Trust, Control, and Design
暂无分享,去创建一个
[1] Phoebe Sengers,et al. Designing Comprehensible Agents , 1999, IJCAI.
[2] Shankar Ganesan. Determinants of Long-Term Orientation in Buyer-Seller Relationships , 1994 .
[3] P. Agre,et al. Technology and privacy: The new landscape , 1998 .
[4] David A. Wagner,et al. A Secure Environment for Untrusted Helper Applications , 1996, USENIX Security Symposium.
[5] D. Collard,et al. Trust : making and breaking cooperative relations , 1989 .
[6] David Bollier,et al. The future of electronic commerce : a report of the fourth annual Aspen Institute Roundtable on Information Technology, Aspen, Colorado, August 17-20, 1995 , 1996 .
[7] Kwok Ching Tsui,et al. The Intelligent Assistant: An Overview , 2000, Intelligent Systems and Soft Computing.
[8] P. Agre. The soul gained and lost: artificial intelligence as a philosophical project , 1995 .
[9] Dietrich Fahrenholtz,et al. Towards a Sociological View of Trust in Computer Science , 2001 .
[10] Alan Cooper,et al. The Inmates are Running the Asylum , 1999, Software-Ergonomie.
[11] Max Blackston,et al. Observations: Building Brand Equity by Managing the Brand's Relationships , 2000, Journal of Advertising Research.
[12] E. Rogers. Diffusion of Innovations , 1962 .
[13] P. Kollock. The Emergence of Exchange Structures: An Experimental Study of Uncertainty, Commitment, and Trust , 1994, American Journal of Sociology.
[14] Dan S. Wallach,et al. Java security: from HotJava to Netscape and beyond , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[15] Bart Selman,et al. An Experiment in the Design of Software Agents , 1994, AAAI.
[16] N. Denzin,et al. Handbook of Qualitative Research. Second Edition. , 2000 .
[17] A. Giddens. The consequences of modernity , 1990 .
[18] A. Strauss,et al. Basics of qualitative research: Grounded theory procedures and techniques. , 1992 .
[19] Thomas A. Finholt,et al. Social Issues in Computing: Putting Computing in Its Place , 1994 .