217
References
Bonabeau, E., 2009. Decisions 2.0: the power of collective intelligence. MIT Sloan Manage
Rev 50 (2), 45–52.
Brake, D.R., 2014. Are we all online content creators now? Web 2.0 and digital divides.
J. Comput. Mediat. Comm. 19 (3), 591–609.
Brandtzæg, P.B., 2012. Social networking sites: their users and social implications—a longi-
tudinal study. J. Comput. Mediat. Comm. 17 (4), 467–488.
Brynielsson, J., Horndahl, A., Johansson, F., Kaati, L., Mårtenson, C., Svenson, P., 2013.
Harvesting and analysis of weak signals for detecting lone wolf terrorists. Secur. Inf. 2
(1), 11.
Campbell, C., 2014. BBC NEWS: Hungarian woman used as prostitute ‘locked in room and
raped’.
http://www.bbc.co.uk/news/uk-england-25641460
.
Campbell, S.W., Kwak, N., 2011. Political involvement in “mobilized” society: the interactive
relationships among mobile communication, network characteristics, and political partici-
pation. J. Commun. 61 (6), 1005–1024.
Cho, H., Rivera-Sánchez, M., Lim, S.S., 2009. A multinational study on online privacy: global
concerns and local responses. New Media Soc. 11 (3), 395–416.
Choi, J.H., 2006. Living in Cyworld: contextualising Cy-Ties in South Korea. In: Bruns,
A., Jacobs, J. (Eds.), Use of Blogs (Digital Formations). Peter Lang, New York, pp.
173–186.
Correa, T., Hinsley, A.W., De Zuniga, H.G., 2010. Who interacts on the Web? The intersection
of users' personality and social media use. Comput. Hum. Behav. 26 (2), 247–253.
Denef, S., Kaptein, N., Bayerl, P.S., Ramirez, L., 2012. Best Practice in Police Social Media
Adaptation. Public Report COMPOSITE Project. [online].
http://www.composite-project.
eu/index.php/publications-669.html
.
Duggan, M., Smith, A., 2013. Social Media Update. Pew Internet and the American Life
Project. Available at:
http://www.pewinternet.org/Reports/2013/Social-Media-Update.
aspx
(accessed 14.02.14).
Ellison, N., Steinfield, C., Lampe, C., 2007. The benefits of Facebook “friends”: exploring the
relationship between college students’ use of online social networks and social capital.
J. Comput. Mediat. Comm. 12 (4), 1143–1168.
Fogal, J., Nehmad, E., 2009. Internet social network communities: risk taking, trust, and pri-
vacy concerns. Comput. Hum. Behav. 25 (1), 153–160.
Gaudin, S., 2013a. One out of seven people use social networks, study shows. Available at:
http://www.computerworld.com/s/article/9244251/One_out_of_seven_people_use_so-
cial_networks_study_shows
(accessed 14.02.14).
Gaudin, S., 2013b. Twitter etiquette: the do's and don'ts of tweeting. Computerworld. Available
at:
http://www.computerworld.com/s/article/9240533/_Twitter_etiquette_The_do_s_and_
don_ts_of_tweeting?taxonomyId=10
(accessed 07.02.14).
Gergen, K.J., 2008. Mobile communication and the transformation of the democratic process.
In: Katz, J.E. (Ed.), Handbook of Mobile Communication Studies. MIT Press, Cambridge,
MA, pp. 353–366.
Gillam, C., 2013. IOWA mom arrested for post threatening shooting at son's school. Available at:
http://www.reuters.com/article/2013/12/17/us-usa-iowa-mom-dUSBRE9BG14320131217
(accessed 06.02.14).
Gottschalk, P., 2010. Knowledge management technology for organized crime risk assess-
ment. Inf. Syst. Front. 12 (3), 267–275.
Hampton, K.N., Livio, O., Sessions Goulet, L., 2010. The social life of wireless urban spaces:
Internet use, social networks, and the public realm. J. Commun. 60 (4), 701–722.
Do'stlaringiz bilan baham: |