-
1
-
-
14844310899
-
Hardcash: A denial of service counter-measure
-
Retrieved June 1, 2003, from www.cypherspace.org/~adam/hashcash/ hashcash.pdf
-
Back, A. (2002). Hardcash: A denial of service counter-measure. Retrieved June 1, 2003, from www.cypherspace.org/~adam/hashcash/ hashcash.pdf
-
(2002)
-
-
Back, A.1
-
3
-
-
0003464583
-
Hierarchical linear models: Applications and data analysis methods
-
Newbury Park, CA: Sage
-
Bryk, A., & Raudenbush, S. (1992). Hierarchical linear models: Applications and data analysis methods. Newbury Park, CA: Sage.
-
(1992)
-
-
Bryk, A.1
Raudenbush, S.2
-
4
-
-
0032131717
-
Spam!
-
Cranor, L. F., & LaMacchia, B. A. (1998). Spam! Communications of the ACM, 41(8), 74-83.
-
(1998)
Communications of the ACM
, vol.41
, Issue.8
, pp. 74-83
-
-
Cranor, L.F.1
Lamacchia, B.A.2
-
6
-
-
18844375030
-
On memory-bound functions for fighting spam
-
Santa Barbara, CA: Springer-Verlag
-
Dwork, C. A., Goldberg, X., & Naor, M. (2003). On memory-bound functions for fighting spam. Proceedings of the 23rd Annual International Cryptology Conference (CRYPTO 2003). Santa Barbara, CA: Springer-Verlag.
-
(2003)
Proceedings of the 23rd Annual International Cryptology Conference (CRYPTO 2003)
-
-
Dwork, C.A.1
Goldberg, X.2
Naor, M.3
-
7
-
-
3242763586
-
Selling interrupt rights: A way to control unwanted e-mail and telephone calls
-
Fahlman, S. E. (2002), Selling interrupt rights: A way to control unwanted e-mail and telephone calls. IBM Systems Journal, 41, 759-766.
-
(2002)
IBM Systems Journal
, vol.41
, pp. 759-766
-
-
Fahlman, S.E.1
-
8
-
-
8644267076
-
Frequently asked questions
-
GoodmailSystems. Retrieved May 22, 2004, from
-
GoodmailSystems. (2004). Frequently asked questions. Retrieved May 22, 2004, from http://www.goodmailsystems.com/faq.html
-
(2004)
-
-
-
10
-
-
33645264322
-
Spam hearing: E-mail tax, international treaty proposed. InfoWorld
-
(May 21). Retrieved May 22, 2004, from www.infoworld.com/article/03/05/ 21/HNspamtax_l.html
-
Gross, G. (2003, May 21). Spam hearing: E-mail tax, international treaty proposed. InfoWorld. Retrieved May 22, 2004, from www.infoworld.com/article/03/05/21/HNspamtax_l.html
-
(2003)
-
-
Gross, G.1
-
11
-
-
0346308681
-
Internet is losing ground in battle against spam
-
(April 22)
-
Hansell, S. (2003, April 22). Internet is losing ground in battle against spam. The New York Times, p 1.
-
(2003)
The New York Times
, pp. 1
-
-
Hansell, S.1
-
12
-
-
0001073135
-
The uses of knowledge in society
-
Hayek, F A. (1945). The uses of knowledge in society. American Economic Review, 35, 519-530.
-
(1945)
American Economic Review
, vol.35
, pp. 519-530
-
-
Hayek, F.A.1
-
13
-
-
2642512895
-
Models of attention in computing and communication: From principles to applications
-
Horvitz, E., Kadie, C. M., Paek, T., & Hovel, D. (2003). Models of attention in computing and communication: From principles to applications. Communications of the ACM, 46(3), 52-59.
-
(2003)
Communications of the ACM
, vol.46
, Issue.3
, pp. 52-59
-
-
Horvitz, E.1
Kadie, C.M.2
Paek, T.3
Hovel, D.4
-
14
-
-
0038375557
-
Predicting human interruptibility with sensors: A Wizard of Oz feasibility study
-
New York: ACM
-
Hudson, S. E., Fogarty, J., Atkeson, C. G., Avrahami, D., Forlizzi, J., Kiesler, S., et al. (2003). Predicting human interruptibility with sensors: A Wizard of Oz feasibility study. Proceedings of the CHI 2003 Conference on Human Factors in Computing Systems. New York: ACM.
-
(2003)
Proceedings of the CHI 2003 Conference on Human Factors in Computing Systems
-
-
Hudson, S.E.1
Fogarty, J.2
Atkeson, C.G.3
Avrahami, D.4
Forlizzi, J.5
Kiesler, S.6
-
15
-
-
0038739087
-
Privacy in e-commerce: Development of reporting standards, disclosure and assurance services in an unregulated market
-
Jamal. K., Maier, M., & Sunder, S. (2003). Privacy in e-commerce: Development of reporting standards, disclosure and assurance services in an unregulated market. Journal of Accounting Research, 41, 285-309.
-
(2003)
Journal of Accounting Research
, vol.41
, pp. 285-309
-
-
Jamal, K.1
Maier, M.2
Sunder, S.3
-
16
-
-
14844283799
-
Enforced standards versus evaluation by general acceptance: A comparative study of e-commerce privacy disclosure and practice in the US and the UK
-
Jamal, K., Maier, M., & Sunder, S. (2005). Enforced standards versus evaluation by general acceptance: A comparative study of e-commerce privacy disclosure and practice in the US and the UK. Journal of Accounting Research, 43(1) 73-96.
-
(2005)
Journal of Accounting Research
, vol.43
, Issue.1
, pp. 73-96
-
-
Jamal, K.1
Maier, M.2
Sunder, S.3
-
17
-
-
0038336806
-
Markets for attention: Will postage for email help?
-
New York: ACM
-
Kraut, R. E., Sunder, S., Morris, J., Telang, R., Filer, D., & Cronin, M. (2002). Markets for attention: Will postage for email help? Proceedings of the 2002 Conference on Computer Supported Cooperative Work. New York: ACM.
-
(2002)
Proceedings of the 2002 Conference on Computer Supported Cooperative Work
-
-
Kraut, R.E.1
Sunder, S.2
Morris, J.3
Telang, R.4
Filer, D.5
Cronin, M.6
-
18
-
-
33644583439
-
A spammer speaks out: In Hill testimony, bulk e-mailer says Internet providers use same tactics
-
(May 22)
-
Krim, J. (2003, May 22). A spammer speaks out: In Hill testimony, bulk e-mailer says Internet providers use same tactics. The Washington Post, p. A01.
-
(2003)
The Washington Post
-
-
Krim, J.1
-
19
-
-
33645267015
-
An economic responce to unsolicited communication
-
Working paper, April 7, 2005
-
Loder, T., Van Alstyne, M., & Walsh, R. (2004). An economic responce to unsolicited communication. Working paper, April 7, 2005.
-
(2004)
-
-
Loder, T.1
Van Alstyne, M.2
Walsh, R.3
-
20
-
-
0023325205
-
Semi-structured messages are surprisingly useful for computer-supported coordination
-
Malone, T. W, Grant, K. R., Lai, K., Rao, R., & Rosenblitt, D. (1987). Semi-structured messages are surprisingly useful for computer-supported coordination. ACM Transactions on Office Information Systems, 5, 115-131.
-
(1987)
ACM Transactions on Office Information Systems
, vol.5
, pp. 115-131
-
-
Malone, T.W.1
Grant, K.R.2
Lai, K.3
Rao, R.4
Rosenblitt, D.5
-
21
-
-
0023344503
-
Intelligent information-sharing systems
-
Malone, T. W., Grant, K. R., Turbak, F. A., Brobst, S. A., & Cohen, M. D., (1987). Intelligent information-sharing systems. Communications of the ACM, 30(5), 390-402.
-
(1987)
Communications of the ACM
, vol.30
, Issue.5
, pp. 390-402
-
-
Malone, T.W.1
Grant, K.R.2
Turbak, F.A.3
Brobst, S.A.4
Cohen, M.D.5
-
22
-
-
0003241732
-
The telephone and the uses of time
-
I. de Sola Pool (Ed.), Cambridge, MA: MIT Press
-
Mayer, M. (1977). The telephone and the uses of time. In I. de Sola Pool (Ed.), The social impact of the telephone (pp. 225-245). Cambridge, MA: MIT Press.
-
(1977)
The Social Impact of the Telephone
, pp. 225-245
-
-
Mayer, M.1
-
23
-
-
0037574044
-
Communication flows: A census in the United States and Japan
-
New York: North-Holland
-
Poole, I., Inose, H., Takasaki, N., & Hurwitz, R. (1984). Communication flows: A census in the United States and Japan. New York: North-Holland.
-
(1984)
-
-
Poole, I.1
Inose, H.2
Takasaki, N.3
Hurwitz, R.4
-
24
-
-
33645269923
-
The impact of CAN-SPAM legislation
-
(March). (Pew Internet and American Life Project). Retrieved May 22, 2004, from
-
Rainie, L., & Fallows, D. (2004, March). The impact of CAN-SPAM legislation (Pew Internet and American Life Project). Retrieved May 22, 2004, from http://www.pewinternet.org/reports/toc.asp.?Report=116
-
(2004)
-
-
Rainie, L.1
Fallows, D.2
-
25
-
-
0005373173
-
A Bayesian approach to filtering junk e-mail
-
Retrieved November 29, 2004, from
-
Sahami, M., Dumais, S., Heckerman, D., & Horvitz, E. (1998). A Bayesian approach to filtering junk e-mail. Retrieved November 29, 2004, from http://research.microsoft.com/~horvitz/junkfilter.htm
-
(1998)
-
-
Sahami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
-
26
-
-
0007070038
-
Designing organizations for an information-rich world: Models of bounded rationality
-
Cambridge, MA: MIT Press
-
Simon, H. A. (1982). Designing organizations for an information-rich world: Models of bounded rationality (pp. 171-185). Cambridge, MA: MIT Press.
-
(1982)
, pp. 171-185
-
-
Simon, H.A.1
-
28
-
-
33645273525
-
'Digital dreck' times 180 million
-
(May 22). Retrieved May 25, 2003, from
-
Webb, C. L. (2003, May 22). 'Digital dreck' times 180 million. The Washington Post. Retrieved May 25, 2003, from http://www. washingtonpost.com/wp-dyn/articles/A25239-2003May22.html
-
(2003)
The Washington Post
-
-
Webb, C.L.1
-
29
-
-
0037574071
-
Information overload in a network of targeted communication
-
(May 18). Retrieved November 29, 2004, from
-
Zandt, van T. (2001, May 18). Information overload in a network of targeted communication. Retrieved November 29, 2004, from http://zandtwerk.insead.fr
-
(2001)
-
-
Zandt, T.1
|