The Online Construction of Personal Identity through Trust and Privacy
暂无分享,去创建一个
[1] Jannis Kallinikos,et al. The Consequences of Information: Institutional Implications of Technological Change , 2007 .
[2] Paul Virilio. Speed and Politics: An Essay on Dromology , 1986 .
[3] P. Burke. The classical foundations of modern historiography , 1994 .
[4] Leon J. Goldstein. The End of History and the Last Man , 1993 .
[5] Seounmi Youn. Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors Among Young Adolescents , 2009 .
[6] A. Lenhart,et al. Teens, privacy and online social networks: How teens manage their online identities and personal information in the age of MySpace , 2007 .
[7] Giovanni Sartor,et al. Privacy, Reputation, and Trust: Some Implications for Data Protection , 2006, iTrust.
[8] P. Valkenburg,et al. The Effects of Instant Messaging on the Quality of Adolescents’ Existing Friendships: A Longitudinal Study , 2009 .
[9] Anind K. Dey,et al. Understanding and Using Context , 2001, Personal and Ubiquitous Computing.
[10] Susan B. Barnes,et al. A privacy paradox: Social networking in the United States , 2006, First Monday.
[11] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[12] Emmanuel Lévinas,et al. Totalité et infini : essai sur l'extériorité , 1971 .
[13] E. Lévinas. Totalité et infini , 1961 .
[14] D. Konstan,et al. The classical foundations of modern historiography , 1990 .
[15] Luciano Floridi,et al. A Look into the Future Impact of ICT on Our Lives , 2006, Inf. Soc..
[16] P. Ricœur. Soi même comme un autre , 1990 .
[17] Sandra Galindo. Palfrey, J.; Gasser, U. Born Digital: Understanding the First Generation of Digital Natives. New York, NY: Basic books, 2008 , 2009 .
[18] Massimo Durante. Rethinking human identity in the age of autonomic computing: the philosophical idea of trace , 2013, Law, Human Agency and Autonomic Computing.
[19] Jonny Holmström. The Consequences of Information: Institutional Implications of Technological Change , 2008 .
[20] Jannis Kallinikos,et al. The Consequences of Information: Institutional Implications of Technological Change , 2007 .
[21] Luciano Floridi,et al. The Method of Levels of Abstraction , 2008, Minds and Machines.
[22] Corey A Ciocchetti. E-Commerce and Information Privacy: Privacy Policies as Personal Information Protectors , 2007 .
[23] Zoran Despotovic,et al. Reputation and Trust , 2009, Encyclopedia of Database Systems.
[24] Bernhard Debatin,et al. Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..
[25] Massimo Durante,et al. What Model of Trust for Networked Cooperation? Online Social Trust in the Production of Common Goods (Knowledge Sharing) , 2008 .
[26] Zeynep Tufekci. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .
[27] Rino Falcone,et al. Socio‐Cognitive Model of Trust: Basic Ingredients , 2010 .
[28] E. Lévinas. Autrement qu'être ou au-delà de l'essence , 1974 .
[29] S. Herring,et al. Questioning the Generational Divide : Technological Exoticism and Adult Constructions of Online Youth Identity , 2007 .
[30] Helen Nissenbaum,et al. Will Security Enhance Trust Online, or Supplant It? , 2004 .
[31] J. Moor. What Is Computer Ethics?* , 1985, The Ethics of Information Technologies.
[32] M. Foucault,et al. The Order of Things , 2017 .
[33] Anthony D. Miyazaki,et al. Protecting children's privacy online: How parental mediation strategies affect website safeguard effectiveness , 2008 .
[34] Jeffrey O. Kephart,et al. The Vision of Autonomic Computing , 2003, Computer.
[35] Choton Basu,et al. Born Digital - Understanding the First Generation of Digital Natives , 2008 .
[36] Kirstie Ball,et al. Surveillance Society: Monitoring Everyday Life , 2001 .
[37] Luciano Floridi,et al. Information ethics, its nature and scope , 2006, CSOC.
[38] Justin W. Patchin,et al. Personal information of adolescents on the Internet: A quantitative content analysis of MySpace. , 2008, Journal of adolescence.
[39] Donald Davidson,et al. Subjective, Intersubjective, Objective , 2003 .
[40] M. Castells. Communication Power: Mass Communication, Mass Self-Communication and Power Relationships in the Network Society , 2009, Media and Society.
[41] E.,et al. Self-Discrepancy : A Theory Relating Self and Affect , 2022 .
[42] D. Boyd. Social Network Sites as Networked Publics: Affordances, Dynamics, and Implications , 2010 .
[43] N. Luhmann. Trust and Power , 1979 .
[44] Daniel J. Solove. The Future of Reputation: Gossip, Rumor, and Privacy on the Internet , 2007 .
[45] Alice E. Marwick,et al. Youth, Privacy and Reputation (Literature Review) , 2010 .
[46] Clay Shirky. Here Comes Everybody: The Power of Organizing Without Organizations , 2008 .
[47] K. Shadan,et al. Available online: , 2012 .
[48] M. Foucault,et al. Power/Knowledge: Selected Interviews and Other Writings 1972-1977 , 1980 .
[49] R. Hepburn,et al. BEING AND TIME , 2010 .
[50] L. Floridi. The Ontological Interpretation of Informational Privacy , 2005, Ethics and Information Technology.
[51] J. Kristeva,et al. Strangers to Ourselves , 1996, Canadian Theatre Review.
[52] F. H. Adler. Cybernetics, or Control and Communication in the Animal and the Machine. , 1949 .
[53] Rino Falcone,et al. Socio-Cognitive Model of Trust , 2005, Encyclopedia of Information Science and Technology.
[54] D. Boyd. Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life , 2007 .
[55] J. Haidt. The emotional dog and its rational tail: a social intuitionist approach to moral judgment. , 2001, Psychological review.
[56] H. Gadamer,et al. Truth and Method , 1960 .
[57] V. Steeves,et al. Closing the Barn Door: The Effect of Parental Supervision on Canadian Children's Online Privacy , 2008 .
[58] John G. Palfrey. The Public and the Private at the United States Border with Cyberspace , 2008 .
[59] Mireille Hildebrandt,et al. The Philosophy of Law Meets the Philosophy of Technology: Autonomic Computing and Transformations of Human Agency , 2011 .
[60] Emily Christofides,et al. Information Disclosure and Control on Facebook: Are They Two Sides of the Same Coin or Two Different Processes? , 2009, Cyberpsychology Behav. Soc. Netw..
[61] Clay Shirky,et al. Here Comes Everybody , 2017 .