-
1
-
-
43849110257
-
Influence of gender, program of study and PC experience on unethical computer using behaviors of Turkish undergraduate students
-
Akbulut, Y., Uysal, O., Odabasi, H. F. Kuzu, A. (2008). Influence of gender, program of study and PC experience on unethical computer using behaviors of Turkish undergraduate students. Computers & Education, 51, 2, 485 492.
-
(2008)
Computers & Education
, vol.51
, Issue.2
, pp. 485-492
-
-
Akbulut, Y.1
Uysal, O.2
Odabasi, H.F.3
Kuzu, A.4
-
3
-
-
36949013490
-
A blended-learning pedagogical model for teaching and learning EFL successfully through an online interactive multimedia environment
-
Banados, E. (2006). A blended-learning pedagogical model for teaching and learning EFL successfully through an online interactive multimedia environment. CALICO Journal, 23, 3, 533 550.
-
(2006)
CALICO Journal
, vol.23
, Issue.3
, pp. 533-550
-
-
Banados, E.1
-
4
-
-
9944260288
-
What price privacy?
-
Brandt, J. R. (1998). What price privacy? Industry Week, 9, 4.
-
(1998)
Industry Week
, vol.9
, pp. 4
-
-
Brandt, J.R.1
-
5
-
-
0034399178
-
Consumer online privacy: Legal and ethical issues
-
Caudill, E. Murphy, P. (2000). Consumer online privacy: legal and ethical issues. Journal of Public Policy and Marketing, 19, 1, 7 19.
-
(2000)
Journal of Public Policy and Marketing
, vol.19
, Issue.1
, pp. 7-19
-
-
Caudill, E.1
Murphy, P.2
-
6
-
-
34748927053
-
Using a two-tier test to assess students' understanding and alternative conceptions of cyber copyright laws
-
Chou, C., Chan, P. S. Wu, H. C. (2007). Using a two-tier test to assess students' understanding and alternative conceptions of cyber copyright laws. British Journal of Educational Technology, 38, 6, 1072 1084.
-
(2007)
British Journal of Educational Technology
, vol.38
, Issue.6
, pp. 1072-1084
-
-
Chou, C.1
Chan, P.S.2
Wu, H.C.3
-
7
-
-
77049108941
-
Personal rights management - Taming camera-phones for individual privacy enforcement
-
Deng, M., Fritsch, L. Kursawc, K. (2006). Personal rights management - taming camera-phones for individual privacy enforcement. Proceedings of the 6th Workshop on Privacy Enhancing Technologies, 4258, 172 189.
-
(2006)
Proceedings of the 6th Workshop on Privacy Enhancing Technologies
, vol.4258
, pp. 172-189
-
-
Deng, M.1
Fritsch, L.2
Kursawc, K.3
-
8
-
-
50249173439
-
Internet users' privacy concerns and attitudes towards government surveillance - An empirical investigation
-
Dinev, T., Hart, P. Mullen, M. (2008). Internet users' privacy concerns and attitudes towards government surveillance - an empirical investigation. The Journal of Strategic Information Systems, 17, 3, 214 233.
-
(2008)
The Journal of Strategic Information Systems
, vol.17
, Issue.3
, pp. 214-233
-
-
Dinev, T.1
Hart, P.2
Mullen, M.3
-
9
-
-
85001818197
-
Privacy and security in e-learning
-
El-Khatib, K., Korba, L. Yee, G. (2003). Privacy and security in e-learning. Journal of Distance Education, 1, 4, 1 16.
-
(2003)
Journal of Distance Education
, vol.1
, Issue.4
, pp. 1-16
-
-
El-Khatib, K.1
Korba, L.2
Yee, G.3
-
10
-
-
77955765773
-
-
Electronic Privacy Information Center. Retrieved July 25, 2008, from
-
Electronic Privacy Information Center (2002). Public opinion on privacy. Retrieved July 25, 2008, from http://www.epic.org//privacy/survey/default.html
-
(2002)
-
-
-
12
-
-
41549086896
-
Copyright and multimedia classroom material: A study from Japan
-
Heffernan, N. Wang, S. (2008). Copyright and multimedia classroom material: a study from Japan. Computer Assisted Language Learning, 21, 2, 167 180.
-
(2008)
Computer Assisted Language Learning
, vol.21
, Issue.2
, pp. 167-180
-
-
Heffernan, N.1
Wang, S.2
-
13
-
-
43549107156
-
An integrated framework for CALL courseware evaluation
-
Hubbard, P. (1988). An integrated framework for CALL courseware evaluation. CALICO Journal, 6, 2, 51 72.
-
(1988)
CALICO Journal
, vol.6
, Issue.2
, pp. 51-72
-
-
Hubbard, P.1
-
14
-
-
45649083441
-
No mobile, no life: Self-perception and text message dependency among Japanese high school students
-
Igarashi, T., Motoyoshi, T., Takai, J. Yoshida, T. (2008). No mobile, no life: self-perception and text message dependency among Japanese high school students. Computers in Human Behavior, 24, 2311 2324.
-
(2008)
Computers in Human Behavior
, vol.24
, pp. 2311-2324
-
-
Igarashi, T.1
Motoyoshi, T.2
Takai, J.3
Yoshida, T.4
-
15
-
-
84937268216
-
Privacy and the computer: Why we need privacy in the information society
-
Introna, L. (1997). Privacy and the computer: why we need privacy in the information society. Metaphilosophy, 28, 3, 259 274.
-
(1997)
Metaphilosophy
, vol.28
, Issue.3
, pp. 259-274
-
-
Introna, L.1
-
16
-
-
18844457077
-
Privacy provision in e-learning standardized systems: Status and improvements
-
Jerman-Blazic, B. Klobucar, T. (2004). Privacy provision in e-learning standardized systems: status and improvements. Computer Standards & Interfaces, 27, 6, 561 578.
-
(2004)
Computer Standards & Interfaces
, vol.27
, Issue.6
, pp. 561-578
-
-
Jerman-Blazic, B.1
Klobucar, T.2
-
17
-
-
0001992084
-
What are cognitive tools?
-
P. A. M. Kommers. D. Johassen. J. T. Mayes. Eds. Berlin, Germany. Springer Verlag.
-
Jonassen, D. (1992). What are cognitive tools? In P. A. M. Kommers, D. Johassen J. T. Mayes (Eds Cognitive tools for learning (pp. 1 6). Berlin, Germany : Springer Verlag.
-
(1992)
Cognitive Tools for Learning
, pp. 1-6
-
-
Jonassen, D.1
-
19
-
-
0039284989
-
Theory and practice of network-based language teaching
-
M. Warschauer. R. Kern. Eds. NY, NY. Cambridge University Press.
-
Kern, R. Warschauer, M. (2000). Theory and practice of network-based language teaching. In M. Warschauer R. Kern (Eds Network-based language teaching: concepts and practice (pp. 1 19). NY, NY : Cambridge University Press.
-
(2000)
Network-based Language Teaching: Concepts and Practice
, pp. 1-19
-
-
Kern, R.1
Warschauer, M.2
-
20
-
-
77955747528
-
-
Tokyo. Civil Law Research Association.
-
Kimura, T., Komatsu, Y., Shimagawa, S., Shirahase, F. Sekine, M. (2005). Nerawareru! Kojinyohou privacy higaikyousai no houritsu to jitsu [Personal data, privacy and their violation: law support and cases]. Tokyo : Civil Law Research Association.
-
(2005)
Nerawareru! Kojinyohou Privacy Higaikyousai No Houritsu to Jitsu [personal Data, Privacy and Their Violation: Law Support and Cases].
-
-
Kimura, T.1
Komatsu, Y.2
Shimagawa, S.3
Shirahase, F.4
Sekine, M.5
-
21
-
-
84993660913
-
Privacy as a concept and a social issue: A multidimensional developmental theory
-
Laufer, R. S. Wolfe, M. (1977). Privacy as a concept and a social issue: a multidimensional developmental theory. The Journal of Social Issues, 33, 3, 22 42.
-
(1977)
The Journal of Social Issues
, vol.33
, Issue.3
, pp. 22-42
-
-
Laufer, R.S.1
Wolfe, M.2
-
23
-
-
84905617435
-
Learning Italian via mobile SMS
-
A. Kukulska-Hulme. J. Traxler. Eds. London. Taylor & Francis.
-
Levy, M. Kennedy, C. (2005). Learning Italian via mobile SMS. In A. Kukulska-Hulme J. Traxler (Eds Mobile learning: a handbook for educators and trainers (pp. 76 83). London : Taylor & Francis.
-
(2005)
Mobile Learning: A Handbook for Educators and Trainers
, pp. 76-83
-
-
Levy, M.1
Kennedy, C.2
-
25
-
-
64449083280
-
Elementary quantitative methods
-
B. Somekh. C. Lewin. Eds. London. Sage Publications.
-
Lewin, C. (2005). Elementary quantitative methods. In B. Somekh C. Lewin (Eds Research methods in the social sciences (pp. 215 225). London : Sage Publications.
-
(2005)
Research Methods in the Social Sciences
, pp. 215-225
-
-
Lewin, C.1
-
26
-
-
0038127084
-
Privacy as a social issue and behavioral concept
-
Margulis, S. T. (2003). Privacy as a social issue and behavioral concept. The Journal of Social Issues, 59, 2, 243 261.
-
(2003)
The Journal of Social Issues
, vol.59
, Issue.2
, pp. 243-261
-
-
Margulis, S.T.1
-
27
-
-
0348059824
-
Information technology, privacy, and the public good
-
McCrohan, K. F. (1989). Information technology, privacy, and the public good. Journal of Public Policy and Marketing, 8, 1, 265 278.
-
(1989)
Journal of Public Policy and Marketing
, vol.8
, Issue.1
, pp. 265-278
-
-
McCrohan, K.F.1
-
28
-
-
41549144480
-
Law and HCI
-
W. Bainbridge. Ed. Great Barrington, MA. Berkshire.
-
Miller, S. (2004). Law and HCI. In W. Bainbridge (Ed. Berkshire Encyclopedia of Human-Computer Interaction Vol. 1 (pp. 413 420). Great Barrington, MA : Berkshire.
-
(2004)
Berkshire Encyclopedia of Human-Computer Interaction
, vol.1
, pp. 413-420
-
-
Miller, S.1
-
29
-
-
0032282474
-
Protecting privacy in an information age
-
Nissenbaum, H. (1998). Protecting privacy in an information age. Law and Philosophy, 17, 559 596.
-
(1998)
Law and Philosophy
, vol.17
, pp. 559-596
-
-
Nissenbaum, H.1
-
30
-
-
0034394385
-
Privacy concerns and consumer willingness to provide personal information
-
Phelps, J., Nowak, G. Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Marketing, 19, 1, 27 44.
-
(2000)
Journal of Public Marketing
, vol.19
, Issue.1
, pp. 27-44
-
-
Phelps, J.1
Nowak, G.2
Ferrell, E.3
-
31
-
-
0036466616
-
The ethical attitudes of information systems professionals: Outcomes of an initial survey
-
Prior, M., Rogerson, S. Fairweather, B. (2002). The ethical attitudes of information systems professionals: outcomes of an initial survey. Telematics and Informatics, 19, 21 36.
-
(2002)
Telematics and Informatics
, vol.19
, pp. 21-36
-
-
Prior, M.1
Rogerson, S.2
Fairweather, B.3
-
34
-
-
77955742940
-
-
The Cabinet Office, Government of Japan. Retrieved November 8, 2008, from
-
The Cabinet Office, Government of Japan (2005). Act on the protection of personal information. Retrieved November 8, 2008, from http://www5.cao.go.jp/ seikatsu/kojin/foreign/act.pdf
-
(2005)
-
-
-
35
-
-
2942518136
-
The relationship between social presence and online privacy
-
Tu, C. (2002). The relationship between social presence and online privacy. The Internet and Higher Education, 5, 293 318.
-
(2002)
The Internet and Higher Education
, vol.5
, pp. 293-318
-
-
Tu, C.1
-
36
-
-
0037540958
-
On-line learning in second language classrooms
-
M. Warschauer. R. Kern. Eds. Cambridge. Cambridge University Press.
-
Warschauer, M. (2000). On-line learning in second language classrooms. In M. Warschauer R. Kern (Eds Network-based language teaching: concepts and practice (pp. 41 58). Cambridge : Cambridge University Press.
-
(2000)
Network-based Language Teaching: Concepts and Practice
, pp. 41-58
-
-
Warschauer, M.1
-
39
-
-
0029478196
-
Managing user perception of email privacy
-
Weisband, S. Reinig, B. A. (1995). Managing user perception of email privacy. Communications of the ACM, 38, 12, 40 47.
-
(1995)
Communications of the ACM
, vol.38
, Issue.12
, pp. 40-47
-
-
Weisband, S.1
Reinig, B.A.2
|