-
4
-
-
37249053884
-
Social network sites: Definition
-
D.M. Boyd, and N.B. Ellison Social network sites: definition History, and Scholarship, Journal of Computer-Mediated Communication 13 1 2007 210 230
-
(2007)
History, and Scholarship, Journal of Computer-Mediated Communication
, vol.13
, Issue.1
, pp. 210-230
-
-
Boyd, D.M.1
Ellison, N.B.2
-
5
-
-
0002186644
-
Privacy-enhancing technologies: Typology, critique, vision
-
H. Burkert Privacy-enhancing technologies: typology, critique, vision P. Agre, M. Rotenberg, Technology and privacy: the new landscape 1997 MIT Press Boston, MA, USA 126 143
-
(1997)
Technology and Privacy: The New Landscape
, pp. 126-143
-
-
Burkert, H.1
-
6
-
-
10444255768
-
-
W3C Recommendation, World Wide Web Consortium (W3C)
-
R. Chinnici, H. Haas, A.A. Lewis, J.-J. Moreau, D. Orchard, and S. Weerawarana Web services description language (WSDL) version 2.0 part 2: adjuncts June 2007 W3C Recommendation, World Wide Web Consortium (W3C)
-
(2007)
Web Services Description Language (WSDL) Version 2.0 Part 2: Adjuncts
-
-
Chinnici, R.1
Haas, H.2
Lewis, A.A.3
Moreau, J.-J.4
Orchard, D.5
Weerawarana, S.6
-
8
-
-
77955338722
-
-
W3C Working Group Note, World Wide Web Consortium (W3C)
-
L. Cranor, B. Dobbs, S. Egelman, G. Hogben, and J. Humphrey The platform for privacy preferences 1.1 specification November 2006 W3C Working Group Note, World Wide Web Consortium (W3C) http://www.w3.org/TR/P3P11/
-
(2006)
The Platform for Privacy Preferences 1.1 Specification
-
-
Cranor, L.1
Dobbs, B.2
Egelman, S.3
Hogben, G.4
Humphrey, J.5
-
13
-
-
0346271799
-
Beyond the five-user assumption: Benefits of increased sample sizes in usability testing
-
L. Faulkner Beyond the five-user assumption: benefits of increased sample sizes in usability testing Behavior Research Methods, Instruments and Computers 35 3 2003 379 383
-
(2003)
Behavior Research Methods, Instruments and Computers
, vol.35
, Issue.3
, pp. 379-383
-
-
Faulkner, L.1
-
15
-
-
0035034830
-
What makes web sites credible?: A report on a large quantitative study
-
ACM New York, NY, USA
-
B.J. Fogg, J. Marshall, O. Laraki, A. Osipovich, C. Varma, and N. Fang What makes web sites credible?: a report on a large quantitative study Proceedings of the SIGCHI conference on human factors in computing systems (CHI '01) 2001 ACM New York, NY, USA 61 68
-
(2001)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '01)
, pp. 61-68
-
-
Fogg, B.J.1
Marshall, J.2
Laraki, O.3
Osipovich, A.4
Varma, C.5
Fang, N.6
-
17
-
-
0030644696
-
Brewer, privacy-enhancing technologies for the internet
-
IEEE Computer Society Washington, DC, USA
-
D. Goldberg, and E. Wagner Brewer, privacy-enhancing technologies for the internet Proceedings of the 42nd IEEE international computer conference (COMPCON '97) 1997 IEEE Computer Society Washington, DC, USA 103 109
-
(1997)
Proceedings of the 42nd IEEE International Computer Conference (COMPCON '97)
, pp. 103-109
-
-
Goldberg, D.1
Wagner, E.2
-
18
-
-
0141783371
-
-
2nd ed. W3C Recommendation, World Wide Web Consortium (W3C)
-
M. Gudgin, M. Hadley, N. Mendelsohn, J.-J. Moreau, H.F. Nielsen, and A. Karmarkar SOAP version 1.2 part 1: messaging framework 2nd ed. April 2007 W3C Recommendation, World Wide Web Consortium (W3C)
-
(2007)
SOAP Version 1.2 Part 1: Messaging Framework
-
-
Gudgin, M.1
Hadley, M.2
Mendelsohn, N.3
Moreau, J.-J.4
Nielsen, H.F.5
Karmarkar, A.6
-
19
-
-
10444221500
-
-
2nd ed. W3C Recommendation, World Wide Web Consortium (W3C)
-
M. Gudgin, M. Hadley, N. Mendelsohn, J.-J. Moreau, H.F. Nielsen, and A. Karmarkar SOAP version 1.2 part 2: adjuncts 2nd ed. April 2007 W3C Recommendation, World Wide Web Consortium (W3C)
-
(2007)
SOAP Version 1.2 Part 2: Adjuncts
-
-
Gudgin, M.1
Hadley, M.2
Mendelsohn, N.3
Moreau, J.-J.4
Nielsen, H.F.5
Karmarkar, A.6
-
30
-
-
34548433382
-
What's wrong with online privacy policies?
-
Pollach What's wrong with online privacy policies? Communications of the ACM 50 9 2007 103 108
-
(2007)
Communications of the ACM
, vol.50
, Issue.9
, pp. 103-108
-
-
Pollach1
-
32
-
-
34249005931
-
A survey and analysis of the P3P protocol's agents, adoption, maintenance, and future
-
K. Reay, P. Beatty, S. Dick, and J. Miller A survey and analysis of the P3P protocol's agents, adoption, maintenance, and future IEEE Transactions on Dependable Secure Computing 4 2 2007 151 164
-
(2007)
IEEE Transactions on Dependable Secure Computing
, vol.4
, Issue.2
, pp. 151-164
-
-
Reay, K.1
Beatty, P.2
Dick, S.3
Miller, J.4
|