Sensitive information: A review and research agenda
暂无分享,去创建一个
[1] D E Forsythe,et al. Using ethnography to build a working system: rethinking basic design assumptions. , 1992, Proceedings. Symposium on Computer Applications in Medical Care.
[2] Brett Trueman,et al. The Strategic Timing of Corporate Disclosures , 1996 .
[3] Pete Earley. Family of Spies: Inside the John Walker Spy Ring , 1988 .
[4] E. Rosch,et al. Cognition and Categorization , 1980 .
[5] B. Kwasnik. THE IMPORTANCE OF FACTORS THAT ARE NOT DOCUMENT ATTRIBUTES IN THE ORGANISATION OF PERSONAL DOCUMENTS , 1991 .
[6] Shameek Konar,et al. Information As Regulation: The Effect of Community Right to Know Laws on Toxic Emissions , 1997 .
[7] Christoph Scholz,et al. The Symbolic Value of Computerized Information Systems , 1990 .
[8] P. Kay. Basic Color Terms: Their Universality and Evolution , 1969 .
[9] Michelle Lynn Brown,et al. A theory of information technology cultures : magic dragons, wizards and archetypal patterns , 1995 .
[10] Barbara H. Kwasnik,et al. The Role of Classification in Knowledge Representation and Discovery , 1999, Libr. Trends.
[11] Daniel Robey,et al. More on myth, magic and metaphor: Cultural insights into the management of information technology in organizations , 1999, Inf. Technol. People.
[12] Carl R. Chen,et al. Timing the Disclosure of Information: Management's View of Earnings Announcements , 1994 .
[13] J. March,et al. A Behavioral Theory of the Firm , 1964 .
[14] Robert J. Bloomfield,et al. Market Transparency: Who Wins and Who Loses? , 1999 .
[15] D. Merten,et al. ENCULTURATION INTO SECRECY AMONG JUNIOR HIGH SCHOOL GIRLS , 1999 .
[16] Bruce Murphy,et al. Enterprise Security Architecture , 2000, Inf. Secur. J. A Glob. Perspect..
[17] Robert E. Verrecchia,et al. Pre-announcement and event-period private information , 1997 .
[18] Chris Hare. Improving Network Level Security through Real-time Monitoring and Intrusion Detection , 2000 .
[19] Siew Hong Teoh,et al. Information Disclosure and Voluntary Contributions to Public Goods , 1997 .
[20] Elizabeth D. Liddy,et al. Information Security and Sharing , 2001 .
[21] Clare Beghtol,et al. 'Facets' as Interdisciplinary undiscovered Public Knowledge: S.R. Ranganathan in India and L. Guttman in Israel , 1995, J. Documentation.
[22] S. M. Drigotas,et al. Secret Transmission: A Relative Intimacy Hypothesis , 1999 .
[23] R. Landau,et al. Secrecy, anonymity, and deception in donor insemination: a genetic, psycho-social and ethical critique. , 1998, Social work in health care.
[24] Bert R. Boyce,et al. Beyond topicality : A two stage view of relevance and the retrieval process , 1982, Inf. Process. Manag..
[25] Youngme Moon. Intimate Exchanges: Using Computers to Elicit Self-Disclosure from Consumers , 2000 .
[26] B. Schutt. Sorting things out. , 1970, The American journal of nursing.
[27] Lotfi A. Zadeh,et al. Fuzzy Sets , 1996, Inf. Control..
[28] Tamar Katriel,et al. Sodot: Secret‐sharing as a social form among Israeli children∗ , 1990 .
[29] T. Van Dijk,et al. RELEVANCE ASSIGNMENT IN DISCOURSE COMPREHENSION , 1979 .
[30] E. Rosch,et al. Categorization of Natural Objects , 1981 .
[31] Baruch Lev,et al. Information Asymmetry, R&D, and Insider Gains , 2000 .
[32] Suil Pae,et al. Acquisition and discretionary disclosure of private information and its implications for firms' productive activities , 1999 .
[33] Yongmin Chen. Conflicting interests in information disclosure and short-term orientation of firms , 1994 .
[34] G. Fine,et al. Secrecy, Trust, and Dangerous Leisure: Generating Group Cohesion in Voluntary Organizations , 1996 .
[35] Clare Beghtol,et al. Bibliographic Classification Theory and Text Linguistics: Aboutness Analysis, intertextuality and the Cognitive Act of Classifying Documents , 1986, J. Documentation.
[36] Jack L. Brock. Federal Information Security: Actions Needed to Address Widespread Weaknesses , 2000 .
[37] Ellen M. Markman,et al. Categorization and Naming in Children: Problems of Induction , 1989 .
[38] M. Baba. Dangerous Liaisons: Trust, Distrust, and Information Technology in American Work Organizations , 1999 .
[39] Anthony P. Maingot. Offshore Secrecy Centers and the Necessary Role of States: Bucking the Trend , 1995 .
[40] V. Groze,et al. The Impact of Secrecy and Denial in Adoption: Practice and Treatment Issues , 1997 .
[41] R. Brown. How shall a thing be called. , 1958, Psychological review.
[42] Robert M. Bushman,et al. Public Disclosure and the Structure of Private Information Markets , 1991 .
[43] M. McCloskey,et al. Natural categories: Well defined or fuzzy sets? , 1978 .
[44] Susan Leigh Star,et al. Grounded Classification: Grounded Theory and Faceted Classification , 1998, Libr. Trends.
[45] Raya Fidel,et al. Proceedings of the 2nd ASIS SIG/CR Classification Research Workshop, held at the 54th ASIS Annual Meeting, Washington, DC, October 27-31, 1991 , 1992 .
[46] Genevieve J. Knezo,et al. "Sensitive But Unclassified" and Other Federal Security Controls on Scientific and Technical Information: History and Current Controversy , 2003 .
[47] Tracy R. Lewis,et al. Série Scientifique Scientific Series Disclosure of Information in Regulatory Proceedings Les Organisations-partenaires / the Partner Organizations Disclosure of Information in Regulatory Proceedings , 2022 .
[48] Jan H. P. Eloff,et al. Security classification for documents , 1996, Comput. Secur..
[49] E. Shils,et al. The torment of secrecy : the background and consequences of American security policies , 1957 .
[50] Barbara Laslett,et al. Privacy and Secrecy: A Conceptual Comparison , 1977 .
[51] C. Palmer,et al. Telling the Truth (Up to a Point): Radio Communication Among Maine Lobstermen , 1990 .
[52] E. Goffman. The Presentation of Self in Everyday Life , 1959 .
[53] Louis Phlips,et al. The Economics of Imperfect Information , 1989 .