Information Technology Reference
In-Depth Information
DiMicco, J., & Millen, D. (2007). Identity manage-
ment: multiple presentations of self in facebook.
Group '07, Conference on Supporting Group
Work
, November 4-7, 2007, Sannibel Island,
Florida, USA.
Gibson, W. (1984).
Neuromancer
. New York:
Ace Books.
Giddens, A. (1990).
The Consequences of moder-
nity
. Stanford, CA: Stanford University Press.
Golbeck, J., Hendler, J., & Parsia, B. (2003). Trust
networks on the semantic web.
Proceedings from
Agents 2003, conference on cooperative informa-
tion agents
, August 27-29, Helsinki, Finland.
Donath, J. (1998). Identity and deception in the
virtual community. In P. Kollock, & M. Smith
(Eds.),
Communities in cyberspace
(29-59).
London: Routledge.
Golbeck, J., & Wasser, M. (2007). Social brows-
ing: Integrating social networks and web brows-
ing.
Proceedings from CHI 2007, conference on
Human Factors in Computing Systems,
April 28
- May 34, San Jose, CA.
Donath, J., & Boyd, D. (2004). Public displays of
connection.
BT Technology Journal
,
22
(4), 71-81.
doi:10.1023/B:BTTJ.0000047585.06264.cc
Friedland, L.A. (1996). Electronic democracy and
the new citizenship.
Media Culture & Society
,
18
,
185-212. doi:10.1177/016344396018002002
Goussevskaia, O. Kuhn. M., & Wattenhofer, R.
(2007). Layers and hierarchies in real virtual net-
works. In
proceedings of IEEE/WIC/ACM Interna-
tional Conference on Web Intelligence
(pp 89-94).
IEEE Computer Society: Washington, DC.
Froehlich, D., Kuchinsky, A., Pering, C., Don, A.,
& Ariss, S. (2002). Requirements for photoware.
Proceedings from the Conference on Computer
Supported Cooperative Work: CSCW 2002
. New
Orleans, LA.
Gross, R., & Acquisti, A. (2005). Information
revelation and privacy in online social networks.
Workshop on Privacy in the Electronic Society
(WPES). Retrieved from Dec 4, 2007 from
http://privacy.cs.cmu.edu/dataprivacy/projects/
facebook/facebook1.html
Froomkin, A. (1995). Anonymity and its enmi-
ties.
Journal of Online Law
, 4. Retrieved Dec 12,
2007 from http://www.wm.edu/law/publications/
jol/95_96/froomkin.html
Geyer, W., Dugan, C., DiMicco, J., Millen., D.,
et al. (2008). Use and reuse of shared Lists as
a social Content Type.
Proceedings of the CHI
2008, conference on Human Factors in Computing
Systems,
April 5-10, 2008, Florence, Italy.
Horst, S. A., & Miller, D. (2006).
The Cell Phone:
An Anthropology of Communication
. Oxform,
UK: Berg.
Hough, A. (2007, November 23). Fraud warn-
ing for users of social networking sites.
Reuters
.
Retrieved Dec 4, 2007, from http:today.reuters.
co.uk/misc/
Gibs, J., Fields, N., Liang, P., & Plipre, A. (2005).
SNIF: Social networking in Fur.
Proceedings of
the CHI 2005 conference on Human Factors in
Computing Systems
, April 2-7, 2005, Portland,
Oregon, USA.
Johnson, B. (2007, Aug 13). Facebook's Code
Leak Raises Fears of Fraud.
Guardian Unlimited
.
RetrievedApril 12, 2007, from http://www.guard-
ian.co.uk/technology/2007/aug/13/internet
Gibson, R. (2007). Who's really in your top 8: Net-
working security in the age of social networking.
Proceedings of the SIGUCCS' 07, conference on
user services
, October 7-10, 2007, Orlando, FL.
Search WWH ::
Custom Search