Entry Strickland:2005:TSI from jasist.bib
Last update: Fri Nov 9 02:10:53 MST 2018
Top |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Strickland:2005:TSI,
author = "Lee S. Strickland and Laura E. Hunt",
title = "Technology, security, and individual privacy: {New}
tools, new threats, and new public perceptions",
journal = j-J-AM-SOC-INF-SCI-TECHNOL,
volume = "56",
number = "3",
pages = "221--234",
day = "1",
month = feb,
year = "2005",
CODEN = "JASIEF",
DOI = "https://doi.org/10.1002/asi.20122",
ISSN = "1532-2882 (print), 1532-2890 (electronic)",
ISSN-L = "1532-2882",
bibdate = "Fri Sep 11 10:42:24 MDT 2015",
bibsource = "http://www.math.utah.edu/pub/tex/bib/jasist.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of the American Society for Information
Science and Technology: JASIST",
journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1532-2890",
onlinedate = "2 Dec 2004",
}
Related entries
- individual,
52(12)1049,
54(2)124,
54(3)216,
56(7)741,
56(7)757,
56(10)1088,
56(14)1525,
59(1)160,
59(12)1995,
60(4)740,
61(1)141,
61(7)1464,
61(8)1564,
63(12)2433
- new,
52(1)3,
52(1)12,
52(7)584,
52(9)780,
52(13)1089,
52(13)1100,
53(3)209,
53(3)250,
53(7)614,
53(10)824,
53(10)863,
54(8)771,
54(10)977,
54(11)989,
54(12)1138,
54(12)1141,
55(6)471,
55(6)530,
55(6)561,
55(8)754,
56(7)704,
57(5)614,
57(5)724,
58(5)758,
58(10)1553,
59(3)339,
59(3)390,
59(9)1523,
59(11)1801,
60(2)232,
60(2)240,
60(6)1299,
60(7)1327,
60(8)1719,
60(9)1933,
60(11)2366,
61(4)772,
61(4)802,
61(7)1514,
61(9)1871,
61(12)2514,
61(12)2581,
62(2)284,
62(4)643,
62(6)1130,
62(8)1649,
62(10)1954,
62(11)2095,
62(11)2106,
62(11)2266,
63(8)1609,
63(9)1834,
63(12)2378,
63(12)2557,
64(4)829,
64(5)1076,
64(6)1193,
64(9)1852,
64(12)2537
- perception,
53(4)282,
53(4)295,
57(2)169,
57(14)1949,
59(12)1995,
60(8)1572,
61(1)13
- privacy,
53(3)251,
57(13)1771,
58(2)157,
58(2)302,
58(5)710,
58(8)1198,
60(10)2079,
62(3)521,
62(11)2095,
63(4)755
- public,
52(3)226,
52(12)1073,
52(13)1169,
53(10)802,
53(11)894,
55(13)1131,
56(11)1130,
57(13)1740,
58(1)76,
58(3)379,
58(14)2180,
58(14)2366,
59(8)1295,
59(14)2312,
60(2)318,
60(6)1159,
60(6)1249,
60(10)2095,
60(12)2593,
61(2)392,
61(12)2461,
62(7)1288,
64(2)280,
64(3)647,
64(10)1963
- security,
54(7)698,
54(10)976,
55(11)1028,
56(3)217,
56(3)235,
56(3)310,
58(2)212,
59(4)662,
60(2)332,
60(8)1723,
61(5)1074
- threats,
59(4)662
- tool,
52(8)666,
53(14)1245,
53(14)1259,
53(14)1273,
54(1)3,
55(5)445,
56(8)812,
57(2)294,
58(3)456,
58(3)457,
58(7)924,
58(9)1329,
58(9)1374,
58(13)1998,
59(3)435,
59(5)719,
59(12)1878,
61(2)288,
61(8)1582,
61(9)1871,
62(7)1382,
63(6)1168,
63(8)1609,
63(9)1843,
64(5)874