SEARCH

SEARCH BY CITATION

References

  • Allen, D. F. 1987. Computers versus scanners: An experiment in nontraditional forms of survey administration. Journal of College Student Personnel, 23(3): 266273.
  • Anderson, R. E., Johnson, D. G., Gotterbarn, D., and Perolle, J. 1993. Using the new ACM Code of Ethics in decision making. Communications of the ACM, 36(2): 98107.
  • Baldwin, J. D. and Baldwin, J. I. 1988. Factors affecting AIDS-related sexual risk-taking behavior among college students. Journal of Sex Research, 25(2): 181196.
  • Burgess, J. 1993. Internet creates a computer culture of remote intimacy. The Washington Post, 116, A1 (June 28).
  • Contractor, N. S. and Eisenberg, E. M. 1990. Communication networks and new media in organizations. In Organizations and Communication Technology, eds. J.Fulk and C.Steinfeld, 143172. Newbury Park , CA : Sage.
  • Culnan, M. J. and Markus, M. L. 1988. Information technologies. In Handbook of Organizational Communication, eds. G. A.Barnett and G. M.Goldhaber, 420443. Norwood , NJ : Ablex Publishing Corporation.
  • Finholt, T. and Sproull, L. S. 1990. Electronic groups at work. Organizational Science, 1(1): 4164.
  • Ford, K. and Norris, A. 1993. Knowledge of AIDS transmission, risk behavior, and perceptions among urban, low-income, African-American and Hispanic youth. American Journal of Preventive Medicine, 9(5): 297306.
  • Furniss, M. 1993. Sex with a hard (disk) on: Computer bulletin boards and pornography. Wide Angle, 15(2): 1937.
  • Giddens, A. 1976. New Rules of Sociological Method: A Positive Critique of Interpretative Sociologies. New York : Basic Books.
  • Goldman, J. A. and Harlow, L. L. 1993. Self-perception variables that mediate AIDS preventative behavior in college students. Health Psychology, 12(6): 489498.
  • Guthertz, M. and Field, T. 1989. Lap computer or on-line coding and data analysis for laboratory and field observations. Infant Behavior and Development, 1(3): 305319.
  • Hellerstein, L. N. 1985. The social use of electronic communication at a major university. Special issue: Social impact of computers. Computers and the Social Sciences, 1(304): 191197.
  • Herbert, N. 1992. Does she do the vulcan mind meld on the first date Computer Underground Digest, 4(17).
  • Hernandez, R. T. 1987. Computer electronic mail and privacy. Paper written at California Western School of Law.
  • Hobfoll, S. E., Gayle, J. A., Gruber, V., and Levine, O. 1990. Anxiety's role in AIDS prevention. Anxiety Research, 3(2): 8599.
  • Horvath, P. and Zuckerman, M. 1993. Sensation seeking, risk appraisal, and risky behavior. Personality and Individual Differences, 14(1): 4152.
  • Huff, C. W. and Rosenberg, J. 1989. The on-line voyeur: Promises and pitfalls of observing electronic interaction. 18th Annual Meeting of the Society for Computers in Psychology (1988, Chicago, IL). Behavior Research Methods, Instruments, and Computers, 21(2): 166172.
  • Jonah, B. A. 1990. Age differences in risky driving. Special Issue: Traffic injury prevention. Health Education Research, 5(2): 139149.
  • Kahn, J.R. 1989. Defamation liability of computerized bulletin board operators and problems of proof.
  • Kaplan, H. L. 1991. Representation of on-line questionnaires in an editable, auditable database. 21st Annual Meeting of the Society for Computers in Psychology (1991, San Francisco, CA). Behavior Research Methods, Instruments and Computers, 24(2): 373384.
  • Kapor, M. 1992. Computer spies. Forbes, 150(11): 288.
  • Keppel, B. 1990. Electronic mail stirs debate on the privacy issue. Los Angeles Times, 109, D1 (May 23).
  • Keubelbeck, A. 1991. Getting the message. Los Angeles Times, 110, E1-2 (September 4).
  • Krol, E. 1992. The Whole Internet User's Guide and Catalog. Sebastopol , CA : O'Reilly and Associates, Inc.
  • Lewis, P. H. 1990. On electronic bulletin boards, what rights are at stake The New York Times, 140(3), F8 (December 23).
  • Loebl, J. W. 1992. Law firms, employees may clash over rights to computerized data. The National Law Journal, 14(9): 30.
  • McCormick, N. B. and McCormick, J. W. 1992. Computer friends and foes: Content of undergraduates' electronic mail. Computers in Human Behavior, 8: 379405.
  • Miller, S. C. 1992. Privacy in email? Better to assume it doesn't exist. The New York Times, 151(3), p8F(N), p8F(L).
  • Mittal, B. 1988. Achieving higher seat belt usage: The role of habit in bridging the attitude-behavior gap. Journal of Applied Social Psychology, 18(12), Pt. 2, 9931016.
  • Moore, W. J. 1992. Taming cyberspace. National Journal, 24(13): 745749.
  • Niven, D., Wang, C., Rowe, M. P., Taga, M, Vladeck, J. P., and Garron, L. C. 1992. The case of the hidden harassment. Harvard Business Review, 70(2): 1219.
  • Perkel, A. K., Strebel, A., and Joubert, G. 1991. The psychology of AIDS transmission: Issues for intervention. South African Journal of Psychology, 21(3): 148152.
  • Poole, M. S. and McPhee, R. D. 1983. A structural analysis of organizational climate. In Communication and Organizations: An Interpretive Approach, eds L. L.Putnam and M. E.Pacanowsky, 195219. Beverly Hills : Sage.
  • ProjectH. 1992a. The great ethics debate. (six separate files).
  • ProjectH. 1992b. Ethics policy.
  • Rafaeli, S. and Tractinsky, N. 1989. Computerized tests and time: measuring, limiting and providing visual cues for response time in on-line questioning. Behaviour and Information Technology, 8(5): 335351.
  • Rafaeli, S. and Tractinsky, N. 1991. Time in computerized test: A multitrait, multimethod investigation of general-knowledge and mathematical-reasoning on-line examinations. Computers in Human Behavior, 7(3): 215225.
  • Ratcliffe, M. 1992. Privacy focus of Borland case. MacWeek, 6(35): 12.
  • Reid, B. 1993. Top 40 newsgroups in order by popularity (July). Available via the Internet newsgroup, news.lists. Posted August 6.
  • Reynolds, C. 1990. Private and confidential. New Scientist, 127: 58.
  • Rice, M. L., Sell, M. A., and Hadley, P. A. 1990. The Social Interactive Coding System (SICS): An on-line, clinically relevant descriptive tool. Language, Speech, and Hearing Services in Schools, 21(2): 214.
  • Riddle, M.H. 1990. The electronic pamphlet–computer bulletin boards and the law.
  • Riley, P. 1983. A structurationist account of political culture. Administrative Science Quarterly, 28: 414437.
  • Schaefermeyer, M. J. and Sewell, E. H. 1988. Communicating by electronic mail. American Behavioral Scientist, 32(2): 112123.
  • Schwarz, J. 1993. On-line Lothario's antics prompt debate on cyber-age ethics. The Washington Post, 116, A1 (July 11).
  • Shapiro, N. Z. and Anderson, R. H. 1985. Toward an ethics and etiquette for electronic mail. Paper prepared for the National Science Foundation. The Rand Corporation, Santa Monica , CA . R-3283-NSF/RC.
  • Sherr, L., Strong, C., and Goldmeier, D. 1990. Sexual behaviour, condom use and prediction in attenders at sexually transmitted disease clinics: Implications for counseling. Special Issue: Sexual and marital counseling: Perspectives on theory, research and practice. Counseling Psychology Quarterly, 3(4): 343352.
  • Short, J., Williams, E., and Christie, B. 1976. The Social Psychology of Telecommunications. New York : Wiley.
  • Sitkin, S. B., Sutcliffe, K. M., Barrios-Choplin, J. R. 1989. Determinants of communication media choice in organizations: A dual function perspective. Paper presented at the 1989 National meeting of the Academy of Management, Washington , DC .
  • Solomon, J. 1990. Electronic mail: Is it for your eyes only The Wall Street Journal, B1 (August 6).
  • Sudweeks, F., McLaughlin, M., and Rafaeli, S. eds 1997. Network and Netplay: Virtual groups on the Internet. Menlo Park , CA : AAAI/MIT Press.
  • Tipton, R. M., Camp, C. C., and Hsu, K. 1990. The effects of mandatory seat belt legislation on self-reported seat belt use among male and female college students. Accident Analysis and Prevention, 22(6): 543548.
  • Turner, J. A. 1991. Messages in questionable taste on computer networks pose thorny problems for college administrators. Chronicle of Higher Education, A13 (September 14).
  • Vasu, M. L. and Garson, G. D. 1990. Computer-assisted survey research and continuous audience response technology for the political and social sciences. Social Science Computer Review, 8(4): 535557.
  • Wallich, P. 1993. Electronic envelopes? The uncertainty of keeping email private. Scientific American, 268(2): 3031.
  • Wambach, J. A. 1991. Building electronic mail coalitions: Network politics in an educational organization. Paper presented at Western States Communication Association, Organizational Communication Interest Group, Phoenix , AZ .
  • Witmer, D. 1997. Practicing safe computing: Why people engage in risky computer-mediated communication. In Network and Netplay: Virtual Groups on the Internet. Menlo Park , CA : AAAI/MIT Press (to appear).