[1]
|
ComputingCases.Org, 2011.
http://computingcases.org/general_tools/sia/socio_tech_system.html
|
[2]
|
Principia Cybernetica Web, “Socio-Technical System,” 2011. http://pespmc1.vub.ac.be/ASC/Socio-_Syste.html
|
[3]
|
ComputingCases.Org, Editorial Content, 2012.
http://computingcases.org/general_tools/sia/socio_tech_system.html
|
[4]
|
ComputingCases.Org, Editorial Content, 2011.
http://computingcases.org/general_tools/sia/socio_tech_system.html
|
[5]
|
M. Michelle, “New Privacy Legislation,” Beyond Numbers, 2003. http://www.ica.bc.ca/kb.php3?pageid=2326
|
[6]
|
B. J. Fogg, “How Do People Evaluate a Web Site’s Credibility?” 2002.
http://www.nd.edu/~cclark2/capp30523/PDFs/HowDoPeopleEvaluate.pdf
|
[7]
|
A. Alessandro and J. Tsai, S. Egelmana and L. Cranor, “The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study,” Carnegie Mellon University, Pittsburgh, 2007.
|
[8]
|
G. Robert, “Do Consumers Care about Online Privacy?” 2007. http://www.mendeley.com/research/consumers-care-about-online-privacy/
|
[9]
|
OUT-LAW News Editorial, “Regulators Demand Clearer Privacy Policies,” 2009.
http://www.out-law.com//default.aspx?page=9795
|
[10]
|
B. Spencer, “The Effects of Privacy Policy Statements on Customer Behavior,” 1999.
http://www.techrepublic.com/article/the-effects-of-privacy-policy-statements-on-customer-behavior/5032632
|
[11]
|
Treasury Board of Canada Secretariat, “Guidelines for Privacy Breaches,” 2011.
http://www.tbs-sct.gc.ca/atip-aiprp/in-ai/in-ai2007/breach-atteint-eng.asp
|
[12]
|
A. Figueroa, “Privacy Issues Hit Facebook (Again),” 2010. http://www.pcworld.com/article/202315/privacy_concerns_hit_facebook_again.html
|
[13]
|
N. O’Neill, “10 Privacy Settings Every Facebook User Should Know,” 2009.
http://www.allfacebook.com/facebook-privacy-2009-02
|
[14]
|
Federal Trade Commission, “Choice Point Settles Data Security Breach Charges; to Pay $10 Million in Civil Penalties, $5 Million for Consumer Redress,” 2006.
http://www.ftc.gov/opa/2006/01/choicepoint.shtm
|
[15]
|
Electronic Privacy Information Center, “Choice Point: Introduction and Background,” 2001.
http://epic.org/privacy/choicepoint/
|
[16]
|
K. Tedder, “Don’t Wait for a Data Compromise,” 2010.
https://www.firstdata.com/downloads/thought-leadership/fd-data-compromise-wp.pdf.
|
[17]
|
H. Nissenbaum, “Technology, Policy, and the Integrity of Social Life,” Stanford University Press, Stanford, 2010.
|
[18]
|
L. Ponemon, “Institute Research Editorial Report,” 2010.
http://www.ponemon.org/about-ponemon-research
|
[19]
|
F. Y. Rashid, “IT Security & Network Security News & Reviews: 10 Biggest Data Breaches of 2011 So Far,” 2011.
http://www.eweek.com/c/a/Security/10-Biggest-Data-Breaches-of-2011-So-Far-175567/
|
[20]
|
C. Sturdevant, “Danger: Privacy Agreements,” 2012.
http://www.pcmag.com/article2/0,2817,1752833,00.asp
|
[21]
|
C. Sturdevant, “IT Security & Network Security News,” 2005.
http://www.eweek.com/c/a/Security/Danger-Privacy-Agreements/
|
[22]
|
Second Moment, “Georgetown Internet Privacy Policy Survey,” 2003.
http://www.secondmoment.org/etal-column/georgetown.php
|
[23]
|
http://www.ftc.gov/os/1998/9808/geo-cmpl.htm
http://www.ftc.gov/os/1999/9902/9823015d&o.htm
|
[24]
|
GVU’s 10th WWW User Survey, 1998.
http://www.cc.gatech.edu/gvu/user_surveys/survey-1998-10/
|