-
1
-
-
54949125544
-
The emerging cyber risks of biometrics
-
Barton, B., Byciuk, S., Harris, C., Schumack, D. and Webster, K. (2005) 'The emerging cyber risks of biometrics', Risk Management, Vol.52, No.10, pp.26-30.
-
(2005)
Risk Management
, vol.52
, Issue.10
, pp. 26-30
-
-
Barton, B.1
Byciuk, S.2
Harris, C.3
Schumack, D.4
Webster, K.5
-
5
-
-
0346218796
-
-
New York: Cambridge University Press
-
Broad, C.D. (1978) Kant: An Introduction, New York: Cambridge University Press.
-
(1978)
Kant: An Introduction
-
-
Broad, C.D.1
-
6
-
-
68849129043
-
Philosophical ethics
-
in M.D. Ermann and M.S. Shauf (Eds.), New York, NY: Oxford University Press
-
Ermann, M.D. and Shauf, M.S. (2003) 'Philosophical ethics', in M.D. Ermann and M.S. Shauf (Eds.) Computers, Ethics, and Society, New York, NY: Oxford University Press, pp.2-3.
-
(2003)
Computers, Ethics, and Society
, pp. 2-3
-
-
Ermann, M.D.1
Shauf, M.S.2
-
7
-
-
68849114987
-
Federal Trade Commission
-
Washington, DC: Federal Trade Commission
-
Federal Trade Commission (2007) 2006 Identity Theft Survey Report, Washington, DC: Federal Trade Commission.
-
(2007)
2006 Identity Theft Survey Report
-
-
-
9
-
-
33645514041
-
Web merchants privacy and security statements: How reassuring are they for consumers? A two-sided approach
-
Gauzente, C. (2004) 'Web merchants' privacy and security statements: how reassuring are they for consumers? A two-sided approach', Journal of Electronic Commerce Research, Vol.5, No.3, pp.181-198.
-
(2004)
Journal of Electronic Commerce Research
, vol.5
, Issue.3
, pp. 181-198
-
-
Gauzente, C.1
-
10
-
-
84923486508
-
Privacy and the limits of law
-
Gavison, R. (1980) 'Privacy and the limits of law', Yale Law Journal, Vol.89, No.4, pp.21-71.
-
(1980)
Yale Law Journal
, vol.89
, Issue.4
, pp. 21-71
-
-
Gavison, R.1
-
11
-
-
0000917844
-
The strength of weak ties: A network theory revisited
-
in P.V. Marsden and N. Lin (Eds.), Beverly Hills, CA: Sage
-
Granovetter, M.S. (1982) 'The strength of weak ties: a network theory revisited', in P.V. Marsden and N. Lin (Eds.) Social Structure and Network Analysis, Beverly Hills, CA: Sage, pp.103-130.
-
(1982)
Social Structure and Network Analysis
, pp. 103-130
-
-
Granovetter, M.S.1
-
12
-
-
68849118664
-
Balancing individual privacy rights and intelligence needs: Procedural-based vs. distributive-based justice perspectives on the patriot act
-
in L. Freeman and A.G. Peace (Eds.), Hershey, PA: Information Science Publishing
-
Hartzel, K.S. and Deegan, P.E. (2005) 'Balancing individual privacy rights and intelligence needs: procedural-based vs. distributive-based justice perspectives on the patriot act', in L. Freeman and A.G. Peace (Eds.) Information Ethics: Privacy and Intellectual Property, Hershey, PA: Information Science Publishing, pp.180-195.
-
(2005)
Information Ethics: Privacy and Intellectual Property
, pp. 180-195
-
-
Hartzel, K.S.1
Deegan, P.E.2
-
13
-
-
84978166668
-
The best action is the one with the best consequences
-
in M.D. Ermann and M.S. Shauf (Eds.), New York, NY: Oxford University Press
-
Hospers, J. (2003) 'The best action is the one with the best consequences', in M.D. Ermann and M.S. Shauf (Eds.) Computers, Ethics, and Society, New York, NY: Oxford University Press, pp.3-11.
-
(2003)
Computers, Ethics, and Society
, pp. 3-11
-
-
Hospers, J.1
-
15
-
-
84976854084
-
Cooperation, coordination and control in computer-supported work
-
Kling, R. (1991) 'Cooperation, coordination and control in computer-supported work', Communications of the ACM, Vol.34, No.12, pp.83-88.
-
(1991)
Communications of the ACM
, vol.34
, Issue.12
, pp. 83-88
-
-
Kling, R.1
-
17
-
-
55249097295
-
Four ethical issues of the information age
-
Mason, R. (1986) 'Four ethical issues of the information age', MIS Quarterly, Vol.10, No.1, pp.5-12.
-
(1986)
MIS Quarterly
, vol.10
, Issue.1
, pp. 5-12
-
-
Mason, R.1
-
18
-
-
84986134849
-
Are they really listening? An investigation into published online privacy policies at the beginning of the third millennium
-
McRobb, S. and Rogerson, S. (2004) 'Are they really listening? An investigation into published online privacy policies at the beginning of the third millennium', Information Technology & People, Vol.17, No.4, pp.442-1161
-
(2004)
Information Technology and People
, vol.17
, Issue.4
, pp. 442-1161
-
-
McRobb, S.1
Rogerson, S.2
-
20
-
-
84861301596
-
Who gets to know what when: Configuring privacy permissions in an awareness application
-
New York, NY: ACM
-
Patil, S. and Lai, J. (2005) 'Who gets to know what when: configuring privacy permissions in an awareness application', Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, New York, NY: ACM, pp.101-110.
-
(2005)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 101-110
-
-
Patil, S.1
Lai, J.2
-
21
-
-
0000839286
-
Privacy
-
Prosser, W. (1960) 'Privacy', California Law Review, Vol.48, No.3, pp.383-423.
-
(1960)
California Law Review
, vol.48
, Issue.3
, pp. 383-423
-
-
Prosser, W.1
-
22
-
-
34547169479
-
A grounded theory of information sharing behavior in personal learning space
-
New York, NY: ACM
-
Razavi, M.N. and Iverson, L. (2006) 'A grounded theory of information sharing behavior in personal learning space', Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work, New York, NY: ACM, pp.459-468.
-
(2006)
Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work
, pp. 459-468
-
-
Razavi, M.N.1
Iverson, L.2
-
26
-
-
31644435932
-
Y2K all over again: How group think permeates IS and compromises security
-
Schiano, W. and Weiss, J.W. (2006) 'Y2K all over again: how groupthink permeates IS and compromises security', Business Horizons, Vol.49, pp.115-125.
-
(2006)
Business Horizons
, vol.49
, pp. 115-125
-
-
Schiano, W.1
Weiss, J.W.2
-
27
-
-
56349094972
-
The law of privacy in a nutshell
-
Smith, R. (1993) 'The law of privacy in a nutshell', Privacy Journal, Vol.19, No.6, pp.50-51.
-
(1993)
Privacy Journal
, vol.19
, Issue.6
, pp. 50-51
-
-
Smith, R.1
-
28
-
-
0022810941
-
Reducing social context cues: Electronic mail in organizational communication
-
Sproull, L. and Kiesler, S. (1986) 'Reducing social context cues: electronic mail in organizational communication', Management Science, Vol.32, No.11, pp.1492-1513.
-
(1986)
Management Science
, vol.32
, Issue.11
, pp. 1492-1513
-
-
Sproull, L.1
Kiesler, S.2
-
29
-
-
0005489253
-
Privacy and security: An ethical analysis
-
Walters, G. (2001) 'Privacy and security: an ethical analysis', Computers and Society, Vol.31, No.2, pp.8-23.
-
(2001)
Computers and Society
, vol.31
, Issue.2
, pp. 8-23
-
-
Walters, G.1
|