-
1
-
-
13444299293
-
Cyberstalking and internet pornography: Gender and the gaze
-
10.1023/A:1019967504762
-
A. Adam Cyberstalking and internet pornography: gender and the gaze Ethics and Information Technology 4 2 2002 133 142 10.1023/A:1019967504762
-
(2002)
Ethics and Information Technology
, vol.4
, Issue.2
, pp. 133-142
-
-
Adam, A.1
-
3
-
-
0038703557
-
"Why Doesn't She Just Leave?" A descriptive study of victim reported impediments to her safety
-
M.A. Anderson, P.M. Gillig, M. Sitaker, K. McCloskey, K. Malloy, and N. Grigsby "Why Doesn't She Just Leave?" A descriptive study of victim reported impediments to her safety Journal of family violence 18 3 2003 151 155
-
(2003)
Journal of Family Violence
, vol.18
, Issue.3
, pp. 151-155
-
-
Anderson, M.A.1
Gillig, P.M.2
Sitaker, M.3
McCloskey, K.4
Malloy, K.5
Grigsby, N.6
-
4
-
-
0003251626
-
A pragmatic view of thematic analysis
-
J. Aronson A pragmatic view of thematic analysis The Qualitative Report 2 1 1994 1 3
-
(1994)
The Qualitative Report
, vol.2
, Issue.1
, pp. 1-3
-
-
Aronson, J.1
-
6
-
-
2342484676
-
Location-based services for mobile telephony: A study of users' privacy concerns
-
Barkhuus, L., Dey, A., 2003. Location-based services for mobile telephony: a study of users' privacy concerns. In: Proc. Interact, vol. 2003, pp. 709-712.
-
(2003)
Proc. Interact
, vol.2003
, pp. 709-712
-
-
Barkhuus, L.1
Dey, A.2
-
11
-
-
77956252170
-
Facebook privacy settings: Who cares?
-
D. boyd, and E. Hargittai Facebook privacy settings: Who cares? First Monday 15 8-2 2010
-
(2010)
First Monday
, vol.15
, Issue.82
-
-
Boyd, D.1
Hargittai, E.2
-
12
-
-
0348054414
-
Fifty obstacles to leaving, aka, Why abuse victims stay
-
S.M. Buel Fifty obstacles to leaving, aka, Why abuse victims stay Colorado Lawyer 28 10/19 1999
-
(1999)
Colorado Lawyer
, vol.28
, Issue.10-19
-
-
Buel, S.M.1
-
13
-
-
61349084302
-
Cyber civil rights
-
D.K. Citron Cyber civil rights BUL Review 89 2009 61
-
(2009)
BUL Review
, vol.89
, pp. 61
-
-
Citron, D.K.1
-
14
-
-
84864431942
-
-
CTIA (Retrieved 09.02.10)
-
CTIA, 2009. Wireless Quick Facts. < http://www.ctia.org/media/ industry-info/index.cfm/AID/10323 > (Retrieved 09.02.10).
-
(2009)
Wireless Quick Facts
-
-
-
15
-
-
0036388943
-
Socioeconomic predictors of intimate partner violence among white, black, and Hispanic couples in the United States
-
C. Cunradi, R. Caetano, and J. Schafer Socioeconomic predictors of intimate partner violence among white, black, and Hispanic couples in the United States Journal of Family Violence 17 4 2002
-
(2002)
Journal of Family Violence
, vol.17
, Issue.4
-
-
Cunradi, C.1
Caetano, R.2
Schafer, J.3
-
16
-
-
0013171554
-
-
High noon on the electronic frontier: conceptual issues in cyberspace
-
Dibbell, J., 1996. A rape in cyberspace; or how an evil clown, a Haitian trickster spirit, two wizards, and a cast of dozens turned a database into a society. High noon on the electronic frontier: conceptual issues in cyberspace, 375-339.
-
(1996)
A Rape in Cyberspace; or How An Evil Clown, A Haitian Trickster Spirit, Two Wizards, and A Cast of Dozens Turned A Database into A Society
, pp. 375-339
-
-
Dibbell, J.1
-
18
-
-
80255124240
-
-
Sociable Media
-
Donath, J., 2004. Sociable Media.
-
(2004)
-
-
Donath, J.1
-
20
-
-
84900482702
-
Security in the wild: User strategies for managing security as an everyday, practical problem
-
P. Dourish, R.E. Grinter, J. Delgado de la Flor, and M. Joseph Security in the wild: user strategies for managing security as an everyday, practical problem Personal and Ubiquitous Computing 8 6 2004 391 401
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 391-401
-
-
Dourish, P.1
Grinter, R.E.2
Delgado De La Flor, J.3
Joseph, M.4
-
21
-
-
80255128223
-
Please Rob Me: Site Shows Dangers of Foursquare, Twitter
-
Fletcher, D., 2010. Please Rob Me: Site Shows Dangers of Foursquare, Twitter. Time Magazine. < http://www.time.com/time/business/article/0,8599, 1964873,00.html >.
-
(2010)
Time Magazine
-
-
Fletcher, D.1
-
22
-
-
80255124237
-
-
The Politics of Reality: Essays in Feminist Theory The Crossing Press
-
M. Frye Oppression The Politics of Reality: Essays in Feminist Theory 1983 The Crossing Press
-
(1983)
Oppression
-
-
Frye, M.1
-
23
-
-
80255124238
-
-
Fugitivus (Retrieved 28.03.10)
-
Fugitivus., 2010. Fuck You, Google. < http://fugitivus.wordpress.com/ 2010/02/11/fuck-you-google/ > (Retrieved 28.03.10).
-
(2010)
Fuck You, Google
-
-
-
24
-
-
0034110307
-
Feminist participatory action research: Methodological and ethical issues
-
DOI 10.1016/S0277-5395(99)00095-3, PII S0277539599000953
-
B. Gatenby, and M. Humphries Feminist participatory action research: methodological and ethical issues Women's Studies International Forum 23 1 2000 89 105 (Pubitemid 30242254)
-
(2000)
Women's Studies International Forum
, vol.23
, Issue.1
, pp. 89-105
-
-
Gatenby, B.1
Humphries, M.2
-
26
-
-
84936628244
-
Situated knowledges: The science question in feminism and the privilege of partial perspective
-
D. Haraway Situated knowledges: the science question in feminism and the privilege of partial perspective Feminist Studies 14 3 1988 575 599
-
(1988)
Feminist Studies
, vol.14
, Issue.3
, pp. 575-599
-
-
Haraway, D.1
-
29
-
-
80255124231
-
Of legal rights and moral wrongs: A case study of internet defamation
-
B. Heller Of legal rights and moral wrongs: a case study of internet defamation Yale JL & Feminism 19 2007 279
-
(2007)
Yale JL & Feminism
, vol.19
, pp. 279
-
-
Heller, B.1
-
31
-
-
0034311375
-
Research on domestic violence in the 1990s: Making distinctions
-
M.P. Johnson, and K.J. Ferraro Research on domestic violence in the 1990s: making distinctions Journal of Marriage and the Family 62 4 2000 948 963
-
(2000)
Journal of Marriage and the Family
, vol.62
, Issue.4
, pp. 948-963
-
-
Johnson, M.P.1
Ferraro, K.J.2
-
32
-
-
80255128244
-
Cultivating Violence Through Technology? Exploring the Connections between Violence Against Women and ICTs
-
(Retrieved 09.02.10)
-
Kee, J.S.M., 2005. Cultivating Violence Through Technology? Exploring the Connections Between Violence Against Women and ICTs. Take Back the Tech. < http://www.takebackthetech.net/page/more-resources > (Retrieved 09.02.10).
-
(2005)
Take Back the Tech
-
-
Kee, J.S.M.1
-
35
-
-
79953324861
-
-
Pew Internet & American Life Project
-
Lenhart, A., 2007. Cyberbullying. Pew Internet & American Life Project.
-
(2007)
Cyberbullying
-
-
Lenhart, A.1
-
36
-
-
77954832802
-
-
Pew internet & American Life Project
-
Lenhart, A., 2009. Teens and Sexting. Pew internet & American Life Project.
-
(2009)
Teens and Sexting
-
-
Lenhart, A.1
-
37
-
-
56649104920
-
The taste for privacy: An analysis of college student privacy settings in an online social network
-
K. Lewis, J. Kaufman, and N. Christakis The taste for privacy: an analysis of college student privacy settings in an online social network Journal of Computer-Mediated Communication 14 1 2008 79 100
-
(2008)
Journal of Computer-Mediated Communication
, vol.14
, Issue.1
, pp. 79-100
-
-
Lewis, K.1
Kaufman, J.2
Christakis, N.3
-
38
-
-
33846847744
-
New bottle but old wine: A research of cyberbullying in schools
-
DOI 10.1016/j.chb.2005.10.005, PII S0747563205000889
-
Q. Li New bottle but old wine: a research of cyberbullying in schools Computers in Human Behavior 23 4 2007 1777 1791 10.1016/j.chb.2005.10.005 (Pubitemid 46201669)
-
(2007)
Computers in Human Behavior
, vol.23
, Issue.4
, pp. 1777-1791
-
-
Li, Q.1
-
40
-
-
77954009962
-
A Death in the Family: Opportunities for Designing Technologies for the Bereaved
-
Georgia, USA, ACM
-
Massimi, M., Baecker, R.M., 2010. A Death in the Family: Opportunities for Designing Technologies for the Bereaved. In: CHI Atlanta, Georgia, USA, ACM, pp. 1821-1830. < http://portal.acm.org.www.library.gatech.edu:2048/citation. cfm?id=1753326.1753600&coll=portal&dl=ACM&type=series&idx= SERIES260&part=series&WantType=Proceedings&title=CHI&CFID= 90794832&CFTOKEN=74530090 >.
-
(2010)
CHI Atlanta
, pp. 1821-1830
-
-
Massimi, M.1
Baecker, R.M.2
-
41
-
-
80255124904
-
-
Nielsen Company (Retrieved 22.02.10)
-
Nielsen Company, 2008. Nielson Mobile Survey. < http://blog.nielsen. com/nielsenwire/online-mobile/in-us-text-messaging-tops-mobile-phone-calling/ > (Retrieved 22.02.10).
-
(2008)
Nielson Mobile Survey
-
-
-
42
-
-
0038037379
-
Unpacking "privacy" for a networked world
-
Ft. Lauderdale, Florida, USA: ACM
-
Palen, L., Dourish, P., 2003. Unpacking "privacy" for a networked world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Ft. Lauderdale, Florida, USA: ACM, pp. 129-136.
-
(2003)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 129-136
-
-
Palen, L.1
Dourish, P.2
-
43
-
-
84946709496
-
-
Pogue's Blog - Nytimes.com. (Retrieved 28.03.10)
-
Pogue, D., 2008. How to Block Cellphone Spam. Pogue's Blog - Nytimes.com. < http://pogue.blogs.nytimes.com/2008/06/12/how-to-block-cellphone-spam/ > (Retrieved 28.03.10).
-
(2008)
How to Block Cellphone Spam
-
-
Pogue, D.1
-
44
-
-
77950871827
-
The roles that make the domestic work
-
Savannah, Georgia, USA, ACM
-
Rode, J.A., 2010. The roles that make the domestic work. In: Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work. Savannah, Georgia, USA, ACM, pp. 381-390.
-
(2010)
Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work
, pp. 381-390
-
-
Rode, J.A.1
-
47
-
-
36949014093
-
Is cyberstalking different?
-
10.1080/10683160701340528
-
L.P. Sheridan, and T. Grant Is cyberstalking different? Psychology, Crime & Law 13 6 2007 627 10.1080/10683160701340528
-
(2007)
Psychology, Crime & Law
, vol.13
, Issue.6
, pp. 627
-
-
Sheridan, L.P.1
Grant, T.2
-
48
-
-
70450202398
-
The commodification of location: Dynamics of power in location-based systems
-
Shklovski, I., Vertesi, J., Troshynski, E., & Dourish, P. (2009). The commodification of location: dynamics of power in location-based systems. In: Proceedings of the 11th International Conference on Ubiquitous Computing, pp. 11-20.
-
(2009)
Proceedings of the 11th International Conference on Ubiquitous Computing
, pp. 11-20
-
-
Shklovski, I.1
Vertesi, J.2
Troshynski, E.3
Dourish, P.4
-
53
-
-
0036116614
-
Cyberstalking and the technologies of interpersonal terrorism
-
B.H. Spitzberg, and G. Hoobler Cyberstalking and the technologies of interpersonal terrorism New Media & Society 4 1 2002 71
-
(2002)
New Media & Society
, vol.4
, Issue.1
, pp. 71
-
-
Spitzberg, B.H.1
Hoobler, G.2
-
54
-
-
0003551642
-
-
Washington (DC), Department of Justice (US) Publication No. NCJ 181867. < >
-
Tjaden, P., Thoennes, N., 2000. Extent, Nature, and Consequences of Intimate Partner Violence: Findings from the National Violence Against Women Survey. Washington (DC), Department of Justice (US) Publication No. NCJ 181867. < www.ojp.usdoj.gov/nij/pubs-sum/181867.htm >.
-
(2000)
Extent, Nature, and Consequences of Intimate Partner Violence: Findings from the National Violence Against Women Survey
-
-
Tjaden, P.1
Thoennes, N.2
-
55
-
-
0034468387
-
A Review of research on welfare and domestic violence
-
R.M. Tolman, and J. Raphael A review of research on welfare and domestic violence Journal of Social Issues 56 4 2000 655 682 10.1111/0022-4537.00190 (Pubitemid 32177200)
-
(2000)
Journal of Social Issues
, vol.56
, Issue.4
, pp. 655-682
-
-
Tolman, R.M.1
Raphael, J.2
-
56
-
-
0003090109
-
Psychology and domestic violence around the world
-
L.E. Walker Psychology and domestic violence around the world American Psychologist 54 1999 21 29
-
(1999)
American Psychologist
, vol.54
, pp. 21-29
-
-
Walker, L.E.1
-
59
-
-
80255124234
-
-
New Phone Apps Aim to Combat Harassment - NYTimes.com. The New York Times
-
Zraick, K., 2010. New Phone Apps Aim to Combat Harassment - NYTimes.com. The New York Times. < http://www.nytimes.com/2010/11/08/nyregion/08hollaback. html >.
-
(2010)
-
-
Zraick, K.1
|