-
1
-
-
34547488577
-
What is social informatics and why does it matter?
-
R. Kling, "What is social informatics and why does it matter?," The Information Society, vol. 23, pp. 205-220, 2007.
-
(2007)
The Information Society
, vol.23
, pp. 205-220
-
-
Kling, R.1
-
2
-
-
0036211736
-
Internet paradox revisited
-
R. Kraut, S. Kiesler, B. Boneva, J. Cum-mings, V. Helgeson, and A. Crawford, "Internet paradox revisited," J. Social Issues, vol. 58, pp. 49-74, 2002. (Pubitemid 34268218)
-
(2002)
Journal of Social Issues
, vol.58
, Issue.1
, pp. 49-74
-
-
Kraut, R.1
Kiesler, S.2
Boneva, B.3
Cummings, J.4
Helgeson, V.5
Crawford, A.6
-
4
-
-
0003839495
-
-
PhD thesis Department of Mathematics and Computer Science, University of Stirling
-
S.P. Marsh, "Formalising trust as a computational concept," PhD thesis, Department of Mathematics and Computer Science, University of Stirling, 1994.
-
(1994)
Formalising Trust As A Computational Concept
-
-
Marsh, S.P.1
-
7
-
-
0002101577
-
Reputation systems
-
P. Resnick, R. Zeckhauser, E. Friedman, and Ko. Kuwabara, "Reputation systems," Com-mun. ACM, vol. 43, no. 12, pp. 45-48, 2000.
-
(2000)
Com-mun. ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, Ko.4
-
8
-
-
0002178167
-
Social trust: A cognitive approach
-
C. Castelfran-chi and Yao-Hua Tan, Eds. Kluwer
-
C. Castelfranchi and R. Falcone, "Social trust: a cognitive approach," in Trust and Deception in Virtual Societies, C. Castelfran-chi and Yao-Hua Tan, Eds. Kluwer, 2001, pp. 55-90.
-
(2001)
Trust and Deception in Virtual Societies
, pp. 55-90
-
-
Castelfranchi, C.1
Falcone, R.2
-
9
-
-
33745917403
-
Being trusted in a social network: Trust as relational capital
-
DOI 10.1007/11755593-3, Trust Management - 4th International Conference, iTrust 2006, Proceedings
-
C. Castelfranch, R. Fa lcone, and F. Marzo, "Being trusted in a social network: Trust as relational capital," Lecture Notes in Computer Science, vol. 3986, pp. 19-32, 2006. (Pubitemid 44045014)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3986
, pp. 19-32
-
-
Castelfranchi, C.1
Falcone, R.2
Marzo, F.3
-
10
-
-
0042120176
-
Do you trust? Whom do you trust? When do you trust?
-
PII S0882614501180069
-
C. Snijders and G. Keren, "Do you trust? Whom do you trust? When do you trust?," in Advances in Group Processes, S.R. Thye, E.J. Lawler, M.W. Macy, and H.A. Walker, Eds. Amsterdam: JAI, Elsevier, 2001, pp. 129-160. (Pubitemid 33805210)
-
(2001)
Advances in Group Processes
, vol.18
, pp. 129-160
-
-
Snijders, C.1
Keren, G.2
-
11
-
-
0027769403
-
Perceived risk, trust, and democracy
-
DOI 10.1111/j.1539-6924.1993.tb01329.x
-
P. Slovic, "Perceived risk, trust, and democracy," Risk Analysis, vol. 13, pp. 675-682, 1993. (Pubitemid 24012162)
-
(1993)
Risk Analysis
, vol.13
, Issue.6
, pp. 675-682
-
-
Slovic, P.1
-
12
-
-
0002336395
-
Trust as a commodity
-
D. Gambetta, Ed. Oxford, U.K.: Univ. of Oxford Press
-
P. Dasgupta, "Trust as a commodity," in Trust: Making and Breaking Cooperative Relations, D. Gambetta, Ed. Oxford, U.K.: Univ. of Oxford Press, 2000, pp. 49-72.
-
(2000)
Trust: Making and Breaking Cooperative Relations
, pp. 49-72
-
-
Dasgupta, P.1
-
13
-
-
84862297176
-
Identity: Youth and Crisis
-
E.H. Er ikson, Identity: Youth and Crisis. Norton, 1968.
-
(1968)
Norton
-
-
Er Ikson, E.H.1
-
15
-
-
84928468012
-
Trust and distrust definitions: One bite at a time
-
R. Falcone M. Singh, and Y.H. Tan, Eds. Berlin, Germany: Springer
-
D.H. McKnight and N.L. Chervany, "Trust and distrust definitions: One bite at a time," in Trust in Cyber-Societies: Integrating the Human and Artificial Perspectives, R. Falcone, M. Singh, and Y.H. Tan, Eds. Berlin, Germany: Springer, 2001.
-
(2001)
Trust in Cyber-Societies: Integrating the Human and Artificial Perspectives
-
-
McKnight, D.H.1
Chervany, N.L.2
-
16
-
-
77955671297
-
The ripple effect: Change in trust and its impact over a social network
-
J. Golbeck and U. Kuter, "The ripple effect: Change in trust and its impact over a social network," in Computing with Social Trust. 2009, pp. 169-181.
-
(2009)
Computing with Social Trust.
, pp. 169-181
-
-
Golbeck, J.1
Kuter, U.2
-
17
-
-
57649158750
-
Social trust: Tamper-resilient trust establishment in online communities
-
(Pittsburgh, PA)
-
C. James and L. Ling, "Social trust: Tamper-resilient trust establishment in online communities," in Proc. 8th ACM/IEEE-CS Joint Conf. on Digital Libraries (Pittsburgh, PA), 20 0 8.
-
(2008)
Proc. 8th ACM/IEEE-CS Joint Conf. on Digital Libraries
-
-
James, C.1
Ling, L.2
-
18
-
-
57849089402
-
Securing trust online: Wisdom or oxymoron?
-
B.E. Kolko, Ed. New York, NY: Columbia Univ. Press
-
H. Nissenbaum, "Securing trust online: Wisdom or oxymoron?" in Virtual Publics: Policy and Community in an Electronic Age, B.E. Kolko, Ed. New York, NY: Columbia Univ. Press, 2003.
-
(2003)
Virtual Publics: Policy and Community in An Electronic Age
-
-
Nissenbaum, H.1
-
19
-
-
84919724723
-
-
New York, NY: Oxford Univ. Press
-
R. C. Solomon and F. Flores, Building Trust: In Business, Politics, Relationships, and Life. New York, NY: Oxford Univ. Press, 2001.
-
(2001)
Building Trust: Business, Politics, Relationships, and Life
-
-
Solomon, R.C.1
Flores, F.2
-
23
-
-
77955678938
-
Using a social informatics framework to study the effects of location-based social networking on relationships between people: A review of literature
-
(Wollongong, Australia) June 7-9
-
S.J. Fusco, K. Michael, and M.G. Michael, "Using a social informatics framework to study the effects of location-based social networking on relationships between people: A review of literature," in Proc.(ISTAS̀10) IEEE Symposium on Technology & Society, (Wollongong, Australia), June 7-9, 2010, pp. 158-171.
-
(2010)
Proc.(ISTAS̀10) IEEE Symposium on Technology & Society
, pp. 158-171
-
-
Fusco, S.J.1
Michael, K.2
Michael, M.G.3
-
24
-
-
77954946291
-
Exploring the social implications of location based social networking: An inquiry into the perceived positive and negative impacts of using LBSN between friends
-
June 13-15
-
S.J. Fusco, K. Michael, M.G. Michael, and R. Abbas, "Exploring the social implications of location based social networking: An inquiry into the perceived positive and negative impacts of using LBSN between friends," in Proc. 9th IEEE Int. Conf. Mobile Business (Athens, Greece), June 13-15, 2010, pp. 230-237.
-
(2010)
Proc. 9th IEEE Int. Conf. Mobile Business (Athens, Greece)
, pp. 230-237
-
-
Fusco, S.J.1
Michael, K.2
Michael, M.G.3
Abbas, R.4
-
25
-
-
57649209186
-
Not so different after all: A cross-discipline view of trust
-
Special Topic Forum on Trust in and Between Organizations
-
D. Rousseau and S. Sitkin, "Not so different after all: A cross-discipline view of trust," Acad. Management Rev., vol. 22, pp. 393-404, 1998. (Pubitemid 128114429)
-
(1998)
Academy of Management Review
, vol.23
, Issue.3
, pp. 393-404
-
-
Rousseau, D.M.1
Sitkin, S.B.2
Burt, R.S.3
Camerer, C.4
-
26
-
-
0042495505
-
An integrative model of organizational trust
-
R. C. Mayer, J. H. Davis, and D. Schoor-man, "An integrative model of organizational trust," Acad. Management Rev., vol. 20, pp. 709-734, 1995.
-
(1995)
Acad. Management Rev.
, vol.20
, pp. 709-734
-
-
Mayer, R.C.1
Davis, J.H.2
Schoor-Man, D.3
-
27
-
-
84963063075
-
Trust as a social reality
-
J. D. Lewis and A. Weigert, "Trust as a social reality," Social Forces, vol. 63, pp. 967-985, 1985.
-
(1985)
Social Forces
, vol.63
, pp. 967-985
-
-
Lewis, J.D.1
Weigert, A.2
-
30
-
-
80055052185
-
Location-sharing technologies: Privacy risks and controls
-
J. Tsai, P.G. Kelley, L.F. Cranor, and N. Sa-deh, "Location-sharing technologies: Privacy risks and controls," I/S: J. Law and Policy Information Society, vol. 6, no. 2, pp. 119-151, 2010.
-
(2010)
I/S: J. Law and Policy Information Society
, vol.6
, Issue.2
, pp. 119-151
-
-
Tsai, J.1
Kelley, P.G.2
Cranor, L.F.3
Sa-Deh, N.4
-
31
-
-
35348834249
-
Privacy in location-aware computing environments
-
DOI 10.1109/MPRV.2007.83
-
D. Anthony, D. Kotz, and T. Henderson, "Privacy in location-aware computing environments," IEEE Pervasive Comput., vol. 6, no. 4, pp. 64-72, 2007. (Pubitemid 47594396)
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.4
, pp. 64-72
-
-
Anthony, D.1
Kotz, D.2
Henderson, T.3
-
32
-
-
78649999089
-
Rethinking location sharing: Exploring the implications of social-driven vs. purpose-driven location sharing
-
Sept. 26-29
-
K.P. Tang, J. Lin, J.I. Hong, D.P. Siewio-rek, and N. Sadeh, "Rethinking location sharing: Exploring the implications of social-driven vs. purpose-driven location sharing," in Proc. (Ubicomp 2010) 12th ACM Int. Conf. Ubiquitous Computing (Copenhagen, Denmark), Sept. 26-29, 2010, pp. 85-94.
-
(2010)
Proc. (Ubicomp 2010) 12th ACM Int. Conf. Ubiquitous Computing (Copenhagen, Denmark)
, pp. 85-94
-
-
Tang, K.P.1
Lin, J.2
Hong, J.I.3
Siewio-Rek, D.P.4
Sadeh, N.5
-
33
-
-
84861295423
-
Location disclosure to social relations: Why, when & what people want to share
-
S. Consolovo, I. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge, "Location disclosure to social relations: Why, when & what people want to share," in Proc. SIG-CHI Conf. Human Factors in Computing Systems (Portland, OR). ACM, 2005.
-
(2005)
Proc. SIG-CHI Conf. Human Factors in Computing Systems (Portland, OR). ACM
-
-
Consolovo, S.1
Smith, I.2
Matthews, T.3
Lamarca, A.4
Tabert, J.5
Powledge, P.6
-
34
-
-
78650014424
-
The domestic panopticon: Location tracking in families
-
(New York, NY). ACM
-
J. Boesen, J.A. Rode, and C. Mancini, "The domestic panopticon: location tracking in families," in Proc. (Ubicomp '10) 12th ACM Int. Conf. Ubiquitous Computing (New York, NY). ACM, 2010, pp. 65-74.
-
(2010)
Proc. (Ubicomp '10) 12th ACM Int. Conf. Ubiquitous Computing
, pp. 65-74
-
-
Boesen, J.1
Rode, J.A.2
Mancini, C.3
-
35
-
-
38149063519
-
Locating family values: A field trial of the whereabouts clock
-
B. Brown, A.S. Taylor, S. Izadi, A. Sellen, J.J. Kaye, and R. Eardley, "Locating family values: A field trial of the whereabouts clock," presented at Int. Conf. Ubiquitous Computing (UbiComp), 2007.
-
(2007)
Presented at Int. Conf. Ubiquitous Computing (UbiComp)
-
-
Brown, B.1
Taylor, A.S.2
Izadi, S.3
Sellen, A.4
Kaye, J.J.5
Eardley, R.6
-
36
-
-
37249070894
-
Mobile social networks and social practice: A case study of dodge-ball
-
L. Humphreys, "Mobile social networks and social practice: A case study of dodge-ball," J. Computer-Mediated Communication, vol. 13, no. 1, pp. 341-360, 2008.
-
(2008)
J. Computer-Mediated Communication
, vol.13
, Issue.1
, pp. 341-360
-
-
Humphreys, L.1
-
37
-
-
54149089255
-
From awareness to repartee: Sharing location within social groups
-
(Florence, Italy). ACM
-
L. Barkhuus, B. Brown, M. Bell, S. Sherwood, M. Hall, and M. Chalmers, "From awareness to repartee: Sharing location within social groups," in Proc. 26th Ann. SIGCHI Conf. Human Factors in Computing Syst. (Florence, Italy). ACM, 2008.
-
(2008)
Proc. 26th Ann. SIGCHI Conf. Human Factors in Computing Syst
-
-
Barkhuus, L.1
Brown, B.2
Bell, M.3
Sherwood, S.4
Hall, M.5
Chalmers, M.6
-
39
-
-
0002371174
-
Introductory essay
-
Philadelphia, PA: Open Univ. Press
-
D. Mackenzie, "Introductory essay," The Social Shaping of Technology. Philadelphia, PA: Open Univ. Press, 1999, pp. 2-27.
-
(1999)
The Social Shaping of Technology
, pp. 2-27
-
-
MacKenzie, D.1
-
41
-
-
0003372786
-
Focus group research
-
A. Gibbs, "Focus group research," Social Res. Update, vol. 19, pp. 1-4, 1997.
-
(1997)
Social Res. Update
, vol.19
, pp. 1-4
-
-
Gibbs, A.1
-
42
-
-
0033178111
-
Trust, emotion, sex, politics, and science: Surveying the risk-assessment battlefield
-
P. Slovic, "Trust, emotion, sex, politics, and science: Surveying the risk-assessment battlefield," Risk Analysis, vol. 19, pp. 689-701, 1999.
-
(1999)
Risk Analysis
, vol.19
, pp. 689-701
-
-
Slovic, P.1
-
44
-
-
84892447976
-
Who's viewed you?: The impact of feedback in a mobile location-sharing application
-
(Boston, MA)
-
J. Y. Tsai and P. Kelley, "Who's viewed you?: The impact of feedback in a mobile location-sharing application," in Proc. 27th Int. Conf. Human Factors Computing Systems (Boston, MA), 2009.
-
(2009)
Proc. 27th Int. Conf. Human Factors Computing Systems
-
-
Tsai, J.Y.1
Kelley, P.2
|