Individual values for protecting identity in social networks
暂无分享,去创建一个
[1] Susan B. Barnes,et al. A privacy paradox: Social networking in the United States , 2006, First Monday.
[2] James Horley,et al. Personal Construct Theory and Human Values , 2012 .
[3] M. White,et al. Assessing Our Knowledge of Identity Theft , 2008 .
[4] James P. Peerenboom,et al. Identifying, understanding, and analyzing critical infrastructure interdependencies , 2001 .
[5] Gurpreet Dhillon,et al. Defining value-based objectives for ERP systems planning , 2013, Decis. Support Syst..
[6] Lilian Edwards,et al. Data Control and Social Networking: Irreconcilable Ideas? , 2008 .
[7] G. Newman,et al. Identity Theft Literature Review , 2005 .
[8] Gurpreet Dhillon,et al. TORKZADEH AND DHILLON Measuring Factors that Influence the Success of Internet , 2015 .
[9] D. McQuail. Mass Communication Theory: An Introduction , 1983 .
[10] Timothy L. McDaniels,et al. Value-Focused Thinking in a Difficult Context: Planning Tourism for Guimaras, Philippines , 1999, Interfaces.
[11] H. Blumer,et al. Symbolic Interactionism: Perspective and Method , 1988 .
[12] Cara J Wong,et al. The meaning of American national identity: Patterns of ethnic conflict and consensus. , 2001 .
[13] Anthony D. Miyazaki,et al. Self-Regulatory Safeguards and the Online Privacy of Preteen Children , 2009 .
[14] Anders Albrechtslund,et al. Online Social Networking as Participatory Surveillance , 2008, First Monday.
[15] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[16] Matthew S. Eastin,et al. eCRM: Understanding Internet Confidence and the Implications for Customer Relationship Management , 2005 .
[17] Jonathan P. Allen,et al. Value conflicts for information security management , 2011, J. Strateg. Inf. Syst..
[18] B. Fischhoff,et al. Value elicitation: Is there anything in there? , 1991 .
[19] Keith N. Hampton,et al. Does the Internet Increase, Decrease, or Supplement Social Capital? , 2001 .
[20] Grant Mccracken. The long interview , 1988 .
[21] R. Keeney,et al. The Value of Internet Commerce to the Customer , 1999 .
[22] P. Thoits,et al. Me's and we's: Forms and functions of social identities. , 1997 .
[23] Andrew J. Rohm,et al. Consumers' Protection of Online Privacy and Identity , 2004 .
[24] P. Burke,et al. The Past, Present, and Future of an Identity Theory* , 2000 .
[25] Jure Leskovec,et al. The dynamics of viral marketing , 2005, EC '06.
[26] R. Baumeister. Identity: Cultural Change and the Struggle for Self , 1986 .
[27] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[28] Adrian Palmer,et al. An experiential, social network‐based approach to direct marketing , 2009 .
[29] S. Schwartz. Universals in the Content and Structure of Values: Theoretical Advances and Empirical Tests in 20 Countries , 1992 .
[30] Felix B. Tan,et al. The Repertory Grid Technique: A Method for the Study of Cognition in Information Systems , 2002, MIS Q..
[31] Bernardo A. Huberman,et al. Predicting the Future with Social Media , 2010, Web Intelligence.
[32] E. Schein. Organizational Culture and Leadership , 1991 .
[33] Sonia Livingstone,et al. Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression , 2008, New Media Soc..
[34] Qing Hu,et al. Is spyware an Internet nuisance or public menace? , 2005, CACM.
[35] R. Gregory,et al. Creating policy alternatives using stakeholder values , 1994 .
[36] P. Burke,et al. Identity theory and social identity theory , 2000 .
[37] J. Hewitt. Self and Society: A Symbolic Interactionist Social Psychology , 1976 .
[38] Gurpreet Dhillon,et al. Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..
[39] Krishna P. Gummadi,et al. Measurement and analysis of online social networks , 2007, IMC '07.
[40] Ben Light,et al. Ethics and social networking sites: a disclosive analysis of Facebook , 2010, Inf. Technol. People.
[41] D. Paulhus,et al. Effects of Self-Presentation Strategies on Personality Profiles and their Structure , 1995 .
[42] Lee Sproull,et al. What's Mine Is Ours, or Is It? A Study of Attitudes about Information Sharing , 1994, Inf. Syst. Res..
[43] Steven Hitlin,et al. Values as the core of personal identity: Drawing links between two theories of self. , 2003 .
[44] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[45] T. Abel,et al. Mind, Self, and Society , 1934 .
[46] Marcus K. Rogers. The role of criminal profiling in the computer forensics process , 2003, Comput. Secur..
[47] Wenjie Wang,et al. A contextual framework for combating identity theft , 2006, IEEE Security & Privacy.
[48] Dorothy E. Leidner,et al. Review: A Review of Culture in Information Systems Research: Toward a Theory of Information Technology Culture Conflict , 2006, MIS Q..
[49] Sally Atkinson,et al. Trust in managerial relationships , 2003 .
[50] Lionel Wee,et al. Personal Branding and the Commodification of Reflexivity , 2010 .