Chapter 4. References

Alexander, C. (1964). Notes on the Synthesis of Form. Cambridge, Ma: Harvard University Press.

Cooper, A. (1999). The Inmates are Running the Asylum- Why High Tech Products Drive us Crazy and How to Restore the Sanity. Indiana: SamsPublishing .

Festinger, L. (1957). A Theory of Cognitive Dissonance. Stanford, CA: Stanford University Press.

Foreman, B., & Whitworth, B. (2005). Information Disclosure and the Online Customer Relationship. Paper presented at the Quality, Values and Choice Workshop, Computer Human Interaction (CHI).

Forester, T., & Morrison, P. (1994). Computer Ethics London: MIT Press.

Fukuyama, F. (1992). The End of History and the Last Man. New York: Avon Books Inc.

Gauze, C. F. (2003). I See You’re Writing an Article… Retrieved 2006

Goldstein, M., Alsio, G., & Werdenhoff, J. (2002). “The media equation does not always apply: People are not polite to small computers.” Personal and Ubiquitous Computing (6), pp. 87-96.

Jenkins, S. (2006). “Concerning Interruptions.” IEEE Computer, 39 (11), pp. 114-116.

Larkin, E. (2005). “Spear Phishing” PC World, November, 2005.

Lessig, L. (1999). Code and other laws of cyberspace. New York: Basic Books.

Mayer, R. E., Johnson, W. L., Shaw, E., & Sandhu, S. (2006). “Constructing computer-based tutors that are socially sensitive: Politeness in educational software.” International Journal of Human Computer Studies, 64(1), pp. 36-42.

Miller, C. A. (2004). “Human-Computer Etiquette: Managing expectations with intentional agents.” Communications of the ACM, 47(4), pp. 31-34.

Nass, C. (2004). “Etiquette Equality: Exhibitions and expectations of computer politeness.” Communications of the ACM, 47(4), 35-37.

Pallatto, J. (2007). Monthly Microsoft Patch Hides Tricky IE 7 Download. January 22.

Power, R. (2000). Tangled Web: Tales of digital crime from the shadows of cyberspace. Indianapolis: QUE Corporation.

Pratley, C. (2004). Chris_Pratley’s OneNote WebLog. 2004

Raskin, J. (2000). The Humane Interface. Boston: Addison-Wesley.

Rawls, J. (2001). Justice as Fairness. Cambridge, MA: Harvard University Press.

Rose, G., Khoo, H., & Straub, D. (1999). “Current Technological Impediments to Business-to-Consumer Electronic Commerce.” Communications of the AIS, I(5).

Shectman, N., & Horowitz, L. M. (2003). Media inequality in conversation: How people behave differently when interacting with computers and people. Paper presented at the CHI (Computer Human Interaction) 2003 Conference, Ft Lauderdale, Florida.

Technology Threats to Privacy (2002, February 24). New York Times. p.12.

Transparency-International. (2001). Corruption Perceptions.

Tzeng, J. (2004). Toward a more civilized design: studying the effects of computers that apologize. International Journal of Human-Computer Studies, 61(3), pp. 319-345.

Whitworth, B. (2005). Polite Computing. Behaviour & Information Technology, 24 (5), pp. 353 – 363.

Whitworth, B. (2008). Some implications of Comparing Human and Computer Processing. Paper presented at the Proceedings of the 41st Hawaii International Conference on System Sciences.

Whitworth, B., deMoor, A. and Liu, T. (2006). Towards a Theory of Online Social Rights. In Z. T. R. Meersman, P. Herrero et al. (Eds.), OTM Workshops 2006, LNCS 4277 (pp. 247 – 256). Berlin Heidelberg: Springer-Verlag

Whitworth, B., & deMoor, A. (2003). Legitimate by design: Towards trusted virtual community environments. Behaviour & Information Technology, 22(1), pp. 31-51.

Whitworth, B., & Whitworth, E. (2004). “Spam and the socio-technical gap.” IEEE Computer37 (10), pp. 38-45.

Wright, R. (2001). Nonzero: The logic of human destiny. New York: Vintage Books.