References
Adams, A. (2001) ‘Users’ Perception of Privacy in Multimedia Communication’, PhD thesis, School of Psychology, University College London.
Adams, A. and Blandford, A. (2005) ‘Bridging the gap between organizational and user perspectives of security in the clinical domain’, International Journal of Human-Computer Studies, vol. 63, no. 1–2, pp. 175–202, [Online]. DOI: http://dx.doi.org/ 10.1016/ j.ijhcs.2005.04.022 [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)] (Accessed 24 May 2017).
Adams, A. and Sasse, A. (2005) ‘The user is not the enemy’, in Cranor, L. and Simson, G. (eds) Security and Usability: Designing secure systems that people can use. USA: O’Reilly, pp. 610–30.
Adams, A. and Sasse, M.A. (2001) ‘Privacy in multimedia communications: protecting users not just data’, IHM-HCI’01, 10–14 September 2001, Lille, France.
Bellotti, V. and Sellen, A. (1993) ‘Design for privacy in ubiquitous computing environments’, in de Michelis, G., Simone, C. and Schmidt, K. (eds) Proceedings of ECSCW’93, the 3rd European Conference on Computer-Supported Co-operative Work, pp.77–92, Kluwer (Academic Press), Netherlands.
Bernstein, B. and Solomon, J. (1999) ‘Pedagogy, identity and the construction of a theory of symbolic control’, Basil Bernstein questioned by Joseph Solomon, British Journal of Sociology of Education, vol. 20, no. 2.
Cronin, C. (2016) ‘Openness and praxis: exploring the use of open educational practices in higher education’, [online]. Available at https://www.slideshare.net/ cicronin/ openness-and-praxis-srhe (Accessed 24 May 2017).
Fiedler, S. and Pata, K. (2009) ‘Distributed learning environments and social software: In search for a framework of design’, in Hatzipanagos, S. and Warburton, S. (eds.) Social software & developing community ontologies, Hershey, PA, USA, IGI Global, pp. 145–58.
Goffman, E. (1969) The Presentation of Self in Everyday Life, Penguin Press, London.
Houghton, D.J. and Joinson, A.N. (2010) ‘Privacy, social network sites, and social relations’, Journal of Technology in Human Services, vol. 28, no. 1–2, pp. 74–94.
Ince, D.C., Hatton, L. and Graham-Cumming, J. (2012) ‘The case for open computer programs’, Nature, vol. 482, pp. 485–8.
Joinson, A.N. and Paine, C.B. (2007) ‘Self-disclosure, privacy and the Internet’, Oxford handbook of Internet psychology, pp. 237–52.
Kumaraguru, P. and Cranor, L.F. (2005) ‘Privacy indexes: a survey of Westin’s studies’, Institute for Software Research. Paper 856, http://repository.cmu.edu/ isr/ 856 (Accessed 24 May 2017).
Lave, J. and Wenger, E. (1991) Situated Learning: Legitimate Peripheral Participation, Cambridge, Cambridge University Press.
McAndrew, P. and Farrow, R. (2013) The ecology of sharing: synthesizing OER research, in OER 13: Creating a virtuous circle, 26–27 March 2013 [online]. Available at http://oro.open.ac.uk/ 37755/ (Accessed 24 May 2017).
Pearce, N. (2012) ‘Developing students as content scavengers’, OpenCourseWare Consortium Global 2012/OER 12 Conference, 16–18 April, Cambridge.
Preece, J. (2000) Online Communities: Designing Usability and Supporting Sociability, John Wiley & Sons, Inc.
Schoeman, F. (1992) Privacy and Social Freedom, Cambridge, Cambridge University Press.
Tapscott, S. and Williams, D. (2007) Wikinomics; How Mass Collaboration Changes Everything, London, Atlantic Books.
Vollmer, T. (2011) ‘New federal education fund makes available $2 billion to create OER resources in community colleges’ [Web log entry]. Available at: https://blog.creativecommons.org/ 2011/ 01/ 20/ u-s-department-of-labor-and-department-of-education-commit-2-billion-to-create-open-educational-resources-for-community-colleges-and-career-training-cc-by-required-for-grant-outputs/ (Accessed 24 May 2017).
Weller, M. (2010) ‘Big and little OER’, Open Ed 2010: Seventh Annual Open Education Conference, 2–4 November, Barcelona. Available at: http://oro.open.ac.uk/ 24702/ (Accessed 1 July 2014).
Weller, M. (2011) The Digital Scholar: How Technology Is Transforming Scholarly Practice, London, Bloomsbury Academic.
Wenger, E. (1999) Communities of Practice: Learning, Meaning and Identity, Cambridge, Cambridge University Press.
Whitten, A. and Tygar, J. (1999) ‘Why Johnny can’t encrypt: a usability evaluation of PGP 5.0’, Usenix Security, vol. 1999.