 317
-
-
Azmi, I.M.1
-
16
-
-
85023790321
-
Push to protect privacy grows
-
August 27, SR10
-
Fitzgerald, K. (2001), “Push to Protect Privacy Grows,” Crain’s Chicago Business, 24(35), August 27, SR10.
-
(2001)
Crain’s Chicago Business
, vol.24
, Issue.35
-
-
Fitzgerald, K.1
-
17
-
-
85023791645
-
Privacy law in q1 2002: 6. cookies and web bugs
-
Retrieved July 3, 2002, from http://profs.lp. findlaw.com/privacy/index.html
-
Collier, S.S. (2002), “Privacy Law in Q1 2002: 6. Cookies and Web Bugs,” Find Law Professionals. Retrieved July 3, 2002, from http://profs.lp. findlaw.com/privacy/index.html
-
Find Law Professionals
-
-
Collier, S.S.1
-
18
-
-
85023863226
-
-
Retrieved September 15, 2004, from http://www.seas.gwu.edu/~seascf/www/CGI.pm/CGI::Cookie.3.html
-
Stein, L.D. (1998), “CGI: Cookie-Interface to Netscape Cookie.” Retrieved September 15, 2004, from http://www.seas.gwu.edu/~seascf/www/CGI.pm/CGI::Cookie.3.html
-
(1998)
CGI: Cookie-Interface to Netscape Cookie
-
-
Stein, L.D.1
-
19
-
-
85023861628
-
-
Retrieved September 15, 2004, from http://www. w3schools.com/asp/coll_cookies.asp
-
W3 schools (2002), “The Cookie Collection.” Retrieved September 15, 2004, from http://www. w3schools.com/asp/coll_cookies.asp
-
(2002)
The Cookie Collection
-
-
|