You are here: Resources > FIDIS Deliverables > Identity of Identity > D2.1: Inventory of Topics and Clusters > 

D2.1: Inventory of Topics and Clusters

Conclusion and Future work  Title:



Aaai (2004); Brief History of Artificial Intelligence; AAAI AI Topics dynamic library of introductory information about Artificial Intelligence; web site:

Agre Philip E. and Marc Rotenberg (ed.), Technology and Privacy: The New Landscape, Cambridge Massachussets, London England: MIT Press 1998 

Berners-Lee, Tim; Hendler, James; Lassila, Ora. "The Semantic Web". Scientific American 284(5), pp. 34-43. May 2001

Berscheid, E., & Reis, H. T. (1998). Attraction and close relationships. In D. T. Gilbert & S. T. Fiske & et al. (Eds.), The handbook of social psychology, Vol 2 (4th ed., pp. 193-281). New York, NY, US: McGraw-Hill.

Beslay Laurent and Hannu Hakala (2005); Digital Territory: Bubbles; Vision Book (2005); to be published;

Bisson G., C. N´edellec, and D. Canamero (2000); “Designing Clustering Methods for Ontology Building: the Mo’KWorkbench”; In Proceedings of the First Workshop on Ontology Learning (OL-2000) in conjunction with the Fourteenth European Conference on Artificial Intelligence (ECAI-2000), Berlin, 2000. 

Blanchard A. and Markus L., (2002): Sense of Virtual Community-Maintaining the Experience of Belonging. Proceedings of the 35th HICSS Conference -Volume 8, Hawaii. 

Canhoto Ana Isabel and James Backhouse, (2004); Constructing categories, Construing signs - analysing differences in Suspicious Transaction Reporting practice; IS-CORE 2004 - 4th Annual SIG IS Cognitive Research Workshop; Submitted. 

Chan, C. et al. M., (2004). Recognition and Participation in a Virtual Community: A Case Study. Proceedings of the 37th HICSS Conference, Hawaii.

Cimiano, P., Hotho, A. and Staab, S. (2005); “Learning Concept Hierarchies from Text Corpora using Formal Concept Analysis”; Journal of Artifcial Intelligence Research 24 (2005) 

Claessens J., C. Díaz, S. Nikova, B. De Win, C. Goemans, M. Loncke, V. Naessens, S. Seys, B. De Decker, J. Dumortier, and B. Preneel (2003); "Applications Requirements for Controlled Anonymity," APES Deliverable D7, 129 pages, 2003. 

Clark, H.H., & Brennan, S.E. (1991). Grounding in communication. In L.B. Resnick, J. Levine, & S.D. Behrend (Eds.), Perspectives on socially shared cognition (pp. 127-149). Washington, DC: American Psychological Association. 

Clauß Sebastian, Marit Köhntopp (2001); Identity Managements and Its Support of Multilateral Security; in: Computer Networks 37 (2001), Special Issue on Electronic Business Systems; Elsevier, North-Holland 2001; 205-219 

Cooper Charles (2005); “Getting real about wikimania”, CNET, July 28, 2005 url:

Denny Michael (2002); “Ontology Building: A Survey of Editing Tools”,, November 06, 2002,

Durand Andre (2002); Three Tiers of Identity; Digital Identity World, March 16, 2002

Dutton J., J. Dukerich and C. Harquail (1994) Organizational Images and Member Identification. Administrative Science Quarterly, 39 (1994), pp 239-263. 

E&Y (2004); The Ernst & Young Global Information Security Survey 2004; Ernst & Young, September 2004 

FIDIS WP2 workshop, (2003); Taxonomy of Identity, Anonymity and Pseudonymity; First workshop of the Fidis WP2; Brussels, December 2-3, 2003 

Greene Thomas C (2002); Face recognition technology a proven farce; The Register, 4th January 2002.

Gruber T. R.; A translation approach to portable ontologies; Knowledge Acquisition, 5(2):199-220, 1993

Guarino Nicola, Christopher A. Welty (2002); Evaluating ontological decisions with OntoClean. Communications of the ACM (CACM), Volume 45, 2002. pages: 61-65. 

Hall, H., (2001): Social exchange for knowledge exchange. Paper presented at Managing knowledge: conversations and critiques, University of Leicester Management Centre, 10-11 April 2001. 

Hansen Marit and Andreas Pfitzmann (2004); Anonymity, Unobservability, Pseudonymity, and Identity Management - A Proposal for Terminology; Working document.

Hildebrandt Mireille (2005); Privacy and Identity; in: Erik Claes and Antony Duff (ed.), Privacy and the Criminal Law, proceedings of the Conference on Privacy and the Criminal Law 14th-15th May 2004, to be published 2005

Hildebrandt Mireille James Backhouse eds. (2005); “Descriptive analysis and inventory of profiling practices”; FIDIS deliverable 7.2, June 2005 

Holsapple, C.W. & Joshi, K.D. (2002) "A collaborative approach to ontology design". Communications of the ACM, 45(2), 42-47. 

ICPP (2003), Independent Centre for Privacy Protection (ICPP) Schleswig-Holstein and Studio Notarile Genghini (SNG); Identity Management Systems (IMS): Identification and Comparison; study prepared under contract for Institute for Prospective Technological Studies, Joint Research Centre Seville, Spain, Sept. 2003;

ISO (1999); ISO IS 15408, 1999;

Jarvenpaa and Leidner (1999): Communication and trust in global virtual teams, Organisational Science, Vol. 10, Nov-Dec 1999, pp. 791-815 

Jaquet-Chiffelle David-Olivier et al. (2004); Identity, Identifyability and Anonymity: concepts, definitions, applications; working paper, VIP (Virtual Identity and Privacy Research Center); to be made available at:

Kahney Leander (2004); Social Nets Not Making Friends; Wired magazine, January. 28, 2004 

Kanellos Michael (2004); RFID tags: The people say no; CNET, September 7, 2004 

Koh J. and Kim Y.-G., (2003): Sense of Virtual Community: A Conceptual Framework and Empirical Validation. International Journal of Electronic Commerce, Volume 8, Number 2, Winter 2003-4, pp. 75. 

Korotov, Konstentin. (2004). “Neither Here not There” or “Both Here and There”: Experiencing Liminality and Playing with Identity” Academy of Management Conference, New Orleans, August 6-11 

Lave, J., Wenger, E. (1991). Situated learning: Legitimate peripheral participation. New York: Cambridge University Press. 

Lessig Lawrence (1999), Code and Other Laws of Cyberspace, New York: Basic Books 1999

Li Charlene (2004); Profiles: The Real Value Of Social Networks, Forrester Research report, July 15, 2004 

Missikoff M., R. Navigli, and P. Velardi (2002); The Usable Ontology: An Environment for Building and Assessing a Domain Ontology. Proceedings of the International Semantic Web Conference 2002, Springer, 2002, pp. 39-53. 


O’Brien Timothy L. and Saul Hansell (2004); Barbarians at the digital gate; The New York Times, September 19, 2004 

Olson, Eric T. (2002), "Personal Identity", The Stanford Encyclopaedia of Philosophy (Fall 2002 Edition), Edward N. Zalta (ed.),

Pratt, M. G. (1998); To Be Or Not To Be: Central Questions in Organizational Identification; In D. A. Whetten, and Godfreey, Paul C. (Ed.), Identity in Organizations (pp. 171-207). Thousand Oaks: Sage. 

Prieto-Diaz R (2002); "A faceted approach to building ontologies," presented at Information Reuse and Integration, 2003. IRI 2003. IEEE International Conference on, 2003. 

PRIME (2004); Privacy and Identity Management for Europe Consortium: Framework V0, D14.0.a; 9 June, 2004;

Rand Matt (2004); “Extreme Blogging”; Forbes, december 2004.

Ricoeur Paul (1992), Oneself as another, Chicago and London: University of Chicago Press 1992 

Rost Martin (2003), “An Introduction to the Concept

Thomas J. C., W. A. Kellogg, and T. Erickson (2001); The knowledge management puzzle: Human and social factors in knowledge management; IBM Systems Journal, Volume 40, Number 4, 2001 

Tung, L., et al. (2001): An Empirical Investigation of Virtual Communities and Trust. Proceedings of the 22nd International Conference on Information Systems, 2001, pp. 307-320 

Uschold, M., Gruninger, M., (1996), "Ontologies: principles, methods and applications", The Knowledge Engineering Review, Vol. 11, No. 2, pp. 93-136. 

Wenger Etienne (1999). Communities of Practice: Learning, Meaning, and Identity Cambridge University Press, December 1999 



See also: 

The Fidis Wiki (restricted access).[keyword]=t2.1%20definition


The FIDIS WP2 collection of identity resources at: (to be later transferred at





Conclusion and Future work  fidis-wp2-del2.1_Inventory_of_topics_and_clusters_03.sxw  
29 / 29