Information Technology Reference
In-Depth Information
Mediated Communication, 7
(3). Retrieved from
http://www.ascusc.org/jcmc/vol7/issue3/doering.
html
Gudykunst, W. B., Yang, S. M., & Nishida, T.
(1985). A cross-cultural test of uncertainty re-
duction theory: Comparisons of acquaintances,
friends, and dating relationships in Japan, Korea,
and the United States.
Human Communication
Research, 11
, 407-454.
Ebenkamp, B. (2002). Brand keys to travel sites.
Brandweek,
43
(25), 19.
Eirinaki, M., & Vazirgiannis, M. (2003). Web
mining for Web personalization.
ACM Transac-
tions on Internet Technology, 3
(1), 1-27.
Hagel, J., & Rayport, J. F. (1997). The coming
battle for customer information.
Harvard Busi-
ness Review,
75
(1), 53-65.
Fairclough, N. (2001).
Language and power
(2nd
ed.). London: Longman.
Halliday, M. A. K. (1994).
Introduction to
functional grammar
(2nd ed.). London: Edward
Arnold.
Federal Trade Commission. (1998).
Privacy on-
line: A report to Congress
. Retrieved from http://
www.ftc.gov/reports/privacy3/priv-23a.pdf
Hammer, M. R., & Martin, J. N. (1992). The
effects of cross-cultural training on American
managers in a Japanese-American joint venture.
Journal of Applied Communication Research,
20
, 161-182.
Federal Trade Commission. (2000).
Privacy on-
line: Fair information practices in the electronic
marketplace
(A Report to Congress). Retrieved
from http://www.ftc.gov/reports/privacy2000/
privacy2000.pdf
Han, P., & Maclaurin, A. (2002). Do consum-
ers really care about online privacy?
Marketing
Management,
11
(1), 35-38.
Fletcher, K. (2003). Consumer power and privacy:
The changing nature of CRM.
International
Journal of Advertising, 22
(2), 249-272.
Harding, W. T., Reed, A. J., & Gray, R. L. (2001).
Cookies and Web bugs: What they are and how
they work together.
Information Systems Manage-
ment, 18
(3), 17-24.
Forrester Research. (2002, August 29). US eCom-
merce — The next five years.
M2 Presswire
.
Ghosh, A. (2001).
Security and privacy for e-
business
. New York: Wiley.
Johnson-Page, G. F., & Thatcher, R. S. (2001).
B2C data privacy policies: Current trends.
Man-
agement Decision, 39
(4), 262-271.
Grabowski, M., & Roberts, K. (1998). Risk miti-
gation in virtual organizations.
Journal of Com-
puter-Mediated Communication, 3
(4). Retrieved
from http://jcmc.huji.ac.il/vol3/issue4/grabowski.
html
Kabanoff, B. (1996). Computers can read as well
as count: How computer-aided text analysis can
benefit organizational research.
Journal of Or-
ganizational Behavior, 3
, 1-21.
Kay, R. (2004, March 15). Quick study: Privacy
glossary.
Computerworld
, 41.
Graeff, T. R., & Harmon, S. (2002). Collecting and
using personal data: Consumers' awareness and
concerns.
The Journal of Consumer Marketing,
19
(4/5), 302-318.
Kelle, U., & Laurie, H. (1995). Computer use in
qualitative research and issues of validity. In U.
Kelle (Ed.),
Computer-aided qualitative data
analysis. Theory, methods and practice
(pp. 19-
28). London: Sage.
Greenbaum, S., & Quirk, R. (1990).
A student's
grammar of the English language
. Harlow:
Longman.
Search WWH ::
Custom Search