A Content Analysis of Library Vendor Privacy Policies: Do They Meet Our Standards?
暂无分享,去创建一个
[1] Arthur Elmore Bostwick,et al. The American Public Library , 2008 .
[2] A. Lenhart,et al. Teens, privacy and online social networks: How teens manage their online identities and personal information in the age of MySpace , 2007 .
[3] Karen McCullagh,et al. Blogging: self presentation and privacy , 2008 .
[4] T. F. Carney,et al. Content Analysis: A Technique for Systematic Inference from Communications , 1972 .
[5] Stacey L. Bowers. Privacy and Library Records. , 2006 .
[6] David Hugh Thompson. Sailing into the future : charting our destiny : proceedings of the Thirteenth National Conference of the Association of College and Research Libraries, March 29-April 1, 2007, Baltimore, Maryland , 2007 .
[7] Tom Storey,et al. Sharing, Privacy and Trust in Our Networked World. A Report to the OCLC Membership. , 2007 .
[8] C. Oppenheim,et al. User privacy in the digital library environment: an investigation of policies and preparedness , 2003 .
[9] John A Drobnicki. The Confidentiality of Library Users' Records. , 1992 .
[10] Daniel P. Dern. Privacy Concerns , 2003, IEEE Security & Privacy Magazine.
[11] G. St. Clair. Council on Library and Information Resources Internet Use Study , 2002 .
[12] Cheryl Campanella Bracken,et al. Practical Resources for Assessing and Reporting Intercoder Reliability in Content Analysis Research Projects , 2005 .
[13] Chiung-Wen Hsu,et al. Privacy concerns, privacy practices and web site categories: Toward a situational paradigm , 2006, Online Inf. Rev..
[14] D. Todd,et al. American Library Association , 2022, Encyclopedia of Big Data.
[15] R. Weber. Basic content analysis, 2nd ed. , 1990 .
[16] G. Malhi. Face value. , 2008, Acta neuropsychiatrica.
[17] Bradford R. Connatser. Last Rites for Readability Formulas in Technical Communication , 1999 .
[18] R. Flesch. A new readability yardstick. , 1948, The Journal of applied psychology.
[19] Annette N. Shelby. Readability Formulas , 1992 .
[20] Samuel J. Best,et al. Privacy in the Information Age , 2006 .
[21] W. D. Perreault,et al. Reliability of Nominal Data Based on Qualitative Judgments , 1989 .
[22] Klaus Krippendorff,et al. Content Analysis: An Introduction to Its Methodology , 1980 .
[23] Richard L. Divine,et al. Adolescents' Concern for Privacy When Using the Internet: An Empirical Analysis of Predictors and Relationships With Privacy‐Protecting Behaviors , 2007 .
[24] Susan B. Barnes,et al. A privacy paradox: Social networking in the United States , 2006, First Monday.
[25] K. Krippendorff. Krippendorff, Klaus, Content Analysis: An Introduction to its Methodology . Beverly Hills, CA: Sage, 1980. , 1980 .
[26] Colin Seymour-Ure,et al. Content Analysis in Communication Research. , 1972 .
[27] Kimberly A. Neuendorf,et al. The Content Analysis Guidebook , 2001 .
[28] Daniel R. Horne,et al. The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors , 2007 .
[29] Seounmi Youn. Teenagers' Perceptions of Online Privacy and Coping Behaviors: A Risk–Benefit Appraisal Approach , 2005 .
[30] Colin Potts,et al. Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..
[31] Stefan Stieger,et al. Internet users' perceptions of 'privacy concerns' and 'privacy actions' , 2007, Int. J. Hum. Comput. Stud..
[32] Edward M. Corrado. Privacy and Library 2.0: How Do They Conflict? , 2007 .
[33] R. Weber. Basic Content Analysis , 1986 .
[34] O. Holsti. Content Analysis for the Social Sciences and Humanities , 1969 .
[35] Karen G. Lawson,et al. University undergraduate students and library-related privacy issues , 2005 .