참고문헌
- 권건보, 개인정보보호와 자기정보통제권, 서울 :경인문화사, 2005.
- 방송통신위원회, 트위터에 노출된 나의 정보는 얼마나 될까?, 방송통신위원회, 2011.
- 윤상오, "전자정부 구현을 위한 개인정보보호 정책에관한 연구 : 정부신뢰 구축의 관점에서", 한국지역정보화학회지, 12권 2호(2009), 1-29.
- 이강신, 이기혁, 박진식, 최일훈, 개인정보보호 기초와 활용, 서울 : 미디어그룹 인포더, 2010
- 이창범, 조정현, "APT(Asia-Pacific Telecommunity)개인정보 및 프라이버시 보호 가이드라인 제정 방안 연구", 개인정보분쟁조정위원, 2003.
- 조동기, 김성우, "인터넷의 일상화와 개인정보 보호", KISDI 이슈리포트, 11권(2003), 10-11.
- 조동기, 김성우, "인터넷의 일상화와 개인정보 보호", KISDI 이슈리포트, 11권(2003), 10-11.
- 황인호, "개인정보보호 제도에서의 규제에 관한연구", 공법연구, 30권 4호(2002), 232-232.
- Bayes, T., "An essay towards solving a problem in the doctrine of chances. Philos", Philosophical Transactions, Vol.53(1763), 370- 418. https://doi.org/10.1098/rstl.1763.0053
- Boyd, D. M. and N. B. Ellison, "Social Network Sites : Definition, History, and Scholarship", Journal of Computer-Mediated Communication, Vol.13, No.1(2008), 210-230.
- Clarke, R., Beyond the OECD Guidelines : Privacy Protection for the 21st Century, (2000), Roger Clarke's Web-Site : http://www.roge rclarke.com/DV/PP21C.html.
- Cooley, T. C., Laws of Torts, New York : Praeger, 1888.
- Davies, S., Big Brother : Britain's web of surveillance and the new technological order, London : Pan, 1996.
- Domingos, P. and M. Pazzani, "Beyond Independence : Conditions for the Optimality of the Simple Bayesian Classifier", Proceedings of the 13th International Conference on Machine Learning, (1996), 105-112.
- Gross, R. and A. Acquisti, "Information revelation and privacy in online social networks", WPES '05 Proceedings of the 2005 ACM workshop on Privacy in the electronic society, 2005.
- Information Commissioner's Office, Notification Handbook-A Complete Guide to Notification. Information Commissioner, 2001.
- Jagatic, T., N. Johnson, M. Jakobsson, and F. Menczer, "Social phishing", Communications of the ACM, Vol.5, No.10(2007), 94-100.
- Kobsa, A., "Personalized Hypermedia and International Privacy", Communications of the ACM, Vol.45, No.5(2002), 64-67.
- Lampe, C. and N. B. Ellison, "Changes in use and perception of facebook", Proceedings of the 2008 ACM conference on Computer supported cooperative work CSCW '08, (2008), 721-730.
- Lee, D. L., H. Chuang, and K. Seamons, "Document Ranking and the Vector-Space Model", IEEE Software, Vol.14, No.2(1997), 67-75. https://doi.org/10.1109/52.582976
- Lewis, D. D., Representation and Learning in Information Retrieval, Doctorial Dissertation : The Graduate School of the University of Massachusetts, 1992.
- Livingstone, S., "Taking risky opportunities in youthful content creation : teenager's use of social networking sites for intimacy, privacy and self-expression", New Media Society, Vol.10, No.3(2008), 393-411. https://doi.org/10.1177/1461444808089415
- LoPucki, L. M., "Human Identification Theory and the Identity Theft Problem", Tex. L. Rev., Vol.80(2001), 89-135.
- Manning, C. D., P. Raghavan, and H. Schutze, Introduction to Information Retrieval, Cambridge University Press, 2008.
- Mason, R. O., "Four Ethical Issues of the Information Age", MIS Quarterly, Vol.10, No.1 (1986), 5-12. https://doi.org/10.2307/248873
- Meeder, B., J. Tam, P. G. Kelley, and L. F. Cranor, "RT@IWantPrivacy : Widespread Violation of Privacy Settings in the Twitter Social Network", Web 2.0 Privacy and Security Workshop, IEEE Symposium on Security and Privacy, 2010.
- Mitchell, T. M., Machine Learning, McGraw Hill, 2010.
- Parent, W. A., "Privacy : A Brief Survey of the Conceptual Landscape", Santa Clara Computer and High Tech. L. J., Vol.11(1995).
- Peng, H., F. Long, and C. Ding, "Feature selection based on mutual information : criteria of max-dependency, max-relevance, and min-redundancy", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.27, No.8(2005), 1226-1238. https://doi.org/10.1109/TPAMI.2005.159
- Schauer, F., "Internet Privacy and The Public- Private Distinction", Jurimetrics, Vol.38, No.4 (1998), 555-564.
- Smith, R. E., Ben Franklin's Web Site : Privacy and Curiosity from Plymouth Rock to the Internet, Sheridan Books, 2000.
- Solove, D. J., "A taxonomy of privacy", University of Pennsylvania Law Review, Vol.154, No.3(2006), 477-560. https://doi.org/10.2307/40041279
- Steinbach, M., G. Karypis, and V. Kumar, "A Comparison of Document Clustering Techniques", KDD Workshop on Text Mining, 2000.
- Tong, S. T., B. Van Der Heide, L. Langwell, and J. B. Walther, "Too Much of a Good Thing? The Relationship Between Number of Friends and Interpersonal Impressions on Facebook", Journal of Computer-Mediated Communication, Vol.13, No.3(2008), 531-549. https://doi.org/10.1111/j.1083-6101.2008.00409.x
- Wacks, R., Privacy, New York : Oxford University Express, 1993.
- Warren. S. D., L. D. Brandeis, "The Right to Privacy", Harvard Law Review, Vol.4, No.5 (1890), 193-220. https://doi.org/10.2307/1321160
- Weible, R. J., Privacy and data : An empirical study of the influence of types of data and situational context upon privacy perceptions, D.B.A. : Mississippi State University, 1993.
- Wolak J., D. Finkelhor, K. J. Mitchell, and M. L. Ybarra, "Online "Predators" and Their Victims", Psychology of Violence, Vol.1, No.1(2010), 13-35. https://doi.org/10.1037/2152-0828.1.S.13
피인용 문헌
- 텍스트 마이닝을 활용한 신문사에 따른 내용 및 논조 차이점 분석 vol.18, pp.3, 2012, https://doi.org/10.13088/jiis.2012.18.3.053