Information Technology Reference
In-Depth Information
Mediated Communication, 7 (3). Retrieved from
http://www.ascusc.org/jcmc/vol7/issue3/doering.
html
Gudykunst, W. B., Yang, S. M., & Nishida, T.
(1985). A cross-cultural test of uncertainty re-
duction theory: Comparisons of acquaintances,
friends, and dating relationships in Japan, Korea,
and the United States. Human Communication
Research, 11 , 407-454.
Ebenkamp, B. (2002). Brand keys to travel sites.
Brandweek, 43 (25), 19.
Eirinaki, M., & Vazirgiannis, M. (2003). Web
mining for Web personalization. ACM Transac-
tions on Internet Technology, 3 (1), 1-27.
Hagel, J., & Rayport, J. F. (1997). The coming
battle for customer information. Harvard Busi-
ness Review, 75 (1), 53-65.
Fairclough, N. (2001). Language and power (2nd
ed.). London: Longman.
Halliday, M. A. K. (1994). Introduction to
functional grammar (2nd ed.). London: Edward
Arnold.
Federal Trade Commission. (1998). Privacy on-
line: A report to Congress . Retrieved from http://
www.ftc.gov/reports/privacy3/priv-23a.pdf
Hammer, M. R., & Martin, J. N. (1992). The
effects of cross-cultural training on American
managers in a Japanese-American joint venture.
Journal of Applied Communication Research,
20 , 161-182.
Federal Trade Commission. (2000). Privacy on-
line: Fair information practices in the electronic
marketplace (A Report to Congress). Retrieved
from http://www.ftc.gov/reports/privacy2000/
privacy2000.pdf
Han, P., & Maclaurin, A. (2002). Do consum-
ers really care about online privacy? Marketing
Management, 11 (1), 35-38.
Fletcher, K. (2003). Consumer power and privacy:
The changing nature of CRM. International
Journal of Advertising, 22 (2), 249-272.
Harding, W. T., Reed, A. J., & Gray, R. L. (2001).
Cookies and Web bugs: What they are and how
they work together. Information Systems Manage-
ment, 18 (3), 17-24.
Forrester Research. (2002, August 29). US eCom-
merce — The next five years. M2 Presswire .
Ghosh, A. (2001). Security and privacy for e-
business . New York: Wiley.
Johnson-Page, G. F., & Thatcher, R. S. (2001).
B2C data privacy policies: Current trends. Man-
agement Decision, 39 (4), 262-271.
Grabowski, M., & Roberts, K. (1998). Risk miti-
gation in virtual organizations. Journal of Com-
puter-Mediated Communication, 3 (4). Retrieved
from http://jcmc.huji.ac.il/vol3/issue4/grabowski.
html
Kabanoff, B. (1996). Computers can read as well
as count: How computer-aided text analysis can
benefit organizational research. Journal of Or-
ganizational Behavior, 3 , 1-21.
Kay, R. (2004, March 15). Quick study: Privacy
glossary. Computerworld , 41.
Graeff, T. R., & Harmon, S. (2002). Collecting and
using personal data: Consumers' awareness and
concerns. The Journal of Consumer Marketing,
19 (4/5), 302-318.
Kelle, U., & Laurie, H. (1995). Computer use in
qualitative research and issues of validity. In U.
Kelle (Ed.), Computer-aided qualitative data
analysis. Theory, methods and practice (pp. 19-
28). London: Sage.
Greenbaum, S., & Quirk, R. (1990). A student's
grammar of the English language . Harlow:
Longman.
Search WWH ::




Custom Search