Privacy dictionary: A new resource for the automated content analysis of privacy
暂无分享,去创建一个
Asimina Vasalou | Adam N. Joinson | Alastair J. Gill | Fadhila Mazanderani | Chrysanthi Papoutsi | A. Joinson | A. Vasalou | C. Papoutsi | Fadhila Mazanderani
[1] E. Rosch,et al. Cognition and Categorization , 1980 .
[2] J. Pennebaker,et al. Psychological aspects of natural language. use: our words, our selves. , 2003, Annual review of psychology.
[3] Ronald E. Rice,et al. Predicting user concerns about online privacy , 2007, J. Assoc. Inf. Sci. Technol..
[4] Jeffrey T. Hancock,et al. Expressing emotion in text-based communication , 2007, CHI.
[5] Cindy K. Chung,et al. The development and psychometric properties of LIWC2007 , 2007 .
[6] Judith Wagner DeCew,et al. The Priority of Privacy for Medical Information , 2000, Social Philosophy and Policy.
[7] Alessandro Acquisti,et al. Privacy Attitudes and Privacy Behavior - Losses, Gains, and Hyperbolic Discounting , 2004, Economics of Information Security.
[8] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[9] Darhl M. Pedersen,et al. MODEL FOR TYPES OF PRIVACY BY PRIVACY FUNCTIONS , 1999 .
[10] J. Costello,et al. Nursing older dying patients: findings from an ethnographic study of death and dying in elderly care wards. , 2001, Journal of advanced nursing.
[11] Beverley Fehr,et al. Prototype analysis of the concepts of love and commitment , 1988 .
[12] Sonia Livingstone,et al. Children's Privacy Online: Experimenting with Boundaries Within and Beyond the Family , 2006, Computers, Phones, and the Internet.
[13] Darren Gergle,et al. The language of emotion in short blog texts , 2008, CSCW.
[14] Daniel J. Solove. A Taxonomy of Privacy , 2006 .
[15] Marshall S. Smith,et al. The general inquirer: A computer approach to content analysis. , 1967 .
[16] L. Meerabeau,et al. The management of embarrassment and sexuality in health care. , 1999, Journal of advanced nursing.
[17] Asimina Vasalou,et al. Cultural differences, experience with social networks and the nature of "true commitment" in Facebook , 2010, Int. J. Hum. Comput. Stud..
[18] Alessandro Acquisti,et al. Privacy and Security of Personal Information - Economic Incentives and Technological Solutions , 2004, Economics of Information Security.
[19] S. Petronio. Boundaries of Privacy: Dialectics of Disclosure , 2002 .
[20] A. Joinson,et al. Self-disclosure, Privacy and the Internet , 2009 .
[21] Katelyn Y. A. McKenna,et al. Oxford Handbook of Internet Psychology , 2007 .
[22] Lee S. Strickland,et al. Technology, security, and individual privacy: New tools, new threats, and new public perceptions , 2005, J. Assoc. Inf. Sci. Technol..
[23] Anil Kumar. Understanding Privacy , 2010 .
[24] J. W. DeCew. In Pursuit of Privacy: Law, Ethics, and the Rise of Technology , 1997 .
[25] Michael A. Menlowe,et al. Philosophical Dimensions of Privacy: An Anthology , 2009 .
[26] Robert E. Kraut,et al. Computers, Phones, and the Internet - Domesticating Information Technology , 2006, Computers, Phones, and the Internet.
[27] Mike Z. Yao,et al. Predicting user concerns about online privacy , 2007 .
[28] Jim Harper,et al. With A Grain of Salt: What Consumer Privacy Surveys Don't Tell Us , 2002 .
[29] Priscilla M. Regan. Legislating Privacy: Technology, Social Values, and Public Policy , 1995, The Handbook of Privacy Studies.
[30] Adam N. Joinson,et al. Measuring self-disclosure online: Blurring and non-response to sensitive items in web-based surveys , 2008, Comput. Hum. Behav..
[31] Susan R. Fussell,et al. Text analysis as a tool for analyzing conversation in online support groups , 2004, CHI EA '04.
[32] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[33] James B. Rule,et al. Privacy in PerilHow We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience , 2009 .
[34] Paul Dourish,et al. Unpacking "privacy" for a networked world , 2003, CHI '03.
[35] W. Parent. Privacy, morality, and the law , 1985 .
[36] Mika Raento,et al. Designing for privacy and self-presentation in social awareness , 2008, Personal and Ubiquitous Computing.
[37] M. Angela Sasse,et al. Taming the wolf in sheep's clothing: privacy in multimedia communications , 1999, MULTIMEDIA '99.
[38] Cindy K. Chung,et al. The Psychological Functions of Function Words , 2007 .
[39] David J. Werrett,et al. The National DNA Database , 1997 .
[40] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[41] L. Skinns,et al. Choice, Privacy and Publicly Funded Legal Advice at Police Stations , 2010 .
[42] Jeffrey T. Hancock,et al. On Lying and Being Lied To: A Linguistic Analysis of Deception in Computer-Mediated Communication , 2007 .
[43] D. Knights,et al. Walking with Moneylenders: The Ecology of the UK Home-collected Credit Industry , 2006 .
[44] Paul Rayson. Wmatrix : a web-based corpus processing environment , 2022 .
[45] Judy Anderson,et al. The War on Privacy/Privacy in Peril: How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience , 2011 .
[46] Susan T. Dumais,et al. The latent semantic analysis theory of knowledge , 1997 .
[47] Louis A. Gottschalk,et al. Computerized content analysis of natural language , 1989, Artif. Intell. Medicine.
[48] Satanjeev Banerjee,et al. The Design, Implementation, and Use of the Ngram Statistics Package , 2003, CICLing.
[49] Philip J. Stone,et al. Extracting Information. (Book Reviews: The General Inquirer. A Computer Approach to Content Analysis) , 1967 .
[50] Herman T. Tavani,et al. PHILOSOPHICAL THEORIES OF PRIVACY: IMPLICATIONS FOR AN ADEQUATE ONLINE PRIVACY POLICY , 2007 .
[51] Alastair J. Gill,et al. Language With Character: A Stratified Corpus Comparison of Individual Differences in E-Mail Communication , 2006 .
[52] Yvonne Rogers,et al. From spaces to places: emerging contexts in mobile privacy , 2009, UbiComp.
[53] John Karat,et al. Privacy and HCI: methodologies for studying privacy issues , 2006, CHI Extended Abstracts.
[54] M. Engelmann. The Philosophical Investigations , 2013 .
[55] A. Joinson,et al. Development of measures of online privacy concern and protection for use on the Internet , 2007, J. Assoc. Inf. Sci. Technol..
[56] J. Pennebaker,et al. The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods , 2010 .
[57] Eleanor Rosch,et al. Principles of Categorization , 1978 .
[58] Tristan Henderson,et al. Privacy in Location-Aware Computing Environments , 2007, IEEE Pervasive Computing.