-
1
-
-
0034459145
-
The intellectual challenge of CSCW: The gap between social requirements and technical feasibility
-
Ackerman, M. S. (2000). The intellectual challenge of CSCW: The gap between social requirements and technical feasibility. Human Computer Interaction, 15, 179-203.
-
(2000)
Human Computer Interaction
, vol.15
, pp. 179-203
-
-
Ackerman, M.S.1
-
2
-
-
0033539175
-
The diameter of the World Wide Web
-
Albert, R., Jeong, H., & Barabassi, A. (1999). The diameter of the World Wide Web. Nature, 401, 130.
-
(1999)
Nature
, vol.401
, pp. 130
-
-
Albert, R.1
Jeong, H.2
Barabassi, A.3
-
3
-
-
17444429181
-
New weapon for spam: Bounty
-
April 26, Retrieved from
-
Bazeley, M. (2003, April 26). New weapon for spam: Bounty. Mercury News. Retrieved from http://www.siliconvalley.com/mld/siliconvalley/5725404.htm
-
(2003)
Mercury News
-
-
Bazeley, M.1
-
4
-
-
84898372797
-
Spam to cost U.S. companies $10 billion in 2003
-
October 14, Retrieved from
-
Bekker, S. (2003, October 14). Spam to cost U.S. companies $10 billion in 2003. ENTNews. Retrieved from http://www.entmag.com/news/article.asp?EditorialsID=5651
-
(2003)
ENTNews
-
-
Bekker, S.1
-
5
-
-
68349099945
-
Can e-mail be saved?
-
April 19
-
Boutin, P. (2004, April 19). Can e-mail be saved? Infoworld, pp. 41-53.
-
(2004)
Infoworld
, pp. 41-53
-
-
Boutin, P.1
-
6
-
-
0032131717
-
Spam!
-
Cranor, L. F., & LaMacchia, B. A. (1998). Spam! Communications of the ACM, 41(8), 74-83.
-
(1998)
Communications of the ACM
, vol.41
, Issue.8
, pp. 74-83
-
-
Cranor, L.F.1
Lamacchia, B.A.2
-
11
-
-
84898167194
-
Meeting takes aim at spam
-
January 27, Retrived from
-
Emery, T. (2003, January 27). Meeting takes aim at spam. The Beacon Journal. Retrived from http://www.ohio.com/mld/beaconjournal/business/5028845.htm
-
(2003)
The Beacon Journal
-
-
Emery, T.1
-
12
-
-
0003954001
-
-
London, HarperCollins
-
Gibson, W. (1984). Neuromancer. London: HarperCollins.
-
(1984)
Neuromancer
-
-
Gibson, W.1
-
13
-
-
0032010240
-
How to avoid unwanted e-mail
-
Hall, R. J. (1998). How to avoid unwanted e-mail. Communications of the ACM, 3(41), 88-95.
-
(1998)
Communications of the ACM
, vol.3
, Issue.41
, pp. 88-95
-
-
Hall, R.J.1
-
14
-
-
7244238898
-
You've got spam! Spam not annoying enough? Now junk instant messages are on the rise
-
February 23
-
Hamilton, A. (2004, February 23). You've got spam! Spam not annoying enough? Now junk instant messages are on the rise. Time, pp. 1.
-
(2004)
Time
, pp. 1
-
-
Hamilton, A.1
-
15
-
-
0014413249
-
The tragedy of the commons
-
Hardin, G. (1968). The tragedy of the commons. Science, 162, 1243-1248.
-
(1968)
Science
, vol.162
, pp. 1243-1248
-
-
Hardin, G.1
-
18
-
-
0022098334
-
Structuring computer-mediated communication systems to avoid information overload
-
Hiltz, S. R., & Turoff, M. (1985). Structuring computer-mediated communication systems to avoid information overload. Communications of the ACM, 28(7), 680-689.
-
(1985)
Communications of the ACM
, vol.28
, Issue.7
, pp. 680-689
-
-
Hiltz, S.R.1
Turoff, M.2
-
19
-
-
84994786588
-
Spam: The plague of junk e-mail
-
Ivey, K. C. (1998). Spam: The plague of junk e-mail. IEEE Computer Applications in Power, 11(2), 15-16.
-
(1998)
IEEE Computer Applications In Power
, vol.11
, Issue.2
, pp. 15-16
-
-
Ivey, K.C.1
-
20
-
-
84898219215
-
Canning spam
-
Korman, K. (2003). Canning spam. netWorker, 7(2), 3.
-
(2003)
NetWorker
, vol.7
, Issue.2
, pp. 3
-
-
Korman, K.1
-
21
-
-
0038336806
-
Markets for attention: Will postage for email help?
-
Kraut, R. E., Shyam, S., Morris, J., Telang, R., Filer, D., & Cronin, M. (2002). Markets for attention: Will postage for email help? Proceedings of CSCW 02 (pp. 206-215).
-
(2002)
Proceedings of CSCW 02
, pp. 206-215
-
-
Kraut, R.E.1
Shyam, S.2
Morris, J.3
Telang, R.4
Filer, D.5
Cronin, M.6
-
25
-
-
84898219052
-
Spam is now number one source of unwanted network intrusions
-
Retrieved from
-
Murrell, L. (2003). Spam is now number one source of unwanted network intrusions. Sunbelt Software. Retrieved from http://www.itsecurity.com/tecsnews/jul2003/jul141.htm
-
(2003)
Sunbelt Software
-
-
Murrell, L.1
-
26
-
-
85008020330
-
Group considers drastic methods to stop spam
-
Paulson, L. D. (2003). Group considers drastic methods to stop spam. Computer, 36(7), 21-22.
-
(2003)
Computer
, vol.36
, Issue.7
, pp. 21-22
-
-
Paulson, L.D.1
-
27
-
-
0030222198
-
The messaging threshold in computer-mediated communication
-
Reid, F. J. M., Malinek, V., Stott, C. J. T. E., & Evans, J. S. B. T. (1996). The messaging threshold in computer-mediated communication. Ergonomics, 39(8), 1017-1037.
-
(1996)
Ergonomics
, vol.39
, Issue.8
, pp. 1017-1037
-
-
Reid, F.J.M.1
Malinek, V.2
Stott, C.J.T.E.3
Evans, J.S.B.T.4
-
28
-
-
0002997478
-
Network analysis and computermediated communication systems
-
In S. Wasserman & J. Galaskiewicz (Eds.), 2003, Newbury Park, CA: Sage
-
Rice, R. (1994). Network analysis and computermediated communication systems. In S. Wasserman & J. Galaskiewicz (Eds.), Advances in social network analysis (pp. 167-2003). Newbury Park, CA: Sage.
-
(1994)
Advances In Social Network Analysis
, pp. 167
-
-
Rice, R.1
-
29
-
-
4243173624
-
Unsolicited communications as trespass
-
Samuelson, P. (2003). Unsolicited communications as trespass. Communications of the ACM, 46(10), 15-20.
-
(2003)
Communications of the ACM
, vol.46
, Issue.10
, pp. 15-20
-
-
Samuelson, P.1
-
30
-
-
84898279715
-
Spam slayer: Laws won't solve everything
-
November 11, Retreived from
-
Spring, T. (2003, November 11). Spam slayer: Laws won't solve everything. PC World. Retreived from http://www.pcworld.com/news/article/0,aid,113329,tk,dnWknd,00.asp
-
(2003)
PC World
-
-
Spring, T.1
-
31
-
-
1642617149
-
Spam wars rage
-
April
-
Spring, T. (2004, April). Spam wars rage. PC World, pp. 24-26.
-
(2004)
PC World
, pp. 24-26
-
-
Spring, T.1
-
32
-
-
44949097578
-
Spam's big bang
-
June 16
-
Taylor, C. (2003, June 16). Spam's big bang. Time, pp. 50-53.
-
(2003)
Time
, pp. 50-53
-
-
Taylor, C.1
-
33
-
-
0043156433
-
Saving private email
-
Vaughan-Nichols, S. J. (2003). Saving private email. IEEE Spectrum, 40(8), 40-44.
-
(2003)
IEEE Spectrum
, vol.40
, Issue.8
, pp. 40-44
-
-
Vaughan-Nichols, S.J.1
-
34
-
-
0000320829
-
The right to privacy
-
Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, 4(5), 193-220.
-
(1890)
Harvard Law Review
, vol.4
, Issue.5
, pp. 193-220
-
-
Warren, S.D.1
Brandeis, L.D.2
-
35
-
-
4243120747
-
Inside risks: Spam wars
-
Weinstein, L. (2003). Inside risks: Spam wars. Communications of the ACM, 46(8), 136.
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
, pp. 136
-
-
Weinstein, L.1
-
36
-
-
7244242066
-
Ending spam's free ride
-
Weiss, A. (2003). Ending spam's free ride. netWorker, 7(2), 18-24.
-
(2003)
NetWorker
, vol.7
, Issue.2
, pp. 18-24
-
-
Weiss, A.1
-
37
-
-
0037278884
-
Legitimate by design: Towards trusted virtual community environments
-
Whitworth, B., & deMoor, A. (2003). Legitimate by design: Towards trusted virtual community environments. Behaviour & Information Technology, 22(1), 31-51.
-
(2003)
Behaviour & Information Technology
, vol.22
, Issue.1
, pp. 31-51
-
-
Whitworth, B.1
Demoor, A.2
-
38
-
-
0035486403
-
Generating agreement in computer-mediated groups
-
Whitworth, B., Gallupe, R. B., & McQueen, R. (2001). Generating agreement in computer-mediated groups. Small Group Research, 32(5), 625-665.
-
(2001)
Small Group Research
, vol.32
, Issue.5
, pp. 625-665
-
-
Whitworth, B.1
Gallupe, R.B.2
McQueen, R.3
-
39
-
-
7244254280
-
Reducing spam by closing the social-technical gap
-
Whitworth, B., & Whitworth, E. (2004). Reducing spam by closing the social-technical gap. IEEE Computer, 38-45.
-
(2004)
IEEE Computer
, pp. 38-45
-
-
Whitworth, B.1
Whitworth, E.2
-
40
-
-
84898393564
-
Out, out damned spam
-
August 11
-
Woellert, L. (2003, August 11). Out, out damned spam. Business Week, pp. 54-56.
-
(2003)
Business Week
, pp. 54-56
-
-
Woellert, L.1
|