Entry Jamieson:1998:UEP from jcd.bib
Last update: Tue Mar 5 02:04:11 MST 2019
Top |
Symbols |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Jamieson:1998:UEP,
author = "Lauren Jamieson",
title = "Unveiling the Extraordinary Possibilities and Implicit
Threats of Online Communication",
journal = j-ASTERISK,
volume = "22",
number = "4",
pages = "27--31",
month = nov,
year = "1998",
CODEN = "ASTRF7",
ISSN = "0731-1001",
bibdate = "Wed Dec 06 08:46:56 2000",
bibsource = "http://web.mit.edu/tps/www/NL/SIGDOC_WWW/jcdtoc/sigtoc.html;
http://www.math.utah.edu/pub/tex/bib/jcd.bib",
abstract = "In the first of three coordinated analytical
commentaries on Laura Gurak's Persuasion and Privacy in
Cyberspace (Yale, 1997), Jamieson summarizes the book's
treatment of two protest movements that were conducted
almost entirely by electronic mail (concerning the
Lotus MarketPlace consumer database and, separately,
the Clipper chip approach to encryption policy).",
acknowledgement = ack-nhfb,
annote = "book commentary",
}
Related entries
- analytical,
19(4)3,
19(4)8,
20(4)9,
21(2)22,
22(1)11
- approach,
21(4)26,
21(4)38,
23(3)87,
23(4)12,
24(1)21,
24(2)79,
24(2)91,
24(3)169,
24(4)213,
26(1)22
- book,
19(4)3,
19(4)8,
20(2)30,
20(2)33,
20(2)36,
20(2)39,
20(3)9,
20(3)14,
20(4)9,
21(1)15,
21(4)1,
21(4)4,
21(4)8,
21(4)11,
21(4)16,
22(2)23,
22(2)34,
22(2)35,
22(4)32,
22(4)37,
23(2)34,
23(2)48,
23(4)23,
23(4)27,
23(4)30,
24(2)79,
24(2)85,
24(2)91,
24(3)107,
24(3)132,
24(3)148,
24(4)254
- communication,
0(0)xxii--464,
18(3)5,
18(3)11,
18(3)19,
18(3)25,
19(4)3,
21(4)4,
21(4)38,
22(4)45,
23(1)28,
23(3)96,
24(1)33,
24(2)79,
24(2)85,
24(2)91,
24(4)237,
24(4)254
- coordinated,
24(2)60
- Cyberspace,
22(4)32
- database,
24(2)64
- electronic,
21(3)56,
23(3)69,
24(2)49,
24(4)227
- first,
20(2)9,
20(2)30,
21(4)1,
22(1)11,
22(2)23,
22(3)5,
22(3)7,
22(4)11,
23(1)3,
23(1)19,
23(2)3,
23(2)14,
23(2)34,
23(4)3,
23(4)8,
23(4)23,
24(1)21,
24(2)49,
24(2)64,
24(2)79,
24(3)122,
24(4)185,
24(4)204,
26(2)43
- Gurak,
22(4)32,
22(4)37
- online,
19(4)3,
19(4)8,
21(2)10,
21(2)16,
21(4)11,
22(4)32,
22(4)37,
23(4)15,
24(1)31,
24(2)41,
24(2)49,
24(2)54,
24(2)60,
24(3)141,
24(4)227,
24(4)237,
25(1)17
- Persuasion,
22(4)32,
22(4)37
- policy,
23(1)3,
23(1)19,
23(4)36,
24(2)41,
24(2)54,
24(2)60,
24(2)72
- Privacy,
22(4)32,
22(4)37
- summarize,
21(4)20,
22(2)43,
23(1)3,
23(4)23,
24(3)107
- threats,
23(1)3
- three,
21(2)10,
21(2)22,
21(4)1,
21(4)8,
21(4)11,
21(4)16,
21(4)38,
22(2)3,
22(2)23,
22(2)27,
22(2)30,
22(2)35,
22(3)5,
22(3)7,
22(3)12,
22(3)15,
22(3)24,
22(4)3,
22(4)11,
22(4)16,
22(4)21,
22(4)32,
22(4)37,
23(1)3,
23(1)19,
23(1)22,
23(1)25,
23(2)3,
23(2)14,
23(2)19,
23(2)25,
23(4)23,
23(4)27,
23(4)30,
24(1)3,
24(1)21,
24(1)25,
24(1)31,
24(2)79,
24(2)85,
24(2)91,
24(3)169,
24(4)185,
24(4)204,
24(4)213,
24(4)220
- treatment,
22(3)25
- two,
20(2)39,
21(4)20,
22(2)43,
22(4)37,
23(2)3,
23(2)34,
23(2)48,
23(3)87,
23(4)3,
23(4)8,
23(4)12,
23(4)15,
24(3)169,
24(4)185
- were,
22(4)45,
23(1)3,
24(1)3,
24(3)132,
24(3)138
- Yale,
21(4)1