Monday, March 3, 2008

Conceptual Research & Reflection Project

Concept 7 Netiquette

Good communication practice on the Internet is not something one 'learns', but something one 'practices' so as to teach others, less familiar than yourself, how it is done. (Allen, n.d.)

Netiquette on the internet is simply the practice of good and polite conversation or correspondence adapted to modern day usage. Due to the fact that people view things online differently than they do a letter or printed document an informal netiquette is necessary for internet use. Advanced internet uses need to understand current netiquette and practice it to encourage others less advanced to not only do the same but enable them to understand what the posting means.

Bad netiquette is perhaps a result of people being uninformed however it also becomes obvious that the sheer anonymity of the internet can encourage people to behave differently that if they were actually interacting with people face to face. This is summed up nicely by Virginia Shea

“The message of Netiquette is that it's not acceptable. Yes, use your network connections to express yourself freely, explore strange new worlds, and boldly go where you've never gone before. But remember the Prime Directive of Netiquette: Those are real people out there.” Shea, V (2006)

To bring people to awareness of bad netiquette we must as advanced Internet users set the example, making our correspondence correct, our contributions valid and our web sites usable and polite. A good way of making a point about bad netiquette is to tell people to “Adhere to the same
standards of behavior online that you follow in real life” Shea, V (1997)
If expert uses except this standard then the less familiar have a guideline to follow.

The RFC 1855 Netiquette Guidelines, (Hambridge, S 1995) bring many different forms of netiquette
to light for different purposes such as email, user groups, mailing lists and other things. This brings
to light that there are different standards for different methods of use, and that a good idea for
directing new users to any form of communication is to direct them t
“If you’re entering a chat room
or message board for the first time, take a while to familiarise yourself with the rules that may apply.”
(Shannon, R 2008)
A good way of getting people to understand and follow basic netiquette guidelines would therefore
be to direct them to frequently asked questions of user groups and discover by reading for
themselves the nature of the group or list they plan to participate in. For instance two of the rules
that Shea, V (1997) list are the following
“Corollary 4: Read the FAQ (Frequently Asked Questions)
document” and “Corollary 2: Lurk before you leap.” These both make very good sense and new
users would be benefited by being reminded of this. Too be involved in a group or list a person
should understand exactly what the nature of it is about.

Netiquette rules whilst are not hard and fast are good starting points for the uninformed to become user friendly. There is a lot of information and groups on the Internet where there seems to be no or little netiquette applied rules. Advanced Internet users need to be aware of situation which endanger people and post advice on how to avoid it. There are many different forms of bad netiquette, some of which can be annoying or rude, however perhaps the most dangerous is the predator or criminal out there that uses Internet groups to break the law.

“When you’re communicating on the Internet take special care not to give out personal information to strangers and to treat others with respect. Be aware of the risks involved in communicating with people you cannot see and may never meet in person. Take time to consider what you write to others, and be careful to avoid humor and sarcasm except with the best of friends. You can’t assume that your messages are private, so be careful about what you write.” Ackermann E, Hartman K, (2000)

The overall concept of netiquette and good communication on the Internet should be taken that advanced Internet users need to create the impression on line that they would wish to in normal life. As stated in (Scheuermann, L, Taylor, G (1997) “While online service providers, employers, and governments each encourage good Net behavior by punishing major netiquette breaches, it is the individual users who play the biggest role in encouraging netiquette standards of politeness and courtesy.” It stands to reason that setting the example and providing useful and accessible information is the most sensible way of encouraging correct netiquette on the Internet.

Annotations
Site 1: NET-ETHIQUETTE Mini Case Studies of Dysfunctional Human Behaviour on the Net  
http://www.anu.edu.au/people/Roger.Clarke/II/Netethiquettecases
Roger Clark is a consultant specialising in eBusiness, information infrastructure, and data
surveillance and information privacy. He works through his own company
Xamax Consultancy Pty Ltd, and published his website with the infrastructure provided by the
Australian National University. Roger holds degrees Honours and Masters Degrees from the
Faculty of Commerce at the
University of N.S.W., where his studies focused on the discipline
of Information Systems. He later gained a doctorate from the
Australian National University.
His web site since being established in 1995 has attracted over 25 million hits and is linked
to from over twenty thousand pages. The web site has extensive references and links to information
and examples of netiquette use.
 
Site 2: Internet and Web Essentials: What You Need to Know
http://www.webliminal.com/essentials/eoc-rtfs/ch03.htm
Ernest C. Ackermann is a Professor of Computer of Science and holds a M.A., Ph.D., 
Pennsylvania
State University
and a B.A., Montclair State College. He currently teaches at
The University of Mary Washington in the
United States. His textbooks are used by hundreds of
schools and universities, and he presents workshops and tutorials on Internet usage.
Karen Hartman has a Masters of Arts degree in Library Science and has worked as a reference
and bibliographic instruction librarian. She currently works in the U.S. State Department as an
Information Resource officer.

Internet and Web Essentials: What You Need to Know, website summarized the published book and expands in details various areas of the Internet including email use, communications, and user net. The summary gives extensive examples and exercises as well as links to relevant content.

 
Bibliography

Ackermann, E., & Hartman, K. (2000). Chapter 3--Communication on the Internet. Retrieved April 23, 2008, from http://www.webliminal.com/essentials/eoc-rtfs/ch03.htm

Clarke, R. (1998). Roger Clarke's Netethiquette Cases. Retrieved April 23, 2008, from http://www.anu.edu.au/people/Roger.Clarke/II/Netethiquettecases.

Hambridge, S. (1995). RFC 1855: Netiquette Guidelines. Retrieved April 23, 2008, from http://www.stanton.dtcc.edu/stanton/cs/rfc1855.html.

Shannon, R. (2008). HTMLSource: HTML Tutorials. Retrieved April 23, 2008, from
http://www.yourhtmlsource.com.

Scheuermann, Larry, Taylor, Gary. (1997). Netiquette. Internet
Research, 7(4), 269-273. Retrieved April 23, 2008, from ABI/INFORM Global database. (Document ID: 117541423).
http://proquest.umi.com.dbgw.lis.curtin.edu.au/pqdweb?did=117541423&sid=2&Fmt=3&clientId=22212&RQT=309&VName=PQD

Shea, V. (1997). Netiquette, by Virginia Shea, Table of Contents and Welcome Page. Retrieved April 23, 2008, from http://www.albion.com/netiquette/book/index.html.

Sullivan, Brian (2002, March). Netiquette. Computerworld, 36(10), 48.  Retrieved April 24,
200
, from ProQuestc Computing database. (Document ID: 110226640).
http://proquest.umi.com.dbgw.lis.curtin.edu.au/pqdweb?did=110226640&sid=1&Fmt=6&clientId=22212&RQT=309&VName=PQD

12. Communication and Information are related

Advanced Internet users actively create new contexts for the information they receive as part of asychronous communication (and other forms), and then give those contexts form and utility through mechanisms such as email folder filing systems; automated processes; etc. (Allen, M, n.d)

As the Internet is developing constantly the Internet user is getting more and more options on how to record information. Such processes as filing systems in email folders and filters are becoming more developed. The use of online tools to record information and use these tools to communicate more widely with associates. As stated by Marin and Poulter “Rapidly occurring innovations in information and communication technology, particularly the widespread adoption and use of the Internet, have impacted how individuals and organizations retrieve and distribute information.” (Marin J, Poulter, A. 2003) The start of web 2 and a user’s ability to create many of there own spaces are one of the most impressive ways in which the way in which we store and look at communication and information.

The email folder and its filing system has been one of the main ways Internet communication has been stored. Emails play a large role in our personal communications. To effectively be able to refer back to things we must store these communications in folders which have been well named and are relevant to the information that they hold. The Digital Curation Manual states “This task can be largely automated, although regular human intervention is invariably required to ensure transient or temporary mails are properly deleted and that an adequate and useful folder system is established. “ (Pennock, M 2006)

Depending on our set up we can have our email filing system on our own computers or use and online email service such as hotmail, yahoo or Gmail. Another application that has been in use for a long time is the book marking system of our Internet browsers in which you can have sub folders for different subjects.

Some other applications now in use for storage of communication and information are such Web 2 applications such as blink lists, online storage facilities such as Yoono, RSS feeds which keep you up to date with topics of interest and sites such as del.icio.us which is an online social book marking site. Paul Anderson discusses this up in his report What is Web 2.0? Ideas, technologies and implications for education.

Secondly, what does topology tell us about the shape of what might be called our ‘information environment’? How does this impact on the diffusion of new knowledge and the sociology of new content creation? In the Web 2.0 era in which blogs and wikis are an important part of the mix, much is made of the Internet ‘conversation’ afforded, particularly by the rise of the blogosphere.” (Anderson, P, 2006)

All of these web 2 applications are giving us the ability to store information more effectively and more importantly online. The ability to do this takes the danger of loosing information if our own computer crashes. Online tools give us the freedom of movement in our work as we do not need to have our own computer to access our information.

There are also a number of education sites coming into the information storage game. We are now seeing such application as facebook, bibme, Universities own student storage areas, myspace and facebook This is discussed by Paul Anderson

“One area where this is already having an impact is the development of Virtual Learning
Environments (VLEs). Proponents of institutional VLEs argue that they have the advantage of any corporate system in that they reflect the organisational reality. In the educational environment this means that the VLE connects the user to university resources, regulations, help, and individual, specific content such as modules and assessment.”
(Anderson, P. 2006)

The range of information storage and how we can distribute it is getting larger all the time. Internet users can have one site such as yoono to store their information or break it down into different areas of their life such as study, business personal.

There are also now a number of applications which and internet user can download, quite often free of charge from the internet to assist in giving the information they receive form. A couple of examples of these are programs such as Bookmark Buddies and Toolbars which can store vast amounts of data, communication and information. The other aspect of this is the development of furthering the web to include mobile technology where users can access there information from a smaller device such as a mobile phone.

Annotations

Site 1: Digital Curation Centre

http://www.dcc.ac.uk/about/

Maureen is a Research Officer in UKOLN's R&D team (UK). Her areas of interest include digital preservation approaches, digital archiving & repositories, authenticity of digital objects and e-government.

The Digital Curation Centre’s web site is for U.K. institution to store, manage and preserve data to help ensure their enhancement and their continuing long-term use. Maureen Pennock’s Curation Manual: Curating E-mails has a lot of information about managing email and digital data, especially in relationship to how to format both information, attachments and communication. The web site as a whole provides a lot of useful link and information.

Site 2: Joint Information Systems Committee (JISC)

What is Web 2.0? Ideas, technologies and implications for education

http://www.jisc.ac.uk/media/documents/techwatch/tsw0701b.pdf

Paul Anderson the Technical Editor of the JISC Technology and Standards Watch Paul has a degree in computer science from the University of Leeds and has nearly twenty years experience both in academia and in industry. He has written a number of articles on computer related subjects.

The web sites is mission is to provide world class leadership in the use of Information and Communications Technology to support education and research. The paper that Paul Anderson wrote covers many areas of web 2 development and applications and how they affect education and information in many areas. Along with that particular report the web site has a lot of useful information in regards to internet research.

Bibliography

Allen, M. (n.d) Internet Communications,Concepts Document Asynchonicity. Retrieved May 8, 2008 from http://webct.curtin.edu.au/SCRIPT/305033_a/scripts/serve_home

Anderson, P. (n.d.). Published reports 2006-2008 : JISC. Retrieved May 8, 2008, from http://www.jisc.ac.uk/whatwedo/services/services_techwatch/techwatch/techwatch_ic_reports2005_published.aspx.

Chandler Project - Welcome. (n.d.). Retrieved May 6, 2008, from http://chandlerproject.org/.

Jones, W., Dumais, S., & Bruce, H. (2005). Once found, what then? A study of keeping behaviors in the personal use of Web information. American Society for Information Science and Technology, 39(1), 391-402. Retrieved May 5, 2008, from http://www3.interscience.wiley.com.dbgw.lis.curtin.edu.au/cgi-bin/fulltext/109882778/HTMLSTART.

Marin, J., & Poulter, A. (2003). Dissemination of Competitive Intelligence. Journal of Information Science, 30(2), 165-180. Retrieved May 6, 2008, from http://ejscontent.ebsco.com.dbgw.lis.curtin.edu.au/ContentServer.Net/ContentServer.aspx?target=http%3A%2F%2Fjis%2Esagepub%2Ecom%2Fcgi%2Freprint%2F30%2F2%2F165%2Epdf%3F%26UCI%5FFMT%3DKEV%26UCI%2EUserIP%3D134%2E7%2E248%2E130%26UCI%2EPID%3D.

Pennock, M. (2006, Jan. 1). Curation Manual: Curating E-mails. Retrieved May 7, 2008, from http://www.dcc.ac.uk/resource/curation-manual/chapters/curating-e-mails/.

Silver, D. (2008). History, Hype, and Hope: An Afterward . First Monday, 13(3-3). Retrieved May 8, 2008, from http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2143/1950.

Supyuenyong, V., & Islam, N. (2006, July 13). PICMET 2006 Proceedings,. Retrieved June 5, 2008, from Knowledge Management Architecture: Building Blocks and Their Relationships. http://www.jisc.ac.uk/whatwedo/services _techwatch/techwatch/techwatch_ic_reports2005_published.aspx


Concept 23 – Human-computer interfaces

The Internet lessens the recognition of difference between humans and computers because, at a distance, it is often feels similar to communicate and act on the Internet regardless of whether one is speaking with a human or a machine.

Humans have gradually accepted the presence of artificial intelligence in their life for many decades. With the invention of the first computer in the 1940s right through to the internet as it is today our lives have been quickly inundated with machine intelligence and we are increasingly dealing with machines rather than people in everyday life. From 1956 when John McCarthy (Oracle Think.com, 1997) first hosted a conference on artificial intelligence development started and has continued ever since creating a diverse array of areas where humans and machines communicate. “As popular computing has grown, the role of HCI (human-computer interaction) has increased.” (Canny, J 2006) Human Computer interfaces have been developing over the years a

On and off line gaming is a huge business today where people play themselves against machine and take it for granted. There are a multiple of web sites dedicated to online gaming. A search for online games through Google alone results in 87,200,000. A website called Zillions of Games describes itself as The first infinitely expandable PC gaming system.” (Zillions Development Corporation, 2004) Often the machine is more capable due to clever programming than playing against another player. In our everyday lives we accept more and more that a machine is going to play a major role. Most social sites such as msn for Internet Relay Chat have chat bots such as spleak (Spleak Media Network, 2008). Development in automated avatars is also making the internet and machine more lifelike. (Fix 8, 2008) Most companies we now contact have us talking to a machine before we get to talk to a real person. We are becoming immersed in the machine as much as we take eating breakfast for granted.

As human beings we understand that a lot of our interaction is with machines rather than humans because we now feel it is normal for this to happen. The use of the internet and a humans understanding of it could be entirely dependent on the user themselves For instance Olson give the example

For example, a recent study of expert/novice searchers of large knowledge sources (such as the World Wide Web) showed that both strategies and successes were highly dependent on domain expertise. The person familiar with medical information sources was much better and faster at confirming the appropriateness of a treatment for a diagnosis than the layman and worse at finding the best price for a consumer product. The search strategies were highly dissimilar and fully dependent on the domain of expertise (Bhavnani et al. 2001).” (Olson, G, Olson, J (2003)

Our perception of the internet is going to be vastly different depending on if we are an experienced user or a novice.

Many actions that we use today on the internet are direct human to machine contact. We now accept that a machine is processing our money or taking our orders, recording our diaries and sending our mail however the process through how this works is that there is human interaction at the other end. The diary would not be there unless you needed it or the bank that has our money has humans controlling it. We have now accepted that many procedures that used to take more human labour is now being handled by machines and that it is normal to deal with machine for these tasks. As stated in the website for Centre for Trade Policy Studies,

“Bank tellers have been replaced by automatic teller machines; receptionists and operators have been replaced by voice mail and automated call menus; backoffice, record-keeping and other clerical jobs have been replaced by computers; layers of middle management have been replaced by better internal communications systems.” (Lindsey, B 2004)

There is much speculation on the direction of the human /machine relationship One such example us Nick Bostrom’s

“Several authors have argued that there is a substantial chance that superintelligence may be created within a few decades, perhaps as a result of growing hardware performance and increased ability to implement algorithms and architectures similar to those used by human brains.” (Bostrom, N 2003)

The next generation of Web 2 applications, increased development in artificial intelligence could take human computer interfaces even further however time will tell.

Annotations

Site 1: A Brief History of Human Computer Interaction Technology

http://www.cs.cmu.edu/~amulet/papers/uihistory.tr.html

Brad A Myers has a PhD in Computer Science and has received a Master of Science in Computer Science and Bachelor of Science in Computer Science and Engineering. He has published books and many Journal Articles on the subject of user interfaces and has received many awards and honours in that field. He currently works in the Human-Computer Interaction Institute, School of Computer Science at Carnegie Mellon University

The paper A Brief History of Human Computer Interaction Technology outlines the history of the subject and explains various applications that have occurred from this technology. It explores how research from universities and laboratories have advanced human computer interaction and explores some future uses

Site 2: The Future of Human-Computer Interaction

http://www.acmqueue.com/modules.php?name=Content&pa=showpage&pid=402

John Canny received his B.Sc. in Computer Science and Theoretical Physics from Adelaide University in South Australia, 1979, a B.E. (Hons) in Electrical Engineering, Adelaide University, 1980, a M.S. and Ph.D. from M.I.T, 1983and 1987. His areas of research are Artificial Intelligence (AI), Control, Intelligent Systems, and Robotics (CIR), Graphics and Human-Computer Interaction (GHCI) and Security (SEC). He currently teaches at the Berkeley University of California

The paper published on Queue explores the relationship of human computer interface through the past present and future. It explores various interfaces for the future of the subject and perceptions for the future and privacy.

Bibliography

Artificial Intelligence. (n.d.). Retrieved April 22, 2008, from http://library.thinkquest.org/2705/.

Blandford, A. (2001). The Social and Interactional Dimensions of Human-Computer Interfaces. Expert Systems, 18(1), 13-18. Retrieved May 5, 2008, from
http/www.blackwell-synergy.com.dbgw.lis.curtain.edu.au - 1468-0394.00151.

Bostrom, N. (2003). Ethical Issues in Advanced Artificial Intelligence. Cognitive, Emotive and Ethical Aspects of Decision Making in Humans and in Artificial Intelligence, 2(1), 12-17. Retrieved May 5, 2008, from http://www.nickbostrom.com/ethics/ai.html.

Canny, J. (2006). The Future of Human-Computer Interaction. ACM Queue, 4(6). Retrieved May 5, 2008, from http://www.acmqueue.com/modules.php?name=Content&pa=showpage&pid=402.

David, P., Lu, T., & Cai, L. (2002, Oct. 11). Computer as Social Actors: Testing the fairness of man and machine. Retrieved April 28, 2008, from www.temple.edu/ispr/prev_conferences/proceedings/2002/Final%20papers/David,%20Lu,%20Cai.pdf.

Fix8 - Bring the Virtual World to Reality. (n.d.). Retrieved May 5, 2008, from http://www.fix8.com/.

Lidsey, B. (2004, Mar. 17). Job Losses and Trade A Reality Check. Retrieved May 5, 2008, from www.freetrade.org/pubs/briefs/tbp-019.pdf.

Myers, D. (1998). A Brief History of Human Computer Interaction Technology. Retrieved April 29, 2008, from http://www.cs.cmu.edu/~amulet/papers/uihistory.tr.html.

Olson, G., & Olson, J. (2003). Human-computer interaction: Psychological aspects of the human use of computing. Annual Review of Psychology, 54, 591-516. Retrieved April 22, 2008, from http://proquest.umi.com.dbgw.lis.curtin.edu.au/pqdweb?did=310003491&sid=2&Fmt=4&clientId=22212&RQT=309&VName=PQD.

Spleak Media Network. (n.d.). Retrieved May 5, 2008, from http://corp.spleak.com/.

Stasko , J. (1996, November 12). Computing Surveys: Future Research Directions in Human-Computer. Retrieved April 28, 2008, from http://www.cs.brown.edu/people/ifc/hci/stat.html.

Zillions of Games -- Unlimited Board Games & Puzzles. (2004). Retrieved May 5, 2008, from
http://www.zillions-of-games.com/.

Concept 26 – Privacy and Security

The Internet is a profoundly ‘open’ system and advanced Internet users are cautious about either accepting or sending material from and to unknown sources and are careful in releasing information about themselves in any form. Conceptually, the Internet challenges us to take greater responsibility for the protection of privacy and security than perhaps we are used to when dealing with the media. (Allen, n.d)

The internet is not a private space and as such users must realise that necessary measures are taken to protect not only ones personal details and identity however their own personal computer as well, to protect from all facets of internet use whether they be financial, personal or prevention of annoying spamming and overload of unwanted emails. There are many different aspects to internet security and privacy and they can affect many areas of our lives. The need is to recognize this and take steps to prevent data getting onto the web that we would not want known by the world at large, and to prevent unwanted invasion of our own computers.

One of the most important areas in which to protect ourselves is financially on the internet. A person should never give out financial details on the open internet and certainly not by email which can be stored and forwarded. The most secure way to take care of financial transactions on line is by ensuring that you use an encrypted program. As stated on the Frontline International Foundation for the Protection of Human Right Defenders “Methods of encryption have been integrated into various Internet services. Some of them affect us all.” Vitaliev, D. (2007). When giving out any financial details on the internet you must ensure that the organisation has secure programming.

Another area of great concern is protecting your personal details. One of the ramifications of doing business or socializing on the internet is not really knowing the people you are interacting with and as such would you really wanting them knowing your true name, where you live, who you family is and so on. There are many ways to protect your personal details when interacting on line. The main one is not revealing your true name.

This also applies to using any sort of online communications such as internet relay chat or user groups. Information on the net is stored and can be accessed at a later time by anyone. Any organization that you do business with, especially online may be vulnerable to leaked or hacked data or may openly share your details The Privacy rights clearing house site states “Use of your information for marketing is not limited to companies you do business with. Many companies sell or share your information to others. If you sign up for a free magazine subscription, the company may share your information with affiliates. This is similar to what happens with traditional junk mail, but since you have entered the information yourself into an electronic system, sharing with other businesses can be done rapidly and cheaply.” (Flint L, 2008)

Email is not a personal communication and as such care needs to be taken as to its content and who you reveal your email address to. It is sensible to have at least two email addresses. One for you real Isp account for friends and necessary business transaction however for any else it is sensible to have an anonymous account with a company such as hotmail or yahoo. Get Net Wise advises “Consider creating multiple e-mail addresses or accounts. Use one address for family and friends only. Do not post this address online or give it to merchants.” There are encryption programs to protect you content however the safest policy is to not post anything that you want truly private. “Relatively easy-to-use e-mail and file encryption software is available for free, such as Pretty Good Privacy (PGP, available at: http://www.pgpi.org/ ), which runs on almost all computers and even integrates seamlessly with most major e-mail software.” McCandlish, S (2002)

The dangers of email also extend to spamming in which you receive numbers of unwanted emails from advertisers ranging from anything from pornography to health care.

Everything done on the internet has a privacy and security issue. Search engines, cookies, browsing the web are all aspect that need to be considered when looking at internet privacy and security. If you are recorded on a web site or application then your details can be searched by anyone. Search engines can also record what you have searched for and your isp “Search engines have and use the ability to track each one of your searches. They can record your IP address, the search terms you used, the time of your search, and other information. “(Flint L, 2008) A search engine is not an anonymous application and therefore you need to think about what you type into it. All internet users should consider all of the above factors prior to using the internet.

Site 1: EFF's Top 12 Ways to Protect Your Online Privacy

http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy.

Stanton McCandlish Was educated at The University of New Mexico, Eastern New Mexico University and The College of Santa Fe and is currently working as Communications Director at CryptoRights Foundation and Principal at McCandlish Consulting. His areas of expertise are Web standards compliance, Web usability auditing, blog installation & customization, Web site design & redesign, management of Web development teams, media relations, public relations; organizational communications strategy, advocacy, policy analysis

The Electronic Frontier Foundation is a web site dedicated to championing the public interest in every critical battle affecting digital rights. EFF's Top 12 Ways to Protect Your Online Privacy has a lot of links to programs to help protect oursleves online and links to other privacy web sites.

Site 2: World Privacy Forum

http://www.worldprivacyforum.org/index.html

Pam Dixon founded the world privacy forum in 2003 and also serves as co-chair of the California Privacy and Security Advisory Board, a state level board which reports to the California Secretary of Health. She has researched and published both books and papers and report on technology-related privacy issues. She has also written two critically acclaimed books about technology and consumers.

The World Privacy Forum is a not for profit organization which focus’s on providing information about in-depth research, analysis, and consumer education in the area of privacy. The web site has extensive information about online security and privacy as well as links to other helpful sites.

Bibliography

Bacard's, A. (2007). Author Andr&eacute Bacard's "Facts, Fables & Foibles". Retrieved Apr. 25, 2008, from http://www.andrebacard.com/remail.html.

Dinev, T., & Hart, P. (2006). Privacy Concerns and Levels An Empirical Investigation of. e services journal, /, 25-59. Retrieved May 5, 2008, from http://muse.uq.edu.au.dbgw.lis.curtin.edu.au/journals/eservice_journal/v004/4.3dinev.html.

Dixon, P. (2008). World Privacy Forum: Search Engine Privacy Tips . Retrieved Apr. 25, 2008, from http://www.worldprivacyforum.org/searchengineprivacytips.html.

Electronic Privacy Information Center. (2008.). Retrieved Apr. 25, 2008, from http://epic.org/.

Email Security and Internet Privacy by Privacy Resources. (n.d). Retrieved May 6, 2008, from http://www.privacyresources.org/.

Flint, L. (2008, Apr. 1). Privacy in Cyberspace. Retrieved Apr. 25, 2008, from http://www.privacyrights.org/fs/fs18-cyb.htm.

GetNetWise | Use Multiple E-mail Addresses. (2008). Retrieved Apr. 25, 2008, from http://spam.getnetwise.org/tips/addresses.

Mccandlish, S. (2002, Apr. 10). EFF's Top 12 Ways to Protect Your Online Privacy | Electronic Frontier Foundation. Retrieved Apr. 25, 2008, from http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy.

Suh, B., & Han, I. (2003). The Impact of Customer Trust and Perception of. International Journal of Electronic Commerce, 7(3), 135-161. Retrieved Apr. 6, 2008, from http://ejscontent.ebsco.com.dbgw.lis.curtin.edu.au/ContentServer.Net/ContentServer.aspx?target=http%3A%2F%2Fmesharpe%2Emetapress%2Ecom%2Findex%2F925WUNK9EFE9N95A%2Epdf.

Vitaliev, D. (2007). Digital Security and Privacy for Human Rights Defenders. Retrieved May 6, 2008, from http://www.frontlinedefenders.org/manual/en/esecman/chapter2_7.html.



No comments: