-
1
-
-
0033022931
-
Why, why, why?: Reason-giving and rumination as predictors of response to activation-And insight-oriented treatment rationales
-
DOI 10.1002/(SICI)1097-4679(199907)55:7 <881::AID-JCLP9>3.0.CO;2-E
-
Addis, M.E. and Carpenter, K.M., 1999. Why, why, why?: Reason-giving and rumination as predictors of response to activation and insight-oriented treatment rationales. Journal of Clinical Psychology, 55 (7), 881-894. (Pubitemid 29318739)
-
(1999)
Journal of Clinical Psychology
, vol.55
, Issue.7
, pp. 881-894
-
-
Addis, M.E.1
Carpenter, K.M.2
-
2
-
-
42449119809
-
Dredging-up -The past: Lifelogging, memory and surveillance
-
Allen, A.L., 2007. Dredging-up -The past: lifelogging, memory and surveillance. -The University of Chicago Law Review, 75 (1), 47-74.
-
(2007)
-The University of Chicago Law Review
, vol.75
, Issue.1
, pp. 47-74
-
-
Allen, A.L.1
-
3
-
-
0036042175
-
Models and issues in data stream systems
-
Babcock, B., et al., 2002. Models and issues in data stream systems. In: PODS '02: Proceedings of -The twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, New York: ACM, 1-16. (Pubitemid 35017047)
-
(2002)
Proceedings of -The ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 1-16
-
-
Babcock, B.1
Babu, S.2
Datar, M.3
Motwani, R.4
Widom, J.5
-
4
-
-
0037402597
-
Modelling global risk factors affecting construction cost performance
-
DOI 10.1016/S0263-7863(02)00017-0
-
Baloi, D. and Price, A.D.F., 2003. Modeling global risk factors affecting construction cost performance. International Journal of Project Management, 21 (4), 261-269. (Pubitemid 36386768)
-
(2003)
International Journal of Project Management
, vol.21
, Issue.4
, pp. 261-269
-
-
Baloi, D.1
Price, A.D.F.2
-
7
-
-
37249053884
-
Social network sites: Definition, history, and scholarship
-
Boyd, D.M. and Ellison, N.B., 2007. Social network sites: definition, history, and scholarship. Journal of Computer-Mediated Communication, 13 (1), 210-230.
-
(2007)
Journal of Computer-Mediated Communication
, vol.13
, Issue.1
, pp. 210-230
-
-
Boyd, D.M.1
Ellison, N.B.2
-
8
-
-
36349019854
-
The future of social networks on -The internet: The need for semantics
-
DOI 10.1109/MIC.2007.138
-
Breslin, J. and Decker, S., 2007. -The future of social networks on -The internet: The need for semantics. IEEE Internet Computing, 11 (6), 86-90. (Pubitemid 350148370)
-
(2007)
IEEE Internet Computing
, vol.11
, Issue.6
, pp. 86-90
-
-
Breslin, J.1
Decker, S.2
-
9
-
-
0004341953
-
-
Available from Accessed 10 October 2010
-
Bush, V., 1945. As we may think. -The Atlantic. Available from: http://www.-Theatlantic.com/magazine/archive/1969/12/as-we-may-think/3881 [Accessed 10 October 2010].
-
(1945)
As We May Think. -The Atlantic
-
-
Bush, V.1
-
10
-
-
35649004081
-
On -The record, all -The time
-
Available from [Accessed 10 October 2010]
-
Carlson, S., 2007. On -The record, all -The time. Chronicle of Higher Education. Available from: http://chronicle.com/article/On-The-Record-All-The- Time/10391 [Accessed 10 October 2010].
-
(2007)
Chronicle of Higher Education
-
-
Carlson, S.1
-
11
-
-
75449098907
-
Internet predications, fighting over -The future of internet
-
Clark, D., 2010. Internet predications, fighting over -The future of internet. IEEE Internet Computing, 14 (1), 22-23.
-
(2010)
IEEE Internet Computing
, vol.14
, Issue.1
, pp. 22-23
-
-
Clark, D.1
-
12
-
-
13544267080
-
-
-Thesis PhD. Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology
-
Clarkson, B.P., 2002. Life patterns: structure from wearable sensors. -Thesis (PhD). Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology.
-
(2002)
Life Patterns: Structure from Wearable Sensors
-
-
Clarkson, B.P.1
-
13
-
-
0028092583
-
How good is good enough? An ethical analysis of software construction and use
-
Collins, W.R., et al., 1994. How good is good enough? An ethical analysis of software construction and use. Communication of ACM, 27 (1), 81-91.
-
(1994)
Communication of ACM
, vol.27
, Issue.1
, pp. 81-91
-
-
Collins, W.R.1
-
14
-
-
84255206964
-
Directive 2006/24/EC of -The European parliament and of -The council
-
Directive 2006/24/EC OJ L
-
Directive 2006/24/EC, 2006. Directive 2006/24/EC of -The European parliament and of -The council. Official Journal of European Union, OJ L 105, 54-63.
-
(2006)
Official Journal of European Union
, vol.105
, pp. 54-63
-
-
-
15
-
-
34250329971
-
'Outlines of a world coming into existence': Pervasive computing and -The ethics of forgetting
-
DOI 10.1068/b32041t
-
Dodge, M. and Kitchin, R., 2007. 'Outlines of a world coming into existence': pervasive computing and -The ethics of forgetting. Environment and Planning B: Planning and Design, 34 (3), 431-445. (Pubitemid 46916182)
-
(2007)
Environment and Planning B: Planning and Design
, vol.34
, Issue.3
, pp. 431-445
-
-
Dodge, M.1
Kitchin, R.2
-
16
-
-
84874892993
-
Behavioral inference across cultures: Using telephones as a cultural lens
-
Eagle, N., 2008. Behavioral inference across cultures: using telephones as a cultural lens. IEEE Intelligent Systems, 23 (4), 62-64.
-
(2008)
IEEE Intelligent Systems
, vol.23
, Issue.4
, pp. 62-64
-
-
Eagle, N.1
-
17
-
-
19944388571
-
Social serendipity: Mobilizing social software
-
DOI 10.1109/MPRV.2005.37
-
Eagle, N. and Pentland, A., 2005. Social serendipity: mobilizing social software. IEEE Pervasive Computing, 4 (2), 28-34. (Pubitemid 40750808)
-
(2005)
IEEE Pervasive Computing
, vol.4
, Issue.2
, pp. 28-34
-
-
Eagle, N.1
Pentland, A.2
-
18
-
-
33645311516
-
Reality mining: Sensing complex social systems
-
Eagle, N. and Pentland, A., 2006. Reality mining: sensing complex social systems. Personal and Ubiquitous Computing, 10 (4), 255-268.
-
(2006)
Personal and Ubiquitous Computing
, vol.10
, Issue.4
, pp. 255-268
-
-
Eagle, N.1
Pentland, A.2
-
20
-
-
84870762672
-
-
FCC [online]. Available from [Accessed 10 October 2009]
-
FCC, 2005. CALEA [online]. Available from: http://www.fcc. gov/calea [Accessed 10 October 2009].
-
(2005)
CALEA
-
-
-
23
-
-
0001601662
-
Privacy: A moral analysis
-
Fried, C., 1968. Privacy: a moral analysis. Yale Law Journal, 77 (1), 475-493.
-
(1968)
Yale Law Journal
, vol.77
, Issue.1
, pp. 475-493
-
-
Fried, C.1
-
25
-
-
0028447930
-
Data modeling of time-based media
-
New York: ACM
-
Gibbs, S., Breiteneder, C., and Tsichritzis, D., 1994. Data modeling of time-based media. SIGMOD '94: Proceedings of -The 1994 ACM SIGMOD international conference on Management of data, New York: ACM, 91-102.
-
(1994)
SIGMOD '94: Proceedings of -The 1994. ACM SIGMOD International Conference on Management of Data
, pp. 91-102
-
-
Gibbs, S.1
Breiteneder, C.2
Tsichritzis, D.3
-
26
-
-
33749016498
-
Information revelation and privacy in online social networks
-
WPES'05: Proceedings of -The 2005 ACM Workshop on Privacy in -The Electronic Society
-
Gross, R., Acquisti, A., and Heinz, H.J., 2005. Information revelation and privacy in online social networks. WPES '05: Proceedings of -The 2005 ACM workshop on Privacy in -The electronic society, New York: ACM, 71-80. (Pubitemid 44447420)
-
(2005)
WPES'05: Proceedings of -The 2005 ACM Workshop on Privacy in -The Electronic Society
, pp. 71-80
-
-
Gross, R.1
Acquisti, A.2
Heinz III, H.J.3
-
27
-
-
84870749227
-
-
Legacy Locker [online]. Available from [Accessed 12 September 2009]
-
Legacy Locker, 2009. Legacy locker [online]. Available from: http://legacylocker.com [Accessed 12 September 2009].
-
(2009)
Legacy Locker
-
-
-
29
-
-
4644355799
-
Sousveillance: Inventing and using wearable computing devices to challenge surveillance
-
Mann, S., Nolan, J., and Wellman, B., 2003. Sousveillance: inventing and using wearable computing devices to challenge surveillance. Surveillance and Society, 1 (3), 332-355.
-
(2003)
Surveillance and Society
, vol.1
, Issue.3
, pp. 332-355
-
-
Mann, S.1
Nolan, J.2
Wellman, B.3
-
30
-
-
47649131946
-
Who are you? -The trade-off between information utility and privacy
-
Miller, J., 2008. Who are you? -The trade-off between information utility and privacy. IEEE Internet Computing, 12 (4), 93-96.
-
(2008)
IEEE Internet Computing
, vol.12
, Issue.4
, pp. 93-96
-
-
Miller, J.1
-
32
-
-
84981430537
-
What is computer ethics?
-
Moor, J.H., 1985. What is computer ethics? Metaphilosophy, 16 (4), 266-275.
-
(1985)
Metaphilosophy
, vol.16
, Issue.4
, pp. 266-275
-
-
Moor, J.H.1
-
33
-
-
33646908478
-
Why we need better ethics for emerging technologies
-
DOI 10.1007/s10676-006-0008-0, Ethics of New Information Technology Papers from CEPE 2005
-
Moor, J.H., 2005. Why we need better ethics for emerging technologies. Ethics and Information Technology, 7 (3), 111-119. (Pubitemid 43792825)
-
(2005)
Ethics and Information Technology
, vol.7
, Issue.3
, pp. 111-119
-
-
Moor, J.H.1
-
34
-
-
65349097924
-
Mobile heart health: Project highlight
-
Morris, M. and Guilak, F., 2009. Mobile heart health: project highlight. IEEE Pervasive Computing, 8 (2), 57-61.
-
(2009)
IEEE Pervasive Computing
, vol.8
, Issue.2
, pp. 57-61
-
-
Morris, M.1
Guilak, F.2
-
36
-
-
79958159107
-
Lifelogging: Privacy and empowerment with memories for life
-
O'Hara, K., Tuffield, M., and Shadbolt, N., 2009. Lifelogging: privacy and empowerment with memories for life. Identity in -The Information Society, 1 (1), 155-172.
-
(2009)
Identity in -The Information Society
, vol.1
, Issue.1
, pp. 155-172
-
-
O'Hara, K.1
Tuffield, M.2
Shadbolt, N.3
-
38
-
-
0004048289
-
-
Cambridge, Massachusetts: Harvard University Press
-
Rawls, J., 1971. A -Theory of justice. Cambridge, Massachusetts: Harvard University Press.
-
(1971)
A -Theory of Justice
-
-
Rawls, J.1
-
42
-
-
84870748801
-
-
Available from [Accessed 8 September 2009]
-
Shachtman, N., 2003. A spy machine of DARPA's dreams [online]. Available from: http://www.wired.com/print/techbiz/media/news/2003/05/58909 [Accessed 8 September 2009].
-
(2003)
A Spy Machine of DARPA's Dreams [Online]
-
-
Shachtman, N.1
-
43
-
-
25144444373
-
A social networks -Theory of privacy
-
Strahilevitz, L., 2005. A social networks -Theory of privacy. -The University of Chicago Law Review, 72, 919-988. (Pubitemid 41336912)
-
(2005)
University of Chicago Law Review
, vol.72
, Issue.3
, pp. 919-988
-
-
Strahilevitz, L.J.1
-
44
-
-
84992974053
-
Contractor project risks contingency allocation using linguistic approximation
-
Tah, J.H.M., Thorpe, A., and McCaffer, R., 1996. Contractor project risks contingency allocation using linguistic approximation. Engineering, Construction and Architectural Management, 3 (4), 251-269.
-
(1996)
Engineering, Construction and Architectural Management
, vol.3
, Issue.4
, pp. 251-269
-
-
Tah, J.H.M.1
Thorpe, A.2
McCaffer, R.3
-
45
-
-
84870740213
-
-
Time Available from [Accessed 12 September 2009]
-
Time, 2009. Tools for managing your online life after death [online]. Available from: http://www.time.com/time/specials/packages/completelist/0,29569, 1920156,00. html [Accessed 12 September 2009].
-
(2009)
Tools for Managing Your Online Life after Death [Online]
-
-
-
47
-
-
0039975712
-
Social facilitation
-
Zanoj, R.B., 1965. Social facilitation. Science, 149 (3681), 269-274.
-
(1965)
Science
, vol.149
, Issue.3681
, pp. 269-274
-
-
Zanoj, R.B.1
|