507
Views
8
CrossRef citations to date
0
Altmetric
Original Articles

Intercultural Perspectives on Cyberspace: An Updated Examination

Pages 713-724 | Received 07 Sep 2013, Accepted 16 Sep 2013, Published online: 25 Sep 2014

REFERENCES

  • Altman, I. (1977). Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, 33(3), 66–84.
  • Banta, M. (1993). Taylored lives: Narrative production in the age of Taylor, Veblen, and Ford. Chicago, IL: University of Chicago Press.
  • Baudrillard, J. (2003). Simulacra and simulation. Ann Arbor, MI: The University of Michigan Press.
  • Bavelas, A. (1950). Communication patterns in task-oriented groups. Journal of the Acoustical Society of America, 22, 725–730.
  • Best, S., & Kellner, D. (1991). Postmodern theory: Critical interrogations. New York, NY: The Guilford Press.
  • Braziel, J. E. (2008). Diaspora: An introduction. Malden, MA: Blackwell.
  • Britt, P. (2005). By law: Catching up with malware. Information Today, 22(11), 1–54.
  • Buchanan, M. (2002). Nexus: Small worlds and the groundbreaking science of networks. New York, NY: Norton Press.
  • Capurro, R. (2005). Privacy: An intercultural perspective. Ethics and Information Technology, 7(1), 37–47.
  • Castells, M. (2001). The Internet galaxy: Reflections on the Internet, business, and society. Oxford, UK: Oxford University Press.
  • Cheney, G., Christensen, L. T., Zorn, T. E. Jr., & Ganesh, S. (2010). Organizational communication in an age of globalization: Issues, reflections, practices. Prospect Heights, IL: Waveland Press.
  • Conway, M. (2002). What is cyberterrorism? Current History, 2, 436–440.
  • Davidson-Shivers, G. V., Muilenburg, L. Y., & Tanner, E. J. (2002). How do students participate in synchronous and asynchronous online discussions? Journal of Educational Computing Research, 25(4), 351–366.
  • Debrix, F. (2001). Cyberterror and media-induced fears: The production of emergency culture. Strategies: Journal of Theory, Culture & Politics, 14(1), 149–168.
  • Ellul, J. (1964). The technological society. New York, NY: Alfred A. Knopf.
  • Escobar, A. (1996). Welcome to cyberia: Notes on the anthropology of cyberculture. In Z. Sarda & J. R. Ravetz (Eds.), Cyberfutures: Culture and politics on the information superhighway (pp. 111–137). London, UK: Pluto Press.
  • Frey, B. S., & Osterloh, M. (2010). Successful management by motivation: Balancing intrinsic and extrinsic incentives. New York, NY: Springer.
  • Gibson, W. (1984). Neuromancer. New York, NY: Ace.
  • Gonzalez-Rivas, G., & Larsson, L. (2010). Far from the factory: Lean for the Information Age. New York, NY: Productivity Press.
  • Hall, E. T. (1976). Beyond culture. Garden City, NY: Doubleday.
  • Hay, D. (2000). Spirituality versus individualism: Why we should nurture relational consciousness. International Journal of Children's Spirituality, 5(1), 37–48.
  • Hofstede, G. H. (1991). Cultures and organizations: Software of the mind. New York, NY: McGraw-Hill.
  • Joel, M. (2009). Six pixels of separation: Everyone is connected. Connect your business to everyone. New York, NY: Business Plus.
  • Johari, A. (2005). Intercultural Internet-based learning: Know your audience and what it values. Educational Technology Research & Development, 53(2), 117–127.
  • Jordan, T. (1999). Cyberculture: The culture and politics of cyberspace and the Internet. London, UK: Routledge.
  • Kagitcibasi, C. (1994). A critical appraisal of individualism and collectivism: Toward a new formulation. In U. Kim, H. C. Triandis, C. Kagitcibasi, S.-C. Choi, & G. Yoon (Eds.), Individualism and collectivism: Theory, method and applications (pp. 52–65). Thousand Oaks, CA: Sage.
  • Kling, R., & Carmel, E. (1997). American hegemony in packaged software trade and the “culture of software.” Information Society, 13(1), 125–142.
  • Kluver, R. (2004a). Globalization, informatization, and intercultural communication. In F. Jandt (Ed.). Intercultural communication: A global reader (pp. 425–437). Thousand Oaks, CA: Sage.
  • Kluver, R. (2004b). Political culture and information technology in the 2001 Singapore general election. Political Communication, 21, 435–458.
  • Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33(3), 22–42.
  • Leavitt, H. J. (1951). Some effects of certain communication patterns on group performance. Journal of Abnormal and Social Psychology, 46, 38–50.
  • Levinson, P. (1998). The soft edge: A natural history and future of the information revolution. New York, NY: Routledge.
  • Lévy, P. (2000). Kyberkultura. Prague, Czech Republic: Karolinum.
  • Lipnack, J., & Stamps, J. (1986). The networking book: People connecting with people. New York, NY: Routledge and Kegan Paul.
  • Ma, L., & Sun, H. Y. (2009). Analysis and application for virtual learning community. Education Technology and Computer Science, 7, 31–35.
  • MacNulty, A. A. R. (1999). Socio-political change and asymmetry in information warfare and intelligence. InfoWarCon99. Retrieved from http://www.exploit-the-future.com/paper2/paper2.htm
  • Matusitz, J. (2007). The implications of the Internet for human communication. The Journal of Information Technology Impact, 7(1), 21–34.
  • McKenna, K. Y. A., Green, A. S., & Gleason, M. E. J. (2002). Relationship formation on the Internet: What's the big attraction? Journal of Social Issues, 58(1), 9–31.
  • McLuhan, M. (1962). The Gutenberg Galaxy: The making of typographic man. Toronto, Canada: University of Toronto Press.
  • McLuhan, M. (1964). Understanding media: The extensions of man. New York, NY: McGraw Hill.
  • McQuail, D. (2000). McQuail's mass communication theory. Thousand Oaks, CA: Sage.
  • Merriam, S. B., & Caffarella, R. S. (1991). Learning in adulthood. A comprehensive guide. San Francisco, CA: Jossey-Bass.
  • Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35–57.
  • Miller, F. P., Vandome, A. F., & McBrewster, J. (2010). Infosphere. Saarbrücken, Germany: Alphascript Publishing.
  • Mitchell, W. J. (1995). City of bits. Cambridge, MA: MIT Press.
  • Murdock, G. P. (1965). Culture and society. Pittsburgh, PA: University of Pittsburgh Press.
  • Nakada, M., & Tamura, T. (2005). Japanese conceptions of privacy: An intercultural perspective. Ethics and Information Technology, 7(1), 27–36.
  • Nayar, P. K. (2010). An introduction to new media and cybercultures. New York, NY: Wiley.
  • Postman, N. (1992). Technopoly: The surrender of culture to technology. New York, NY: Vintage.
  • Pratt, M. K. (2005). E-mail exposure. Computerworld, 39(32), 37–39.
  • Rheingold, H. (1994). The virtual community. London, UK: Secker and Warburg.
  • Rice, L. M. (2004). Analysis: Terror on the Web. United Press International, 1, 10–21.
  • Rothwell, W. J. (2011). Invaluable knowledge: Securing your company's technical expertise. Chanute, KS: AMACOM.
  • Schiano, D. J. (1999). Lessons from LambdaMOO: A social, text-based virtual environment. Presence: Teleoperators & Virtual Environments, 8(2), 127–170.
  • Schweitzer, D. (2005). A convert with a crush on his Mac. Computerworld, 39(31), 30.
  • Scott, J. (1991). Social network analysis: A handbook. Thousand Oaks, CA: Sage.
  • Scott, J. (2000). Social network analysis. An introduction. New York, NY: Sage.
  • Short, J., Williams, E., & Christie, B. (1976). The social psychology of telecommunications. London, UK: John Wiley.
  • Sinha, D., & Tripathi, R. C. (1994). Individualism in a collectivist culture: A case of coexistence of opposites. In U. Kim, H. C. Triandis, C. Kagitcibasi, S. C. Choi, & G. Yoon (Eds.), Individualism and collectivism: Theory, method, and applications (pp. 123–136). Thousand Oaks, CA: Sage.
  • Sloan, S. (2006). Terrorism: The present threat in context. Oxford, UK: Berg Publishers.
  • Smith, P. B., & Bond, M. H. (1993). Social psychology across cultures. Cambridge, UK: Cambridge University Press.
  • Stohl, C. (1995). Organizational communication: Connectedness in action. Thousand Oaks, CA: Sage.
  • Thornburgh, N., Forney, M., Bennett, B., Burger, T. J., & Shannon, E. (2005). The invasion of the Chinese cyberspies (and the man who tried to stop them). Time, 166(10), 34–39.
  • Tran, L. (1996). The concept of privacy in intercultural communication. In A. Barthel (Ed.), Intercultural interaction and development: Converging perspectives (pp. 210–217). Sydney, Australia: University of Technology-Sydney.
  • Triandis, H. C. (1995). Individualism and collectivism. Boulder, CO: Westview.
  • Turkle, S. (1995). Life on the screen: Identity in the age of the Internet. New York, NY: Simon & Schuster.
  • van der Sijde, P., Ridder, A., Blaauw, G., & Diesnberg, C. (2010). Teaching entrepreneurship: Cases for education and training. Heidelberg, Germany: Verlag.
  • Verton, D. (2003). Black ice: The invisible threat of cyber-terrorism. New York, NY: McGraw-Hill.
  • Voronov, M., & Singer, J. A. (2002). The myth of individualism-collectivism: A critical review. The Journal of Social Psychology, 142(4), 461–480.
  • Walther, J. B. (1996). Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction. Communication Research, 23, 3–43.
  • Wasserman, S., & Faust, K. (1994). Social network analysis. Cambridge, UK: Cambridge University Press.
  • Wellman, B., & Hampton, K. (1999). Living networked in a wired world. Contemporary Sociology, 28(6), 648–654.
  • Wood, J. T. (1994). Gendered lives: Communication, gender, and culture. Belmont, CA: Wadsworth.
  • Yares, A. S. (1999). Jewish identity on campus: Research and recommendations for the college years. Journal of Jewish Education, 65(3), 41–48.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.