-
2
-
-
84937386346
-
Is privacy now possible? A brief history of an obsession
-
Allen, A. L. (2001). Is privacy now possible? A brief history of an obsession. Social Research,301-306.
-
(2001)
Social Research
, pp. 301-306
-
-
Allen, A.L.1
-
3
-
-
0003508667
-
-
Vopper, 53 u.sNew York: Wadsworth, Bartnicki v
-
Altman, I. (1975). The environment and social behavior. New York: Wadsworth. Bartnicki v. Vopper, 53 U.S. 514 (2001).
-
(1975)
The Environment and Social Behavior
, vol.514
-
-
Altman, I.1
-
4
-
-
84925828921
-
Uncle sam needs watching, too
-
March 22, 2002, from LEXIS, Nexis Library
-
Black, J. (2001, Nov. 30). Uncle Sam needs watching, too. Business Week Online. Retrieved March 22, 2002, from LEXIS, Nexis Library.
-
(2001)
Business Week Online
-
-
Black, J.1
-
5
-
-
34249808973
-
Personal information privacy issues relating to consump-tion in the u.S. Marketplace
-
Bonavia, M., & Morton, L. (1998). Personal information privacy issues relating to consump-tion in the U.S. marketplace. Consumer Interests Annual, 44, 25-29.
-
(1998)
Consumer Interests Annual
, vol.44
, pp. 25-29
-
-
Bonavia, M.1
Morton, L.2
-
6
-
-
0000949828
-
Privacy and communication
-
M. Burgoon (Ed.), Beverly Hills, CA: Sage
-
Burgoon, J. K. (1982). Privacy and communication. In M. Burgoon (Ed.), Communication yearbook: 6 (pp. 206-249). Beverly Hills, CA: Sage.
-
(1982)
Communication Yearbook
, vol.6
, pp. 206-249
-
-
Burgoon, J.K.1
-
7
-
-
84965703890
-
Maintaining and restoring privacy through communication in different types of rela-tionships
-
Burgoon, J. K., Parrott, R., LePoire, B. A., Kelley, D. L., Walther, J. B., & Perry, D. (1989). Maintaining and restoring privacy through communication in different types of rela-tionships. Journal of Social and Personal Relationships, 6, 131-158.
-
(1989)
Journal of Social and Personal Relationships
, vol.6
, pp. 131-158
-
-
Burgoon, J.K.1
Parrott, R.2
Lepoire, B.A.3
Kelley, D.L.4
Walther, J.B.5
Perry, D.6
-
8
-
-
84868887669
-
-
October 9, 2005
-
Center for Survey Research and Analysis. (2002, August). State of the First Amendment 2002. Retrieved October 9, 2005, from http://www.freedomforum.org/templates/docu- ment.asp?documentID=16840
-
(2002)
State of the First Amendment
-
-
-
9
-
-
0001501223
-
How did they get my name?: An exploratory investigation of con-sumer attitudes toward secondary information use
-
Culnan, M. J. (1993). How did they get my name?: An exploratory investigation of con-sumer attitudes toward secondary information use. MIS Quarterly, 17(3), 341-361.
-
(1993)
MIS Quarterly
, vol.17
, Issue.3
, pp. 341-361
-
-
Culnan, M.J.1
-
11
-
-
84925813710
-
-
October 10, 2005
-
Dempsey, J., Anderson, P., & Schwartz, A. (2003). Privacy and e-government: A report to the United Nations Department of Economic and Social Affairs as background for the world public sector report: E-Government. Retrieved October 10, 2005, from www.internetpolicy.net/privacy/20030523cdt.pdf
-
(2003)
Privacy and E
-
-
Dempsey, J.1
Anderson, P.2
Schwartz, A.3
-
12
-
-
84993587922
-
Privacy and self-disclosure in social relationships
-
Derlega, V. J., & Chaikin, A. L. (1977). Privacy and self-disclosure in social relationships. Journal of Social Issues, 33(3), 102.
-
(1977)
Journal of Social Issues
, vol.33
, Issue.3
, pp. 102
-
-
Derlega, V.J.1
Chaikin, A.L.2
-
13
-
-
84883390083
-
Privacy and human development
-
W. C. Bier, New York: Fordham University Press
-
Fischer, C. T. (1980). Privacy and human development. In W. C. Bier (Ed.), Privacy: A vanishing value? (pp. 37). New York: Fordham University Press.
-
(1980)
Privacy: A Vanishing Value?
, pp. 37
-
-
Fischer, C.T.1
-
14
-
-
0040281795
-
-
Cambridge, MA: Harvard University Press
-
Fried, C. (1970). An anatomy of values. Cambridge, MA: Harvard University Press.
-
(1970)
An Anatomy of Values
-
-
Fried, C.1
-
15
-
-
84923486508
-
Privacy and the limits of law
-
Gavison, R. (1980). Privacy and the limits of law. Yale Law Journal, 89, 421.
-
(1980)
Yale Law Journal
, vol.89
, pp. 421
-
-
Gavison, R.1
-
16
-
-
33746103512
-
-
October 9, 2005, From the Electronic Privacy Information Center (EPIC) web site
-
Gellman, R. (2002, March). Privacy, consumers, and cost: How the lack of privacy costs consumers and why business studies of privacy costs are biased and incomplete. Retrieved October 9, 2005, From the Electronic Privacy Information Center (EPIC) web site http://www.epic.org/reports/dmfprivacy.html
-
(2002)
Privacy, Consumers, and Cost: How the Lack of Privacy Costs Consumers and Why Business Studies of Privacy Costs are Biased and Incomplete
-
-
Gellman, R.1
-
17
-
-
84925723656
-
A defining moment for info privacy
-
Green, H. (2001, November 6). A defining moment for info privacy. Business Week Online.
-
(2001)
Business Week Online
-
-
Green, H.1
-
18
-
-
33845939803
-
Privacy, technology, and social change
-
Hillyard, D. P., & Knight, S. M. (2004). Privacy, technology, and social change. Knowledge, Technology & Policy, 17(1), 81-101.
-
(2004)
Knowledge, Technology & Policy
, vol.17
, Issue.1
, pp. 81-101
-
-
Hillyard, D.P.1
Knight, S.M.2
-
19
-
-
0002061206
-
Shifting lines of privacy
-
Horn, M. (1998). Shifting lines of privacy. U.S. News & World Report, 125(16), 57.
-
(1998)
U.S. News & World Report
, vol.125
, Issue.16
, pp. 57
-
-
Horn, M.1
-
20
-
-
19944420514
-
Privacy practices of internet users: Self-reports versus observed behavior
-
Jensen, C., Potts, C., & Jensen, C. (2005). Privacy practices of Internet users: Self-reports versus observed behavior. International Journal of Human-Computer Studies, 63(1-2), 203-227.
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 203-227
-
-
Jensen, C.1
Potts, C.2
Jensen, C.3
-
21
-
-
0001173896
-
Some psychological aspects of privacy
-
Jourard, S. M. (1966). Some psychological aspects of privacy. Law and Contemporary Problems, 31, 307-318.
-
(1966)
Law and Contemporary Problems
, vol.31
, pp. 307-318
-
-
Jourard, S.M.1
-
22
-
-
0242335905
-
The great american privacy makeover
-
July 31, 2005
-
Kandra, A., & Brandt, A. (2003, November). The great American privacy makeover. PC World. Retrieved July 31, 2005, from http://www.pcworld.com/howto/article/0, aid, 112468,00.asp
-
(2003)
PC World
-
-
Kandra, A.1
Brandt, A.2
-
23
-
-
0039080198
-
Telecommunications and computers: Whither privacy policy?
-
Katz, J. E. (1987). Telecommunications and computers: Whither privacy policy? Society, 25(1), 81-86.
-
(1987)
Society
, vol.25
, Issue.1
, pp. 81-86
-
-
Katz, J.E.1
-
24
-
-
79251507731
-
-
Washington, DC: National Research Council, National Academics Press, July 28, 2006
-
Kent, S., & Millett, L. (2003). Who goes there? Authentication through the lens of privacy, committee on authentication technologies and their privacy implications. Washington, DC: National Research Council, National Academics Press. Retrieved July 28, 2006, from http://www.nap.edv/catalog/10656.htmKonpi-newsdoc032503
-
(2003)
Who Goes There? Authentication through the Lens of Privacy, Committee on Authentication Technologies and Their Privacy Implications
-
-
Kent, S.1
Millett, L.2
-
25
-
-
33846467518
-
Social psychological aspects of computer- mediated communication
-
Kiesler, S., Siegel, J., & Mc Guire, T. W. (1984). Social psychological aspects of computer- mediated communication. American Psychologist, 39(10), 1123-1134.
-
(1984)
American Psychologist
, vol.39
, Issue.10
, pp. 1123-1134
-
-
Kiesler, S.1
Siegel, J.2
Mc Guire, T.W.3
-
26
-
-
77951784066
-
Perceived risk of privacy invasion and the use of online technology by consumers
-
Kim, S., & Montalto, C. P. (2002). Perceived risk of privacy invasion and the use of online technology by consumers. Consumer Interests Annual,48, 1-9.
-
(2002)
Consumer Interests Annual
, vol.48
, pp. 1-9
-
-
Kim, S.1
Montalto, C.P.2
-
27
-
-
84925758782
-
-
University of North Texas News Service. Retrieved October 10, 2005
-
Kolsti, N. (2005, March 23). Study says students dependent on cell phones, e-mail. University of North Texas News Service. Retrieved October 10, 2005, from web2.unt.edu/news/story.cfm?story=9143
-
(2005)
Study Says Students Dependent on Cell Phones, E-Mail
-
-
Kolsti, N.1
-
28
-
-
84993660913
-
Privacy as a concept and a social issue: A multidimen-sional development theory
-
Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimen-sional development theory. Journal of Social Issues, 33(3), 22-42.
-
(1977)
Journal of Social Issues
, vol.33
, Issue.3
, pp. 22-42
-
-
Laufer, R.S.1
Wolfe, M.2
-
29
-
-
0012444935
-
Watch your e-mail! privacy law in the age of the “electronic sweatshop.”
-
Lee, L. T. (1994). Watch your e-mail! Privacy law in the age of the “electronic sweatshop.” John Marshall Law Review, 28(1), 139-177.
-
(1994)
John Marshall Law Review
, vol.28
, Issue.1
, pp. 139-177
-
-
Lee, L.T.1
-
30
-
-
30244539426
-
On-line anonymity: A new privacy battle in cyberspace
-
Lee, L. T. (1996). On-line anonymity: A new privacy battle in cyberspace. The New Jersey Journal of Communication, 4(2), 127-146.
-
(1996)
The New Jersey Journal of Communication
, vol.4
, Issue.2
, pp. 127-146
-
-
Lee, L.T.1
-
31
-
-
31044450720
-
Privacy, security, and intellectual property
-
A. B. Albarran & D. H. Goff, Ames: Iowa State University Press
-
Lee, L. T. (2000). Privacy, security, and intellectual property. In A. B. Albarran & D. H. Goff (Eds.), Understanding the web: Social, political, and economic dimensions of the Internet (pp. 135). Ames: Iowa State University Press.
-
(2000)
Understanding the Web: Social, Political, and Economic Dimensions of the Internet
, pp. 135
-
-
Lee, L.T.1
-
32
-
-
10644239491
-
The usa patriot act and telecommunications: Privacy under attack
-
Lee, L. T. (2003). The USA Patriot Act and telecommunications: Privacy under attack. Rutgers Computer & Technology Law Journal, 29(2), 371.
-
(2003)
Rutgers Computer & Technology Law Journal
, vol.29
, Issue.2
, pp. 371
-
-
Lee, L.T.1
-
33
-
-
21844482742
-
Caller id and the meaning of privacy
-
Lee, L. T., & LaRose, R. (1994). Caller ID and the meaning of privacy. The Information Society: An International Journal, 10(4), 247-265.
-
(1994)
The Information Society: An International Journal
, vol.10
, Issue.4
, pp. 247-265
-
-
Lee, L.T.1
Larose, R.2
-
35
-
-
84993869692
-
Conceptions of privacy: Current status and next steps
-
Margulis, S. T. (1977). Conceptions of privacy: Current status and next steps. Journal of Social Issues, 33(3), 5-21.
-
(1977)
Journal of Social Issues
, vol.33
, Issue.3
, pp. 5-21
-
-
Margulis, S.T.1
-
36
-
-
0002198735
-
Privacy and environment
-
Marshall, N. J. (1972). Privacy and environment. Human Ecology, 1(2), 93-110.
-
(1972)
Human Ecology
, vol.1
, Issue.2
, pp. 93-110
-
-
Marshall, N.J.1
-
39
-
-
84925723655
-
Cyber-catharsis: Bloggers use web sites as therapy
-
October 24, 2005
-
Noguchi, Y. (2005, October 12). Cyber-catharsis: Bloggers use web sites as therapy. The Washington Post. Retrieved October 24, 2005, from http://www.washingtonpost.com/ wp-dyn/content/article/2005/10/11/AR2005101 101781.html
-
(2005)
The Washington Post
-
-
Noguchi, Y.1
-
40
-
-
1142266729
-
Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness or relative role of trust and control
-
Olivero, N., & Lunt, P. (2004). Privacy versus willingness to disclose in e-commerce exchanges: The effect of risk awareness or relative role of trust and control. Journal of Economic Psychology, 25(2), 243.
-
(2004)
Journal of Economic Psychology
, vol.25
, Issue.2
, pp. 243
-
-
Olivero, N.1
Lunt, P.2
-
41
-
-
0035530890
-
Analysis of internet users’ level of online privacy concern
-
O’Neil, D. (2001). Analysis of Internet users’ level of online privacy concern. Social Science Computer Review, 19(1), 17.
-
(2001)
Social Science Computer Review
, vol.19
, Issue.1
, pp. 17
-
-
Oneil, D.1
-
43
-
-
0010885660
-
Privacy as a behavioral concept
-
Pastalan, L. A. (1970). Privacy as a behavioral concept. Social Science, 45(2), 93.
-
(1970)
Social Science
, vol.45
, Issue.2
, pp. 93
-
-
Pastalan, L.A.1
-
45
-
-
0008530173
-
Model for types of privacy by privacy functions
-
Pedersen, D. M. (1999). Model for types of privacy by privacy functions. Journal of Environmental Psychology, 19(4), 397-405.
-
(1999)
Journal of Environmental Psychology
, vol.19
, Issue.4
, pp. 397-405
-
-
Pedersen, D.M.1
-
47
-
-
0009431934
-
The right of privacy
-
Posner, R. (1978). The right of privacy. Georgia Law Review, 12, 393.
-
(1978)
Georgia Law Review
, vol.12
, pp. 393
-
-
Posner, R.1
-
50
-
-
84925793888
-
Cookie managers
-
Randall, N. (1997, September 9). Cookie managers. PC Magazine.
-
(1997)
Pp Magazine
-
-
Randall, N.1
-
51
-
-
0036402328
-
The customer economics of internet privacy
-
Rust, R. T. (2002). The customer economics of Internet privacy. Journal of the Academy of Marketing Science, 30(4), 455-464.
-
(2002)
Journal of the Academy of Marketing Science
, vol.30
, Issue.4
, pp. 455-464
-
-
Rust, R.T.1
-
54
-
-
84925758781
-
-
November 20, 2005From LEXIS, Nexis Library
-
Security. (2005, April 21). Washington Internet Daily, 6(77). Retrieved November 20, 2005, From LEXIS, Nexis Library.
-
(2005)
Washington Internet Daily
, vol.6
, Issue.77
-
-
-
55
-
-
0032352538
-
Places and spaces: The historical interaction of technology, home, and privacy
-
Shapiro, S. (1998). Places and spaces: The historical interaction of technology, home, and privacy. The Information Society, 14(4), 275-284.
-
(1998)
The Information Society
, vol.14
, Issue.4
, pp. 275-284
-
-
Shapiro, S.1
-
56
-
-
0036005221
-
Toward a typology of internet users and online privacy concerns
-
Sheehan, K. B. (2002). Toward a typology of Internet users and online privacy concerns. The Information Society, 18(1), 21-32.
-
(2002)
The Information Society
, vol.18
, Issue.1
, pp. 21-32
-
-
Sheehan, K.B.1
-
57
-
-
0002179878
-
Flaming, complaining, abstaining: How online users respond to privacy concerns
-
Sheehan, K. B., & Hoy, M. G. (1999). Flaming, complaining, abstaining: How online users respond to privacy concerns. Journal of Advertising, 28(3), 37-51.
-
(1999)
Journal of Advertising
, vol.28
, Issue.3
, pp. 37-51
-
-
Sheehan, K.B.1
Hoy, M.G.2
-
58
-
-
20144382299
-
How to stop junk e-mail: Charge for the stamp
-
November 20, 2005
-
Stross, R. (2005, February 13). How to stop junk e-mail: Charge for the stamp. The New York Times. Retrieved November 20, 2005, from http://coba.usf.edu/abhatt/eb/ NYI-Spam.htm
-
(2005)
The New York Times
-
-
Stross, R.1
-
61
-
-
0001369806
-
Employee perceptions of invasion of privacy: A field simulation experiment
-
Tolchinsky, P. D., McCuddy, M. K., Adams, J., Ganster, D. C., Woodman, R. W., & Fromkin, H. L. (1981). Employee perceptions of invasion of privacy: A field simulation experiment. Journal of Applied Psychology, 66(3), 308-313.
-
(1981)
Journal of Applied Psychology
, vol.66
, Issue.3
, pp. 308-313
-
-
Tolchinsky, P.D.1
Mc Cuddy, M.K.2
Adams, J.3
Ganster, D.C.4
Woodman, R.W.5
Fromkin, H.L.6
-
62
-
-
84925782932
-
Anonymity and the internet
-
Traynor, M. (2005). Anonymity and the Internet. The Computer & Internet Lawyer, 22(2), 1-16.
-
(2005)
The Computer & Internet Lawyer
, vol.22
, Issue.2
, pp. 1-16
-
-
Traynor, M.1
-
63
-
-
84925723654
-
-
U.S. consumers flock to products to protect privacy, study says. (2003, July 7). Electronic Commerce News, 8(14).
-
(2003)
Electronic Commerce News
, vol.8
, Issue.14
-
-
-
64
-
-
85044895553
-
Situating privacy online
-
Viseu, A., Clement, A., & Aspinall, J. (2004). Situating privacy online. Information, Communication & Society, 7(1), 92.
-
(2004)
Information, Communication & Society
, vol.7
, Issue.1
, pp. 92
-
-
Viseu, A.1
Clement, A.2
Aspinall, J.3
-
65
-
-
12344334502
-
Im [@work] adoption of instant messaging in a knowledge worker organization
-
October 20, 2005
-
Vos, H., Hofte, H., & Poot, H. (2004). IM [@Work] adoption of instant messaging in a knowledge worker organization. Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS’04), Track 1, 10019a. Retrieved October 20, 2005, from http://csdl2.computer.org/comp/proceedings/hicss/2004/2056/01/2056 10019a.pdf
-
(2004)
Proceedings of the 37Th Annual Hawaii International Conference on System Sciences
-
-
Vos, H.1
Hofte, H.2
Poot, H.3
-
67
-
-
84925912926
-
Privacy and psychosomatic stress: An empirical analysis
-
Webb, S. D. (1978). Privacy and psychosomatic stress: An empirical analysis. Social Behavior and Personality6(2), 227.
-
(1978)
Social Behavior and Personality
, vol.6
, Issue.2
, pp. 227
-
-
Webb, S.D.1
-
69
-
-
84925716597
-
Privacy in america: An historical and socio-political analysis
-
Hartford, CT: The Connecticut Foundation for Open Government, Inc
-
Westin, A. (1996). Privacy in America: An historical and socio-political analysis. In Connecticut Freedom of Information Commission and the Connecticut State Library (Eds.), Report of the National Privacy and Public Policy Symposium (pp. 155). Hartford, CT: The Connecticut Foundation for Open Government, Inc.
-
(1996)
Connecticut Freedom of Information Commission and the Connecticut State Library (Eds.)
, pp. 155
-
-
Westin, A.1
-
70
-
-
84925723852
-
Proper vigilance or paranoia?
-
Will, R. (1998, October 5). Proper vigilance or paranoia? Inter@ctive Week, 5(38).
-
(1998)
Inter@Ctive Week
, vol.5
, Issue.38
-
-
Will, R.1
-
71
-
-
84925723851
-
New social medium fosters impatience
-
July 28, 2006
-
Wong, M. (2004, December 7). New social medium fosters impatience. Azstarnet.com(Arizona Daily Star). Retrieved July 28, 2006, from http:/www.azstarnet.com/sn/ specialreports/51394
-
(2004)
Azstarnet.Com
-
-
Wong, M.1
-
72
-
-
77953590021
-
-
July 27, 2006
-
Yankelovich Monitor. (2005, April 18). 2005 Marketing Receptivity Survey. Retrieved July 27, 2006, from http://www.yankelovich.com/thought/TL2005MarketingReceptivity Study.pdf
-
(2005)
2005 Marketing Receptivity Survey
-
-
-
73
-
-
33745046332
-
Teenagers’ perceptions of online privacy and coping behaviors: A risk- benefit appraisal approach
-
Youn, S. (2005). Teenagers’ perceptions of online privacy and coping behaviors: A risk- benefit appraisal approach. Journal of Broadcasting & Electronic Media, 49(1), 86.
-
(2005)
Journal of Broadcasting & Electronic Media
, vol.49
, Issue.1
, pp. 86
-
-
Youn, S.1
|