219
References
Security Imperatives and Information and Communications Technologies. Elsevier,
Oxford, pp. 93–107.
McCarthy, C., 2009. How the Mafia conquered social networks. Available at:
http://news.cnet.
com/8301-13577_3-10274060-36.html
(accessed 07.02.14).
McKenna, K.Y.A., Bargh, J.A., 2000. Plan 9 from cyberspace: the implications of the Internet
for personality and social psychology. Person. Soc. Psychol. Rev. 4 (1), 57–75.
Mesch, G.S., 2012. Minority status and the use of computer-mediated communication: a test
of the social diversification hypothesis. Commun. Res. 39 (3), 317–337.
Miller, G.A., 1995. WordNet: a lexical database for English. Commun. ACM 38 (11), 39–41.
Moore, K., McElroy, J.C., 2012. The influence of personality on Facebook usage, wall post-
ings, and regret. Comput. Hum. Behav. 28 (1), 267–274.
Oh, O., Agrawal, M., Rao, H.R., 2011. Information control and terrorism: tracking the
Mumbai terrorist attack through twitter. Inform. Syst. Front. 13 (1), 33–43. http://dx.doi.
org/10.1007/s10796-010-9275-8.
Peluchette, J., Karl, K., 2010. Examining students’ intended image on Facebook: “what were
they thinking?” J. Educ. Bus. 85 (1), 30–37.
Polhamous, A., 2014. Pitman police evacuate high school for ‘potential threat’. Available at:
http://www.nj.com/gloucester-county/index.ssf/2014/01/pitman_police:evacuate_high_
school_for_potential_threat.html
(accessed 02.06.14).
Priss, U., 2006. Formal concept analysis in information science. Annu. Rev. Inform. Sci.
Technol. 40 (1), 521–543.
Rankin, G., Kinsella, N., 2011. Human trafficking—the importance of knowledge informa-
tion exchange. In: Akhgar, B., Yates (Eds.), Simeon Intelligence Management. Springer
London, pp. 159–180.
Reiner, R., 2010. The Politics of the Police. Oxford University Press, Oxford.
Ross, C., Orr, E.S., Sisic, M., Arseneault, J.M., Simmering, M.G., Orr, R.R., 2009. Personality
and motivations associated with Facebook use. Comput. Hum. Behav. 25 (2), 578–586.
The Seattle Times, 2012. Threat closes skyline high school in sammamish. Available at:
http://seattletimes.com/html/localnews/2019206262_apwasammamishschoolthreat.html
(accessed 16.02.14).
Shah, S., Bao, F., Lu, C.-T., Chen, I.-R., 2011. CROWDSAFE: crowd sourcing of crime inci-
dents and safe routing on mobile devices. In: Proceedings of the 19th ACM SIGSPATIAL
International Conference on Advances in Geographic Information Systems. ACM, New
York, NY, USA, pp. 521–524. http://dx.doi.org/10.1145/2093973.2094064.
Skog, D., 2005. Social interaction in virtual communities: the significance of technology. Int.
J. Web Based Commun. 1 (4), 464–474.
Snasel, V., Horak, Z., Abraham, A., 2008. Understanding social networks using Formal Concept
Analysis. In: 2008 IEEE/WIC/ACM International Conference on Web Intelligence and
Intelligent Agent Technology, pp. 390–393.
Statistics Brain, 2014. Social Networking Statistics. Available at:
http://www.statisticbrain.
com/social-networking-statistics/
(accessed 14.02.14).
Sundar, S.S., Marathe, S.S., 2010. Personalization versus customization: the importance of
agency, privacy, and power usage. Hum. Commun. Res. 36 (3), 298–322.
Taddicken, M., 2013. The ‘privacy paradox’ in the social web: the impact of privacy concerns,
individual characteristics, and the perceived social relevance on different forms of self-
disclosure. J. Comput.-Mediated Commun. 19 (2), 248–273.
Timelists, 2014. The Boss of All Bosses. Available at:
http://content.time.com/time/spe-
cials/2007/article/0,28804,1683530_1683532_1683538,00.html
(07.02.14).
Do'stlaringiz bilan baham: |