Information Technology Reference
In-Depth Information
DiMicco, J., & Millen, D. (2007). Identity manage-
ment: multiple presentations of self in facebook.
Group '07, Conference on Supporting Group
Work , November 4-7, 2007, Sannibel Island,
Florida, USA.
Gibson, W. (1984). Neuromancer . New York:
Ace Books.
Giddens, A. (1990). The Consequences of moder-
nity . Stanford, CA: Stanford University Press.
Golbeck, J., Hendler, J., & Parsia, B. (2003). Trust
networks on the semantic web. Proceedings from
Agents 2003, conference on cooperative informa-
tion agents , August 27-29, Helsinki, Finland.
Donath, J. (1998). Identity and deception in the
virtual community. In P. Kollock, & M. Smith
(Eds.), Communities in cyberspace (29-59).
London: Routledge.
Golbeck, J., & Wasser, M. (2007). Social brows-
ing: Integrating social networks and web brows-
ing. Proceedings from CHI 2007, conference on
Human Factors in Computing Systems, April 28
- May 34, San Jose, CA.
Donath, J., & Boyd, D. (2004). Public displays of
connection. BT Technology Journal , 22 (4), 71-81.
doi:10.1023/B:BTTJ.0000047585.06264.cc
Friedland, L.A. (1996). Electronic democracy and
the new citizenship. Media Culture & Society , 18 ,
185-212. doi:10.1177/016344396018002002
Goussevskaia, O. Kuhn. M., & Wattenhofer, R.
(2007). Layers and hierarchies in real virtual net-
works. In proceedings of IEEE/WIC/ACM Interna-
tional Conference on Web Intelligence (pp 89-94).
IEEE Computer Society: Washington, DC.
Froehlich, D., Kuchinsky, A., Pering, C., Don, A.,
& Ariss, S. (2002). Requirements for photoware.
Proceedings from the Conference on Computer
Supported Cooperative Work: CSCW 2002 . New
Orleans, LA.
Gross, R., & Acquisti, A. (2005). Information
revelation and privacy in online social networks.
Workshop on Privacy in the Electronic Society
(WPES). Retrieved from Dec 4, 2007 from
http://privacy.cs.cmu.edu/dataprivacy/projects/
facebook/facebook1.html
Froomkin, A. (1995). Anonymity and its enmi-
ties. Journal of Online Law , 4. Retrieved Dec 12,
2007 from http://www.wm.edu/law/publications/
jol/95_96/froomkin.html
Geyer, W., Dugan, C., DiMicco, J., Millen., D.,
et al. (2008). Use and reuse of shared Lists as
a social Content Type. Proceedings of the CHI
2008, conference on Human Factors in Computing
Systems, April 5-10, 2008, Florence, Italy.
Horst, S. A., & Miller, D. (2006). The Cell Phone:
An Anthropology of Communication . Oxform,
UK: Berg.
Hough, A. (2007, November 23). Fraud warn-
ing for users of social networking sites. Reuters .
Retrieved Dec 4, 2007, from http:today.reuters.
co.uk/misc/
Gibs, J., Fields, N., Liang, P., & Plipre, A. (2005).
SNIF: Social networking in Fur. Proceedings of
the CHI 2005 conference on Human Factors in
Computing Systems , April 2-7, 2005, Portland,
Oregon, USA.
Johnson, B. (2007, Aug 13). Facebook's Code
Leak Raises Fears of Fraud. Guardian Unlimited .
RetrievedApril 12, 2007, from http://www.guard-
ian.co.uk/technology/2007/aug/13/internet
Gibson, R. (2007). Who's really in your top 8: Net-
working security in the age of social networking.
Proceedings of the SIGUCCS' 07, conference on
user services , October 7-10, 2007, Orlando, FL.
Search WWH ::




Custom Search