505
Views
6
CrossRef citations to date
0
Altmetric
Information: quality and access

Controlling information behaviour: the case for access control

&
Pages 268-276 | Received 02 Nov 2015, Accepted 25 Nov 2015, Published online: 30 Mar 2016

References

  • Assyaukanie, L. 2009. Islam and the Secular State in Indonesia. Singapore: Institute of Southeast Asian Studies.
  • Christofides, E., A. Muise, and S. Desmarais. 2009. “Information Disclosure and Control on Facebook: Are They Two Sides of the Same Coin or Two Different Processes?” CyberPsychology & Behavior, 12 (3): 341–345. doi: 10.1089/cpb.2008.0226
  • Clinton, W. J. 1995. “ Executive Order 12958.” http://www.gpo.gov/fdsys/pkg/WCPD-1995-04-24/pdf/WCPD-1995-04-24-Pg634.pdf.
  • De Boever, J. 2008. “ Value Networks of P2P TV: An Analysis of Actors and Their Roles.” In Internet and Web Applications and Services, 2008. Third International Conference on ICIW'08, 686–695. Piscataway: IEEE.
  • Deibert, R. J. 2009. “The Geopolitics of Internet Control: Censorship, Sovereignty, and Cyberspace.” In The Routledge Handbook of Internet Politics, edited by Philip Howard, 323–336. London: Routledge.
  • Dyall, L., S. Tse, and A. Kingi. 2009. “Cultural Icons and Marketing of Gambling.” International Journal of Mental Health and Addiction 7 (1): 84–96. doi: 10.1007/s11469-007-9145-x
  • Films, Videos, and Publications Classification Act. 1993. http://www.legislation.govt.nz/act/public/1993/0094/latest/DLM312895.html.
  • Films, Videos, and Publications Classification Amendment Act. 2005. http://www.legislation.govt.nz/act/public/2005/0002/latest/DLM333252.html.
  • Freeman, B., S. Chapman, and M. Rimmer. 2008. “The Case for the Plain Packaging of Tobacco Products.” Addiction 103 (4): 580–590. doi: 10.1111/j.1360-0443.2008.02145.x
  • Gibson, C. 2014. “ The Ethics of Piracy for Personal Use.” Thesis Submitted for the Degree of Master of Arts, Otago University. http://otago.ourarchive.ac.nz/handle/10523/4954.
  • Ginsburg, J. C. 2002. “Essay: From Having Copies to Experiencing Works: The Development of an Access Right in US Copyright Law.” Journal of the Copyright Society of the USA 50: 113.
  • Given, J., R. Curtis, and M. McCutcheon. 2012. “Online Video in Australia.” International Journal of Digital Television 3 (2): 141–162. doi: 10.1386/jdtv.3.2.141_1
  • Goldsmith, J. 1997. “Regulation of the Internet: Three Persistent Fallacies.” Chicago-Kent Law Review 73: 1119–1131.
  • Goodman, L. A. 1961. “Snowball Sampling.” The Annals of Mathematical Statistics 32: 148–170. doi: 10.1214/aoms/1177705148
  • Hannabuss, S., and M. Allard. 2001. “Issues of Censorship.” Library Review 50 (2): 81–89. doi: 10.1108/00242530110381127
  • Ho, W. H., and P. A. Watters. 2004. “Statistical and Structural Approaches to Filtering Internet Pornography.” In 2004 IEEE International Conference on Systems, Man and Cybernetics, Vol. 5, 4792–4798. Piscataway: IEEE, October.
  • Jakarta Post. 2014. “ Students Protest Prostitution, Gambling Dens (28/01/14).” http://www.thejakartapost.com/news/2014/01/28/students-protest-prostitution-gambling-dens.html.
  • Kass, S. 1998. “Regulation and the Internet.” Southern University Law Review 26: 1119–1131.
  • Keilty, P. 2012. “Embodiment and Desire in Browsing Online Pornography.” In Proceedings of the 2012 iConference, 41–47. New York: ACM, February.
  • Kuhlthau, C. C. 1991. “Inside the Search Process: Information Seeking from the User's Perspective.” Journal of the American Society for Information Science 42 (5): 361–371. doi: 10.1002/(SICI)1097-4571(199106)42:5<361::AID-ASI6>3.0.CO;2-#
  • Latapy, M., C. Magnien, and R. Fournier. 2011. “Quantifying Paedophile Queries in a Large p2p System.” In INFOCOM, 2011 Proceedings IEEE, 401–405. Piscataway: IEEE, April.
  • Laughlin, G. K. 2002. “Sex, Lies, and Library Cards: The First Amendment Implications of the Use of Software Filters to Control Access to Internet Pornography in Public Libraries.” Drake Law Review 51: 213–266.
  • Lueg, C. P. (2014). “Characteristics of Human Perception and Their Relevance When Studying Information Behavior.” Journal of Documentation 70 (4): 562–574. doi: 10.1108/JD-05-2012-0064
  • Manning, C. D., P. Raghavan, and H. Schütze. 2008. Introduction to Information Retrieval, Vol. 1, 6. Cambridge: Cambridge University Press.
  • Mee, J., and P. A. Watters. 2006. “Detecting and Tracing Copyright Infringements in P2P Networks.” In Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 60. Piscataway: IEEE Computer Society.
  • Nubi, Z. 2014. Censorship is futile. First Monday 19 (11). http://firstmonday.org/article/view/5525/4155.
  • Nussbaumer, P., I. Slembek, C. Lueg, R. Mogicato, and G. Schwabe. 2009. “Understanding Information Seeking Behaviour in Financial Advisory.” In ISI 2009, Constance. Germany, April 1–3.
  • Page, Lawrence, Sergey Brin, Rajeev Motwani, and Terry Winograd. 1999. The PageRank Citation Ranking: Bringing Order to the Web. Technical Report, Stanford InfoLab.
  • Price, M. E., & S. G. Verhulst. 2005. Self-regulation and the Internet. New York: Kluwer law international.
  • Prichard, J., C. Spiranovic, P. Watters, and C. Lueg. 2013. “Young People, Child Pornography, and Subcultural Norms on the Internet.” Journal of the American Society for Information Science and Technology 64 (5): 992–1000. doi: 10.1002/asi.22816
  • Rubin, R. E. 1998. Foundations of Library and Information Science. New York, NY: Neal-Schuman.
  • Sabelfeld, A., and A. C. Myers. 2003. “Language-Based Information-Flow Security.” IEEE Journal on Selected Areas in Communications 21 (1): 5–19. doi: 10.1109/JSAC.2002.806121
  • Sandhu, R. S., E. J. Coyne, H. L. Feinstein, and C. E. Youman. 1996. “Role-Based Access Control Models.” Computer 29 (2): 38–47. doi: 10.1109/2.485845
  • Sidak, J. G. 2006. “A Consumer-Welfare Approach to Network Neutrality Regulation of the Internet.” Journal of Competition Law and Economics 2 (3): 349–474. doi: 10.1093/joclec/nhl016
  • Shannon, C. E. 1948. “A Note on the Concept of Entropy.” Bell System Technical Journal 27: 379–423. doi: 10.1002/j.1538-7305.1948.tb01338.x
  • Taylor, M., G. Holland, and E. Quayle. 2001. “Typology of Paedophile Picture Collections.” Police Journal 74: 97–107.
  • Watters, P. A. 2009. “Data Loss in the British Government: A Bounty of Credentials for Organised Crime.” In Cybercrime and Trustworthy Computing Workshop, 2009, UIC-ATC'09, 531–536. Piscataway: IEEE.
  • Watters, P. A. 2012. Cyber Security: Concepts and Cases. London: British Scientific.
  • Watters, P. A. 2014. “A Systematic Approach to Measuring Advertising Transparency Online: An Australian Case Study.” In Proceedings of the Second Australasian Web Conference, edited by S. Cranefield, A. Trotman, and J. Yang, Vol. 155, 59–67, Sydney.
  • Watters, P. A., C. Lueg, C. Spiranovic, and J. Prichard. 2013. “Patterns of Ownership of Child Model Sites: Profiling the Profiteers and Consumers of Child Exploitation Material.” First Monday 18 (2). http://firstmonday.org/ojs/index.php/fm/article/view/4300. doi: 10.5210/fm.v18i2.4300
  • Wilson, T. D. 1981. “On User Studies and Information Needs.” Journal of Documentation 37 (1): 3–15. doi: 10.1108/eb026702
  • Wilson, T. D. 2000. “Human Information Behavior.” Informing Science 3 (2): 3–15, Special Issue on Information Science Research.
  • Ye, S., J. Lang, and F. Wu. 2010. “Crawling Online Social Graphs.” In 2010 12th International Asia-Pacific Web Conference (APWEB), 236–242. Piscataway: IEEE, April.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.