A Content Analysis of the Privacy Policies of Cloud Computing Services
暂无分享,去创建一个
[1] Sue R. Faerman,et al. Can Linguistic Predictors Detect Fraudulent Financial Filings , 2010 .
[2] R. Flesch. A new readability yardstick. , 1948, The Journal of applied psychology.
[3] Bill McDonald,et al. Measuring Readability in Financial Disclosures , 2013 .
[4] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[5] R. Chun. How Virtuous Global Firms Say They Are: A Content Analysis of Ethical Values , 2019 .
[6] Nili Steinfeld,et al. "I agree to the terms and conditions": (How) do users read privacy policies online? An eye-tracking experiment , 2016, Comput. Hum. Behav..
[7] James G. Maxham,et al. Firms Reap what they Sow: The Effects of Shared Values and Perceived Organizational Justice on Customers’ Evaluations of Complaint Handling , 2003 .
[8] Tim Loughran,et al. When is a Liability not a Liability? Textual Analysis, Dictionaries, and 10-Ks , 2010 .
[9] Muttukrishnan Rajarajan,et al. A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.
[10] Boris Katz,et al. Capturing Expression Using Linguistic Information , 2005, AAAI.
[11] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[12] Siew Fan Wong,et al. Compliance to personal data protection principles: A study of how organizations frame privacy policy notices , 2017, Telematics Informatics.
[13] Kristina M. Rennekamp,et al. Disclosure Readability and the Sensitivity of Investors' Valuation Judgments to Outside Information , 2017 .
[14] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[15] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[16] F. In,et al. The Impact of Spin and Tone on Stock Returns and Volatility: Evidence from Firm-Issued Earnings Announcements and the Related Press Coverage , 2008 .
[17] Sunita Goel,et al. Beyond the numbers: Mining the Annual Reports for Hidden cues Indicative of Financial Statement Fraud , 2012, Intell. Syst. Account. Finance Manag..
[18] Noriko Kando,et al. Certainty Identification in Texts: Categorization Model and Manual Tagging Results , 2023 .
[19] J. Jenkins,et al. Simplification of Flesch Reading Ease Formula. , 1951 .
[20] Thomas B. Norton. The Non-Contractual Nature of Privacy Policies and a New Critique of the Notice and Choice Privacy Protection Model , 2016 .
[21] Megan Woods,et al. Advancing Qualitative Research Using Qualitative Data Analysis Software (QDAS)? Reviewing Potential Versus Practice in Published Studies using ATLAS.ti and NVivo, 1994–2013 , 2016 .
[22] T. Richards,et al. The NUDIST qualitative data analysis system , 1991 .
[23] E. Henry. Market Reaction to Verbal Components of Earnings Press Releases: Event Study Using a Predictive Algorithm , 2006 .
[24] J. M. L. Williamson,et al. Analysis of patient information leaflets provided by a district general hospital by the Flesch and Flesch–Kincaid method , 2010, International journal of clinical practice.
[25] Eric Abrahamson,et al. THE INFORMATION CONTENT OF THE PRESIDENT'S LETTER TO SHAREHOLDERS , 1996 .
[26] H. Harris. Content Analysis of Secondary Data: A Study of Courage in Managerial Decision Making , 2001 .
[27] James W. Pennebaker,et al. Experimental manipulations of perspective taking and perspective switching in expressive writing , 2011, Cognition & emotion.
[28] E. Henry. Are Investors Influenced By How Earnings Press Releases Are Written? , 2006 .
[29] Frederick W. Rankin,et al. The effects of risk preference and loss aversion on individual behavior under bonus, penalty, and combined contract frames , 2013 .
[30] R. Taffler,et al. The chairman’s statement ‐ A content analysis of discretionary narrative disclosures , 2000 .
[31] Mark P. Gergen. The Use of Open Terms in Contract , 1992 .
[32] Graeme Hirst,et al. Detecting Stylistic Inconsistencies in Collaborative Writing , 1996, The New Writing Environment.
[33] R. P. Fishburne,et al. Derivation of New Readability Formulas (Automated Readability Index, Fog Count and Flesch Reading Ease Formula) for Navy Enlisted Personnel , 1975 .
[34] Steven E. Stemler,et al. An Overview of Content Analysis. , 2001 .
[35] Kenneth J. Merkley,et al. The Effect of Annual Report Readability on Analyst Following and the Properties of Their Earnings Forecasts , 2011 .
[36] Martin Gilje Jaatun,et al. Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..
[37] Robert J. Kauffman,et al. A Survey of Consumer Information Privacy from the Accounting Information Systems Perspective , 2011, J. Inf. Syst..
[38] T. Muhr. ATLAS/ti — A prototype for the support of text interpretation , 1991 .
[39] Claudiu Brandas,et al. Global Perspectives on Accounting Information Systems: Mobile and Cloud Approach , 2015 .
[40] Tim Loughran,et al. Measuring Readability in Financial Disclosures: Measuring Readability in Financial Disclosures , 2014 .
[41] J. M. Gnanasekar,et al. Cloud Computing Overview, Security Threats and Solutions-A Survey , 2016, ICIA.
[42] Christopher Millard,et al. Contracts for Clouds: Comparison and Analysis of the Terms and Conditions of Cloud Computing Services , 2011 .
[43] Mary J. Culnan,et al. Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .
[44] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[45] George Lakoff,et al. Hedges: A Study In Meaning Criteria And The Logic Of Fuzzy Concepts , 1973 .
[46] V. Mahajan,et al. Introduction Strategy for New Products with Positive and Negative Word-of-Mouth , 1984 .
[47] H. Tan,et al. How does readability influence investors' judgments? Consistency of benchmark performance matters , 2015 .
[48] David C. Yen,et al. The effect of online privacy policy on consumer privacy concern and trust , 2012, Comput. Hum. Behav..
[49] Michael K Paasche-Orlow,et al. Readability standards for informed-consent forms as compared with actual readability. , 2003, The New England journal of medicine.
[50] Farrukh Shahzad,et al. State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions , 2014, EUSPN/ICTH.
[51] T. Grance,et al. SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) , 2010 .