Online Privacy in Social Media: A Conceptual Exploration of Empowerment and Vulnerability
暂无分享,去创建一个
[1] Don Tapscott,et al. Wikinomics: How Mass Collaboration Changes Everything , 2006 .
[2] Andrea Saveri and Howard Rheingold and Kathi Vian. Technologies of Cooperation , 2005 .
[3] Yves Punie. Introduction: New Media Technologies and User Empowerment.Is there a Happy Ending? , 2011, New Media Technologies and User Empowerment.
[4] Hans Hoeken. Advertising and the new media , 2003 .
[5] S. Greenberg,et al. The Psychology of Everyday Things , 2012 .
[6] Toffler Alvin. The third wave. 1st ed. , 1980 .
[7] J. Rappaport. Terms of empowerment/exemplars of prevention: Toward a theory for community psychology , 1987, American journal of community psychology.
[8] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[9] C. Fuchs. The Political Economy of Privacy on Facebook , 2012 .
[10] Graham Vickery,et al. Participative Web And User-Created Content: Web 2.0 Wikis and Social Networking , 2007 .
[11] David B. Nieborg,et al. Wikinomics and its discontents: a critical analysis of Web 2.0 business manifestos , 2009, New Media Soc..
[12] Kirstie Ball,et al. EXPOSURE: Exploring the subject of surveillance , 2009 .
[13] Yves Punie,et al. The Impact of Social Computing on the EU Information Society and Economy , 2009 .
[14] B. Wellman,et al. The Internet in everyday life , 2002 .
[15] C. Goodwin. Privacy: Recognition of a Consumer Right , 1991 .
[16] Robin Mansell,et al. Imagining the Internet: Communication, Innovation, and Governance , 2012 .
[17] Aleecia M. McDonald,et al. The Cost of Reading Privacy Policies , 2009 .
[18] Philip Barker,et al. Blogs, Wikipedia, Second Life, and beyond: From Production to Produsage , 2009 .
[19] Ralf De Wolf,et al. Privacy beyond the individual: analyzing group based access control models on social network sites from a user perspective. , 2012 .
[20] M. Turshen. Development as Freedom , 2001 .
[21] José van Dijck,et al. Users like you? Theorizing agency in user-generated content , 2009 .
[22] Manuel Castells,et al. The Structure and Dynamics of Global Multi-Media Business Networks , 2008 .
[23] Tim O'Reilly,et al. What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software , 2007 .
[24] R. Silverstone. Media and morality : on the rise of the mediapolis , 2006 .
[25] D. Smythe. Communications: Blindspot of Western Marxism , 1977 .
[26] M. Graber,et al. Reading level of privacy policies on Internet health Web sites. , 2002, The Journal of family practice.
[27] Christine Bauer,et al. On the Value of Information – What Facebook Users are Willing to Pay , 2012, ECIS.
[28] D. Norman. The psychology of everyday things , 1990 .
[29] Pramod K. Nayar,et al. The Internet in everyday life , 2004, J. Assoc. Inf. Sci. Technol..
[30] Jo Pierson,et al. Social media and cookies: challenges for online privacy , 2011 .
[31] Celia Lury,et al. Cultural Rights: Technology, Legality and Personality.@@@The Panoptic Sort: A Political Economy of Personal Information. , 1993 .
[32] James Kohnen,et al. Groundswell: Winning in a World Transformed by Social Technologies , 2011 .
[33] Donald A. Norman,et al. Affordance, conventions, and design , 1999, INTR.
[34] R. Mansell. From Digital Divides to Digital Entitlements in Knowledge Societies , 2002 .
[35] K. Hui,et al. Economics of Privacy , 2005 .
[36] Clinton D. Lanier,et al. Understanding Consumer Privacy: A Review and Future Directions , 2008 .
[37] W. Smit,et al. De wederzijdse beinvloeding van technologie en maatschappij: een Technology Assessment-benadering , 1999 .
[38] David Lyon,et al. Surveillance as social sorting : Computer codes and mobile bodies , 2005 .
[39] A. Danna,et al. All That Glitters is Not Gold: Digging Beneath the Surface of Data Mining , 2002 .
[40] Doc Searls,et al. The Cluetrain Manifesto: The End of Business as Usual , 2000 .
[41] M. Farinosi. Deconstructing Bentham’s Panopticon: The New Metaphors of Surveillance in the Web 2.0 Environment , 2011 .
[42] J. Rubenfeld. The Right of Privacy , 1989 .
[43] Zizi Papacharissi,et al. Privacy as a luxury commodity , 2010, First Monday.
[44] Nanette Page,et al. Empowerment: What Is It?. , 1999 .
[45] Pascu Corina,et al. An Empirical Analysis of the Creation, Use and Adoption of Social Computing Applications , 2008 .
[46] Andrew McStay. The Mood of Information: A Critique of Online Behavioural Advertising , 2011 .
[47] David Lyon,et al. The Electronic Eye: The Rise of Surveillance Society , 1994 .
[48] C. Prahalad,et al. Co-creation experiences: The next practice in value creation , 2004 .
[49] Lara C. Stache,et al. Internet and Society: Social Theory in the Information Age , 2012, Rhetoric and Public Affairs.
[50] R. Chambers,et al. Vulnerability, Coping and Policy (Editorial Introduction) , 2006 .
[51] Katrien Dreessen,et al. Walking the Interface: Uncovering Practices Through 'Proxy Technology Assessment' , 2006 .
[52] Ellen R. Foxman,et al. Information Technology, Marketing Practice, and Consumer Privacy: Ethical Issues , 1993 .
[53] Danah Boyd,et al. Facebook privacy settings: Who cares? , 2010, First Monday.
[54] Ralf De Wolf,et al. Privacy by Design Through a Social Requirements Analysis of Social Network Sites form a User Perspective , 2013, European Data Protection.
[55] C. Fuchs. Social Software and Web 2.0: Their Sociological Foundations and Implications , 2010 .
[56] M. Castells. Communication Power: Mass Communication, Mass Self-Communication and Power Relationships in the Network Society , 2009, Media and Society.
[57] Clay Shirky. Here Comes Everybody: The Power of Organizing Without Organizations , 2008 .
[58] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[59] R. Cabecinhas,et al. International Association for Media and Communication Research , 2000 .
[60] Daniel J. Solove. Identity Theft, Privacy, and the Architecture of Vulnerability , 2003 .
[61] Chris Arney. Wikinomics: How Mass Collaboration Changes Everything , 2008 .
[62] Roger A. Clarke,et al. Information technology and dataveillance , 1988, CACM.
[63] S. O'Donohoe,et al. Groundswell: Winning in a World Transformed by Social Technologies , 2008 .
[64] Fernando Bermejo,et al. Audience manufacture in historical perspective: from broadcasting to Google , 2009, New Media Soc..
[65] Trevor Pinch,et al. How users matter : The co-construction of users and technologies , 2003 .
[66] Christian Fuchs,et al. Some Reflections on Manuel Castells??? Book ???Communication Power??? , 1970 .
[67] Elizabeth Shove,et al. Explaining Showering: A Discussion of the Material, Conventional, and Temporal Dimensions of Practice , 2005 .
[68] D. W. Hill. Media Life , 2013 .
[69] A. Acquisti. The Economics of Personal Data and the Economics of Privacy , 2010 .
[70] Corina Pascu,et al. The potential disruptive impact of Internet2 based technologies , 2007, First Monday.
[71] Jessica Vitak,et al. Digital footprints: online identity management and search in the age of transparency , 2007 .
[72] Juan Carlos Valencia Rincón. Internet and Surveillance: The Challenges of Web 2.0 and Social Media , 2012 .
[73] Howard Rheingold,et al. Smart Mobs: The Next Social Revolution , 2002 .
[74] J. Barlow,et al. Smart Mobs: The Next Social Revolution , 2003 .
[75] S. O'Donohoe,et al. Groundswell: Winning in a World Transformed by Social Technologies , 2008 .
[76] M. Watts,et al. The space of vulnerability: the causal structure of hunger and famine , 1993 .
[77] Ralf De Wolf,et al. Evaluating social media privacy settings for personal and advertising purposes , 2014 .
[78] Juan Carlos,et al. Vulnerability: a conceptional and methodological review , 2006 .
[79] C. Fuchs,et al. Internet and Surveillance: The Challenges of Web 2.0 and Social Media , 2011 .
[80] D. Boyd. Taken Out of Context: American Teen Sociality in Networked Publics , 2010 .