Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
暂无分享,去创建一个
[1] Cai Dong-feng. Review of knowledge management , 2008 .
[2] Mukesh Singhal,et al. Trust Management in Distributed Systems , 2007, Computer.
[3] Stuart J. Barnes,et al. Initial trust and online buyer behaviour , 2007, Ind. Manag. Data Syst..
[4] Koutarou Suzuki,et al. RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.
[5] ProTon Europe,et al. Ethics and technology : ethical issues in an age of information and communication technology , 2007 .
[6] Feroz Ahmed Siddiqui,et al. Organisational critical success factors in adoption of e-banking at the Woolwich bank , 2006, Int. J. Inf. Manag..
[7] Julia Brande Earp,et al. An experimental economics approach toward quantifying online privacy choices , 2006, Inf. Syst. Frontiers.
[8] A. Wall,et al. Identifying the Links Between White-collar Crime and Terrorism , 2006 .
[9] Stephen A. Weis. Privacy Enhancing Technologies , 2006, IEEE Security & Privacy Magazine.
[10] Gurpreet Dhillon,et al. Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..
[11] Lance J. Hoffman,et al. Trust beyond security: an expanded trust model , 2006, CACM.
[12] Dieter Gollmann,et al. Why Trust is Bad for Security , 2006, Electron. Notes Theor. Comput. Sci..
[13] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[14] Shuchih Ernest Chang,et al. Organizational factors to the effectiveness of implementing information security management , 2006, Ind. Manag. Data Syst..
[15] Thomas Daemen and Ira Rubinstein. The Identity Metasystem: Towards a Privacy-Compliant Solution to the Challenges of Digital Identity , 2006 .
[16] Peter Fleischer,et al. EU data privacy in practice - Microsoft's approach to compliance , 2006, Comput. Law Secur. Rev..
[17] Anza Akram,et al. Electronic Privacy: Patient Concerns , 2015, Communications of the IIMA.
[18] Richard A. Spinello. CyberEthics - morality and law in cyberspace (3. ed.) , 2006 .
[19] Judy Drennan,et al. Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users , 2006, J. Organ. End User Comput..
[20] David F. Rico. A Framework for Measuring ROI of Enterprise Architecture , 2006 .
[21] Moez Limayem,et al. A Critical Review of Online Consumer Behavior: Empirical Research , 2005, J. Electron. Commer. Organ..
[22] Diana C. Mutz. Social Trust and E-Commerce Experimental Evidence for the Effects of Social Trust on Individuals’ Economic Behavior , 2005 .
[23] Atul Gupta,et al. Information systems security issues and decisions for small businesses: An empirical examination , 2005, Inf. Manag. Comput. Security.
[24] Peter R.J. Trim,et al. Managing computer security issues: preventing and limiting future threats and disasters , 2005 .
[25] Yolande E. Chan,et al. Theoretical Explanations for Firms' Information Privacy Behaviors , 2005, J. Assoc. Inf. Syst..
[26] Wen-Ying Wang,et al. Intellectual capital and performance in causal models: Evidence from the information technology industry in Taiwan , 2005 .
[27] Stuart Dillon,et al. Perceived Risk, the Internet Shopping Experience and Online Purchasing Behavior: A New Zealand Perspective , 2005, J. Glob. Inf. Manag..
[28] Vijay Varadharajan,et al. Designing secure wireless mobile ad hoc networks , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[29] J. A. Harding *,et al. An enterprise modeling and integration framework based on knowledge discovery and data mining , 2005 .
[30] Anne L. Powell,et al. Information Security Threats and Practices in Small Businesses , 2005, Inf. Syst. Manag..
[31] Veda C. Storey,et al. Privacy, fair information practices and the fortune 500: the virtual reality of compliance , 2005, DATB.
[32] Weisong Shi,et al. PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[33] Matthew K. O. Lee,et al. The Asymmetric Effect of Website Attribute Performance on Satisfaction: An Empirical Study , 2004, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[34] Silke Holtmanns,et al. Trust and Privacy in Context-Aware Support for Communication in Mobile Groups , 2005 .
[35] William L. Sparks,et al. The importance of building social capital , 2005 .
[36] K. Cameron. The Laws of Identity , 2005 .
[37] Julie Cameron,et al. Ten Concepts for an eBusiness Collaborative Project Management Framework , 2005, Bled eConference.
[38] D. Harrison Charles J Vivek McKnight,et al. Dispositional Trust And Distrust Distinctions in Predicting High- and Low-Risk Internet Expert Advice Site Perceptions , 2005 .
[39] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[40] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[41] Vijay Varadharajan,et al. Enhancing grid security with trust management , 2004, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004.
[42] K.S.J. Pister,et al. An ultra-low energy microcontroller for Smart Dust wireless sensor networks , 2004, 2004 IEEE International Solid-State Circuits Conference (IEEE Cat. No.04CH37519).
[43] Tom Stafford,et al. Spyware: The Ghost in the Machine , 2004, Commun. Assoc. Inf. Syst..
[44] Zhaoyu Liu,et al. A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..
[45] Ramanathan V. Guha,et al. Propagation of trust and distrust , 2004, WWW '04.
[46] Muthucumaru Maheswaran,et al. A trust brokering system and its application to resource management in public-resource grids , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[47] M. Wade,et al. Review: the resource-based view and information systems research: review, extension, and suggestions for future research , 2004 .
[48] Xin Li,et al. Predicting user trust in information systems: a comparison of competing trust models , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[49] Varun Grover,et al. The Role of System Trust in Business-to-Consumer Transactions , 2003, J. Manag. Inf. Syst..
[50] Linda Volonino,et al. Principles and practice of information security : protecting computers from hackers and lawyers , 2004 .
[51] H. Jeff Smith. Information Privacy and its Management , 2004, MIS Q. Executive.
[52] Marit Hansen,et al. Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..
[53] Lina Zhou,et al. Managing Web Services Security , 2004, AMCIS.
[54] Claire Gauzente. WEB MERCHANTS' PRIVACY AND SECURITY STATEMENTS: HOW REASSURING ARE THEY FOR CONSUMERS? A TWO-SIDED APPROACH , 2004 .
[55] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[56] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[57] Matt Bishop,et al. What Is Computer Security? , 2003, IEEE Secur. Priv..
[58] Rahul Roy,et al. Dynamics of organizational information security , 2003 .
[59] Srinivasan Seshan,et al. IrisNet: An Architecture for a Worldwide Sensor Web , 2003, IEEE Pervasive Comput..
[60] Chrysanthos Dellarocas,et al. The Digitization of Word-of-Mouth: Promise and Challenges of Online Feedback Mechanisms , 2003, Manag. Sci..
[61] Neil F. Doherty,et al. The application of information security policies in large UK-based organizations: an exploratory investigation , 2003, Inf. Manag. Comput. Secur..
[62] Seungjoon Lee,et al. Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[63] Yong Chen,et al. Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..
[64] Susan Wiedenbeck,et al. On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..
[65] Audun Jøsang,et al. Simulating the Effect of Reputation Systems on E-markets , 2003, iTrust.
[66] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[67] Michael J. Gallivan,et al. Trust, control and the role of interorganizational systems in electronic partnerships , 2003, Inf. Syst. J..
[68] Hock-Hai Teo,et al. An integrative study of information systems security effectiveness , 2003, Int. J. Inf. Manag..
[69] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[70] Paul A. Pavlou,et al. Building Effective Online Marketplaces with Institution-Based Trust , 2004, Inf. Syst. Res..
[71] Paul A. Pavlou,et al. Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior , 2002, MIS Q..
[72] Charles J. Kacmar,et al. Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..
[73] P. Resnick,et al. Eliciting Honest Feedback in Electronic Markets , 2002 .
[74] Anol Bhattacherjee,et al. Individual Trust in Online Firms: Scale Development and Initial Test , 2002, J. Manag. Inf. Syst..
[75] Yolanda Gil,et al. Trusting Information Sources One Citizen at a Time , 2002, SEMWEB.
[76] Ian Clarke,et al. Protecting Free Expression Online with Freenet , 2002, IEEE Internet Comput..
[77] Lik Mui,et al. Computational models of trust and reputation: agents, evolutionary games, and social networks , 2002 .
[78] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[79] Jaswinder Pal Singh,et al. Computing and using reputations for internet ratings , 2001, EC '01.
[80] Karl Aberer,et al. Managing trust in a peer-2-peer information system , 2001, CIKM '01.
[81] Roger Clarke,et al. Person location and person tracking - Technologies, risks and policy implications , 2001, Inf. Technol. People.
[82] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[83] Varun Grover,et al. General Perspectives on Knowledge Management: Fostering a Research Agenda , 2001, J. Manag. Inf. Syst..
[84] Albert H. Segars,et al. Knowledge Management: An Organizational Capabilities Perspective , 2001, J. Manag. Inf. Syst..
[85] B. Gallupe,et al. Knowledge management systems: surveying the landscape , 2001 .
[86] Gordon Bell,et al. A personal digital store , 2001, CACM.
[87] Kristofer S. J. Pister,et al. Smart Dust: Communicating with a Cubic-Millimeter Computer , 2001, Computer.
[88] Richard A. Spinello,et al. Cyberethics: Morality and Law in Cyberspace , 2001 .
[89] D. Gefen,et al. E-commerce: the role of familiarity and trust , 2000 .
[90] John Riedl,et al. Explaining collaborative filtering recommendations , 2000, CSCW '00.
[91] Chrysanthos Dellarocas,et al. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.
[92] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[93] R. Smith,et al. Compilation of State and Federal Privacy Laws , 2000 .
[94] Gurpreet Dhillon,et al. Technical opinion: Information system security management in the new millennium , 2000, CACM.
[95] M. Culnan. Protecting Privacy Online: Is Self-Regulation Working? , 2000 .
[96] Daniel W. Manchala. E-Commerce Trust Metrics and Models , 2000, IEEE Internet Comput..
[97] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[98] Margaret Ross,et al. BS7799: A Suitable Model for Information Security Management , 2000 .
[99] N. L. Chervany,et al. What is Trust? A Conceptual Analysis and an Interdisciplinary Model , 2000 .
[100] Omar El Sawy,et al. IT-Intensive Value Innovation in the Electronic Economy: Insights From Marshall Industries , 1999, MIS Q..
[101] Lorne Olfman,et al. On becoming virtual: the driving forces and arrangements , 1999, SIGCPR '99.
[102] Donna L. Hoffman,et al. Building consumer trust online , 1999, CACM.
[103] R. Hoyle. Statistical Strategies for Small Sample Research , 1999 .
[104] John Hulland,et al. Use of partial least squares (PLS) in strategic management research: a review of four recent studies , 1999 .
[105] D. J. Knight. Performance measures for increasing intellectual capital , 1999 .
[106] Roger Clarke,et al. Internet privacy concerns confirm the case for intervention , 1999, CACM.
[107] Chi Wai Chung,et al. Computer based information systems (CBIS) adoption in small businesses : Hong Kong experience and success factors , 1999 .
[108] Dorothy E. Denning,et al. HIDING CRIMES IN CYBERSPACE , 1999 .
[109] Andrew B. Whinston,et al. Building trust in the electronic market through an economic incentive mechanism , 1999, ICIS.
[110] Audun Jøsang,et al. An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.
[111] M. Culnan,et al. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .
[112] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[113] C. Calhoun. Community without Propinquity Revisited: Communications Technology and the Transformation of the Urban Public Sphere , 1998 .
[114] Paul Grosswiler,et al. Historical Hopes, Media Fears, and the Electronic Town Meeting Concept: Where Technology Meets Democracy or Demagogy? , 1998 .
[115] Adam Rifkin,et al. Trust Management on the World Wide Web , 1998, Comput. Networks.
[116] Wynne W. Chin. Issues and Opinion on Structural Equation Modeling by , 2009 .
[117] N. Bontis. Intellectual capital: an exploratory study that develops measures and models , 1998 .
[118] Audun J sang,et al. An Algebra for Assessing Trust in Certi cation Chains , 1998 .
[119] H. Nissenbaum. Toward an Approach to Privacy in Public: Challenges of Information Technology , 1997 .
[120] James H. Moor,et al. Towards a theory of privacy in the information age , 1997, CSOC.
[121] Peter P. Swire. Markets, Self-Regulation, and Government Enforcement in the Protection of Personal Information, in Privacy and Self-Regulation in the Information Age by the U.S. Department of Commerce. , 1997 .
[122] John G. Lynch,et al. Interactive Home Shopping: Consumer, Retailer, and Manufacturer Incentives to Participate in Electronic Marketplaces , 1997 .
[123] Kerry Ferguson,et al. World Information Flows and the Impact of New Technology , 1997, 1997 International Symposium on Technology and Society Technology and Society at a Time of Sweeping Change. Proceedings.
[124] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[125] Richard Wise,et al. Global paradox , 1996, The Lancet.
[126] Karen D. Loch,et al. Evaluating ethical decision making and computer use , 1996, CACM.
[127] H. Jeff Smith,et al. Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..
[128] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[129] K. Hacker. Missing links in the evolution of electronic democratization , 1996 .
[130] Lewis A. Friedland. Electronic democracy and the new citizenship , 1996 .
[131] James Backhouse,et al. Risks in the use of information technology within organizations , 1996 .
[132] Kenneth C. Laudon,et al. Markets and privacy , 1993, CACM.
[133] William L. Fuerst,et al. Information technology and sustained competitive advantage: a resource-based analysis , 1995 .
[134] Karen D. Loch,et al. Ethics and computer use , 1995, CACM.
[135] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[136] A. Michael Froomkin,et al. Anonymity and its Enmities , 1995 .
[137] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[138] Mary J. Culnan,et al. "How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use , 1993, MIS Q..
[139] Dorothy E. Denning,et al. A new paradigm for trusted systems , 1993, NSPW '92-93.
[140] P. Croce. Erosion of mass culture , 1993 .
[141] William H. Dutton,et al. Political Science Research on Teledemocracy , 1992 .
[142] Roger Clarke. Extra-Organisational Systems: A Challenge to the Software Engineering Paradigm , 1992, IFIP Congress.
[143] E. Turban,et al. Information systems security: A managerial perspective , 1992 .
[144] Houston H. Carr,et al. Threats to Information Systems: Today's Reality, Yesterday's Understanding , 1992, MIS Q..
[145] Yolande E. Chan. Business Strategy, Information Systems Strategy, And Strategic Fit: Measurement And Performance Impacts , 1992 .
[146] J. Ellul. Technology and Democracy , 1992 .
[147] I. Nordin,et al. State, Technology, and Planning , 1991 .
[148] Izak Benbasat,et al. Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..
[149] Thomas W. Simon. Electronic Inequality , 1991 .
[150] S. Boon,et al. The dynamics of interpersonal trust: resolving uncertainty in the ace of risk , 1991 .
[151] Gary W. Dickson,et al. A Principles-Based Enterprise Architecture: Lessons from Texaco and Star Enterprise , 1990, MIS Q..
[152] Detmar W. Straub,et al. Key information liability issues facing managers: software piracy, proprietary databases, and indi , 1990 .
[153] Karel Cool,et al. Asset stock accumulation and sustainability of competitive advantage , 1989 .
[154] D. Collard,et al. Trust : making and breaking cooperative relations , 1989 .
[155] Roger A. Clarke,et al. Information technology and dataveillance , 1988, CACM.
[156] John A. Zachman,et al. A Framework for Information Systems Architecture , 1987, IBM Syst. J..
[157] Bart Kosko,et al. Fuzzy Cognitive Maps , 1986, Int. J. Man Mach. Stud..
[158] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[159] H. P Gassmann,et al. OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .
[160] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[161] I. Ajzen,et al. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .