Anonymous mechanisms in group decision support systems communication
暂无分享,去创建一个
[1] Arjen K. Lenstra,et al. Factoring With Two Large Primes , 1990, EUROCRYPT.
[2] Alan R. Dennis,et al. A conceptual framework of anonymity in Group Support Systems , 1992 .
[3] Leonard M. Jessup,et al. The Effects of Anonymity on GDSS Group Process with an Idea-Generating Task , 1990, MIS Q..
[4] David Chaum,et al. Achieving Electronic Privacy , 1992 .
[5] K. H. Price. Decision responsibility, task responsibility, identifiability, and social loafing , 1987 .
[6] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[7] E. Diener. Deindividuation, self-awareness, and disinhibition. , 1979 .
[8] Gilles Brassard,et al. Modern cryptology , 2006 .
[9] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[10] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[11] Kitty Klein,et al. The Subject-Experimenter Contract: A Reexamination of Subject Pool Contamination , 1990 .
[12] H. Lenstra,et al. Factoring integers with the number field sieve , 1993 .
[13] J. Valacich,et al. Effects of anonymity and evaluative tone on idea generation in computer-mediated groups , 1990 .
[14] Jay F. Nunamaker,et al. Facilitating Group Creativity: Experience with a Group Decision Support System , 1987, J. Manag. Inf. Syst..
[15] J. Valacich,et al. Group Size and Anonymity Effects on Computer-Mediated Idea Generation , 1992 .
[16] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[17] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[18] Andrew B. Whinston,et al. Incentives and Computing Systems for Team-Based Organizations , 1995 .
[19] William K. Graham,et al. Tasks and Task Consequences as Factors in Individual and Group brainstorming , 1975 .
[20] Dorothy E. Denning. The Clipper Encryption System , 1993 .
[21] Thomas Beth,et al. Public-Key Cryptography: State of the Art and Future Directions , 1992, Lecture Notes in Computer Science.
[22] M. Diehl,et al. Productivity loss in brainstorming groups: Toward the solution of a riddle. , 1987 .
[23] Lai Lai Tung,et al. The effects of dialectical inquiry, devil's advocacy, and consensus inquiry methods in a GSS environment , 1993, Inf. Manag..
[24] Bezalel Gavish,et al. CM 3 , Looking into the Third and Fourth Dimensions of GDSS , 1994 .
[25] Robert Albanese,et al. Rational Behavior in Groups: The Free-Riding Tendency , 1985 .
[26] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[27] Jay F. Nunamaker,et al. Supporting the Search for Competitive Advantage , 1991, J. Manag. Inf. Syst..
[28] Sara Kiesler,et al. Social psychological aspects of computer-mediated communication , 1984 .
[29] Leonard M. Adleman,et al. Open problems in number theoretic complexity, II , 1994, ANTS.
[30] Carl Pomerance,et al. The Quadratic Sieve Factoring Algorithm , 1985, EUROCRYPT.
[31] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[32] T. Kuran,et al. Mitigating the tyranny of public opinion: Anonymous discourse and the ethic of sincerity , 1993 .
[33] Starr Roxanne Hiltz,et al. Experiments in group decision making, 3: disinhibition, deindividuation, and group process in pen name and real name computer conferences , 1989, Decis. Support Syst..
[34] John H. Gerdes,et al. Voting mechanisms and their implications in a GDSS environment , 1997, Ann. Oper. Res..
[35] N. Kerr,et al. Dispensability of member effort and group motivation losses: Free-rider effects , 1983 .
[36] Leonard Michael Jessup,et al. Decision Making in an Automated Environment: The Effects of Anonymity and Proximity with a Group Decision Support System* , 1991 .
[37] David R. Seibold,et al. Implications for problem‐solving groups of empirical research on ‘brainstorming’: A critical review of the literature , 1978 .
[38] David R. Seibold,et al. Potential inhibitory effects of group participation on brainstorming performance , 1977 .
[39] Arjen K. Lenstra,et al. On the Factorization of RSA-120 , 1993, CRYPTO.
[40] Sead Muftic. Security Mechanisms for Computer Networks , 1988, Comput. Networks.
[41] Bezalel Gavish,et al. CM3 : a distributed group decision support system , 1995 .
[42] T. Connolly,et al. Toward Atheory of Automated Group Work , 1990 .
[43] Jay F. Nunamaker,et al. Information technology for negotiating groups: generating options for mutual gain , 1991 .
[44] Victor H. Vroom,et al. The consequences of social interaction in group problem solving , 1969 .
[45] L. Festinger,et al. Some consequences of de-individuation in a group , 1952 .
[46] L. R. Anderson,et al. Effect of perceived expertness upon creativity of members of brainstorming groups. , 1969, The Journal of applied psychology.
[47] Myron Hatcher,et al. A video conferencing system for the United States Army: Group decision making in a geographically distributed environment , 1992, Decis. Support Syst..