Database Reference
In-Depth Information
25. Li, W.-S., Candan, K.S., Hirata, K., Hara, Y.: Supporting efficient multimedia database
exploration. VLDB J. 9(4), 312-326 (2001)
26. Fu, W., Pirolli, P.: SNIF-ACT: a cognitive model of user navigation on the world wide web.
Hum. Comput. Interact. 22(4), 355-412 (2007)
27. Mitchell, W.J.T.: What Do Pictures Want? The Lives and Loves of Images. University of
Chicago Press, Chicago (2005)
28. O'Gorman, M.: E-crit: Digital Media, Critical Theory and the Humanities. University of
Toronto Press, Toronto (2006)
29. Abel, F.: The benefit of additional semantics in folksonomy systems. In: Proceedings of the
Conference on Information and Knowledge Management, Napa Valley, CA, USA, pp. 49-56
(2008)
30. Bao, S., Xue, G., Wu, X., Yu, Y., Fei, B., Su, Z.: Optimizing web search using social
annotations. In: Proceedings of the 16th International Conference on World Wide Web,
Banff, Alberta, Canada, pp. 501-510 (2007)
31. George, C.E., Scerri, J.: Web 2.0 and user-generated content: legal challenges in the new
frontier. J. Inf. Law Technol. 2 (2007)
32. Adhikari, R.: Experts on Web 2.0 security problems. http://itmanagement.earthweb.com/secu/
article.php/3805496/Experts-on-Web-20-Security-Problems.htm (2009). Accessed 21 Feb
2009
33. Bhatnagar, S., Herath, T., Sharman, R., Rao, H.R., Upadhyaya, S.: Web 2.0: investigation of
issues for the design of social networks. In: Ordoneez de Pablos, P. (ed.) Web 2.0: The
Business Model, pp. 133-146. Springer, New York (2009)
34. Ben-Itzhak, Y.: Tackling the security issues of Web 2.0. http://www.scmagazineus.com/
tackling-the-security-issues-of-web-20/article/35609/ (2007). Accessed 10 Sept 2007
35. Acohido, B.: How cybercriminals invade social networks, companies. USA Today. http://
www.usatoday.com/tech/news/computersecurity/2010-03-04-1Anetsecurity04_CV_N.htm
(2010). Accessed 4 Mar 2010
Search WWH ::




Custom Search