Improving protection mechanisms by understanding online risk
暂无分享,去创建一个
Shirley Atkinson | Andrew D. Phippen | Chris A. Johnson | S. Atkinson | A. Phippen | Chris A. Johnson
[1] S. Margulis. Conceptions of Privacy: Current Status and Next Steps , 1977 .
[2] Frank Furedi,et al. Culture of Fear , 1997 .
[3] Lincoln Dahlberg,et al. Internet Research Tracings: Towards Non-Reductionist Methodology , 2006, J. Comput. Mediat. Commun..
[4] J. Alwang. Vulnerability : a view from different disciplines , 2001 .
[5] J. C. Cannon. Privacy: What Developers and IT Professionals Should Know , 2004 .
[6] C. Fraser,et al. A High-Tech Twist on Abuse: Technology, Intimate Partner Stalking, and Advocacy , 2005 .
[7] R. Yin. Case Study Research: Design and Methods , 1984 .
[8] Ian Goldberg,et al. Privacy-Enhancing Technologies for the Internet, II: Five Years Later , 2002, Privacy Enhancing Technologies.
[9] Simson Garfinkel,et al. Database Nation , 2000 .
[10] R. Clarke. Situational Crime Prevention , 1995, Crime and Justice.
[11] Tamara Dinev,et al. Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..
[12] Steven Furnell. End-Users: Internet threats to end-users: Hunting easy prey , 2005 .
[13] Herbert Burkert,et al. Privacy-enhancing technologies: typology, critique, vision , 1997 .
[14] Colin J. Bennett,et al. The Distribution of Privacy Risks: Who Needs Protection? , 1998, Inf. Soc..
[15] William L. Simon,et al. The Art of Deception: Controlling the Human Element of Security , 2001 .
[16] Janis Wolak,et al. The Internet and Family and Acquaintance Sexual Abuse , 2005, Child maltreatment.