You are here: Resources > FIDIS Deliverables > Identity of Identity > D2.1: Inventory of Topics and Clusters > 

D2.1: Inventory of Topics and Clusters

Conclusion and Future work  Title:
REFERENCES
 

 

References

Aaai (2004); Brief History of Artificial Intelligence; AAAI AI Topics dynamic library of introductory information about Artificial Intelligence; web site: http://www.aaai.org/AITopics/bbhist.html

Agre Philip E. and Marc Rotenberg (ed.), Technology and Privacy: The New Landscape, Cambridge Massachussets, London England: MIT Press 1998 

Berners-Lee, Tim; Hendler, James; Lassila, Ora. "The Semantic Web". Scientific American 284(5), pp. 34-43. May 2001 http://www.sciam.com/article.cfm?articleID=00048144-10D2-1C70-84A9809EC588EF21&ref=sciam

Berscheid, E., & Reis, H. T. (1998). Attraction and close relationships. In D. T. Gilbert & S. T. Fiske & et al. (Eds.), The handbook of social psychology, Vol 2 (4th ed., pp. 193-281). New York, NY, US: McGraw-Hill.

Beslay Laurent and Hannu Hakala (2005); Digital Territory: Bubbles; Vision Book (2005); to be published; http://europa.eu.int/information_society/topics/research/visionbook/index_en.htm

Bisson G., C. N´edellec, and D. Canamero (2000); “Designing Clustering Methods for Ontology Building: the Mo’KWorkbench”; In Proceedings of the First Workshop on Ontology Learning (OL-2000) in conjunction with the Fourteenth European Conference on Artificial Intelligence (ECAI-2000), Berlin, 2000. 

Blanchard A. and Markus L., (2002): Sense of Virtual Community-Maintaining the Experience of Belonging. Proceedings of the 35th HICSS Conference -Volume 8, Hawaii. 

Canhoto Ana Isabel and James Backhouse, (2004); Constructing categories, Construing signs - analysing differences in Suspicious Transaction Reporting practice; IS-CORE 2004 - 4th Annual SIG IS Cognitive Research Workshop; Submitted. 

Chan, C. et al. M., (2004). Recognition and Participation in a Virtual Community: A Case Study. Proceedings of the 37th HICSS Conference, Hawaii.

Cimiano, P., Hotho, A. and Staab, S. (2005); “Learning Concept Hierarchies from Text Corpora using Formal Concept Analysis”; Journal of Artifcial Intelligence Research 24 (2005) 

Claessens J., C. Díaz, S. Nikova, B. De Win, C. Goemans, M. Loncke, V. Naessens, S. Seys, B. De Decker, J. Dumortier, and B. Preneel (2003); "Applications Requirements for Controlled Anonymity," APES Deliverable D7, 129 pages, 2003. 

Clark, H.H., & Brennan, S.E. (1991). Grounding in communication. In L.B. Resnick, J. Levine, & S.D. Behrend (Eds.), Perspectives on socially shared cognition (pp. 127-149). Washington, DC: American Psychological Association. 

Clauß Sebastian, Marit Köhntopp (2001); Identity Managements and Its Support of Multilateral Security; in: Computer Networks 37 (2001), Special Issue on Electronic Business Systems; Elsevier, North-Holland 2001; 205-219 

Cooper Charles (2005); “Getting real about wikimania”, CNET News.com, July 28, 2005 url: http://news.com.com/Getting+real+about+wikimania/2008-1082_3-5807538.html

Denny Michael (2002); “Ontology Building: A Survey of Editing Tools”, XML.org, November 06, 2002, http://www.xml.com/pub/a/2002/11/06/ontologies.html

Durand Andre (2002); Three Tiers of Identity; Digital Identity World, March 16, 2002http://www.digitalidworld.com/print.php?sid=26

Dutton J., J. Dukerich and C. Harquail (1994) Organizational Images and Member Identification. Administrative Science Quarterly, 39 (1994), pp 239-263. 

E&Y (2004); The Ernst & Young Global Information Security Survey 2004; Ernst & Young, September 2004 

FIDIS WP2 workshop, (2003); Taxonomy of Identity, Anonymity and Pseudonymity; First workshop of the Fidis WP2; Brussels, December 2-3, 2003 

Greene Thomas C (2002); Face recognition technology a proven farce; The Register, 4th January 2002. http://www.theregister.co.uk/2002/01/04/face_recognition_technology_a_proven/

Gruber T. R.; A translation approach to portable ontologies; Knowledge Acquisition, 5(2):199-220, 1993http://www-ksl.stanford.edu/kst/what-is-an-ontology.html

Guarino Nicola, Christopher A. Welty (2002); Evaluating ontological decisions with OntoClean. Communications of the ACM (CACM), Volume 45, 2002. pages: 61-65. 

Hall, H., (2001): Social exchange for knowledge exchange. Paper presented at Managing knowledge: conversations and critiques, University of Leicester Management Centre, 10-11 April 2001. 

Hansen Marit and Andreas Pfitzmann (2004); Anonymity, Unobservability, Pseudonymity, and Identity Management - A Proposal for Terminology; Working document. http://dud.inf.tu-dresden.de/Literatur_V1.shtml

Hildebrandt Mireille (2005); Privacy and Identity; in: Erik Claes and Antony Duff (ed.), Privacy and the Criminal Law, proceedings of the Conference on Privacy and the Criminal Law 14th-15th May 2004, to be published 2005

Hildebrandt Mireille James Backhouse eds. (2005); “Descriptive analysis and inventory of profiling practices”; FIDIS deliverable 7.2, June 2005 

Holsapple, C.W. & Joshi, K.D. (2002) "A collaborative approach to ontology design". Communications of the ACM, 45(2), 42-47. 

ICPP (2003), Independent Centre for Privacy Protection (ICPP) Schleswig-Holstein and Studio Notarile Genghini (SNG); Identity Management Systems (IMS): Identification and Comparison; study prepared under contract for Institute for Prospective Technological Studies, Joint Research Centre Seville, Spain, Sept. 2003; http://www.datenschutzzentrum.de/idmanage/study/ICPP_SNG_IMS-Study.pdf

ISO (1999); ISO IS 15408, 1999; http://www.commoncriteria.org/.

Jarvenpaa and Leidner (1999): Communication and trust in global virtual teams, Organisational Science, Vol. 10, Nov-Dec 1999, pp. 791-815 

Jaquet-Chiffelle David-Olivier et al. (2004); Identity, Identifyability and Anonymity: concepts, definitions, applications; working paper, VIP (Virtual Identity and Privacy Research Center); to be made available at: http://www.vip.ch/papers/identity.pdf

Kahney Leander (2004); Social Nets Not Making Friends; Wired magazine, January. 28, 2004 

Kanellos Michael (2004); RFID tags: The people say no; CNET News.com, September 7, 2004 

Koh J. and Kim Y.-G., (2003): Sense of Virtual Community: A Conceptual Framework and Empirical Validation. International Journal of Electronic Commerce, Volume 8, Number 2, Winter 2003-4, pp. 75. 

Korotov, Konstentin. (2004). “Neither Here not There” or “Both Here and There”: Experiencing Liminality and Playing with Identity” Academy of Management Conference, New Orleans, August 6-11 

Lave, J., Wenger, E. (1991). Situated learning: Legitimate peripheral participation. New York: Cambridge University Press. 

Lessig Lawrence (1999), Code and Other Laws of Cyberspace, New York: Basic Books 1999

Li Charlene (2004); Profiles: The Real Value Of Social Networks, Forrester Research report, July 15, 2004 

Missikoff M., R. Navigli, and P. Velardi (2002); The Usable Ontology: An Environment for Building and Assessing a Domain Ontology. Proceedings of the International Semantic Web Conference 2002, Springer, 2002, pp. 39-53. 

Noy http://www.ksl.stanford.edu/people/dlm/papers/ontology101/ontology101-noy-mcguinness.html

O’Brien Timothy L. and Saul Hansell (2004); Barbarians at the digital gate; The New York Times, September 19, 2004 

Olson, Eric T. (2002), "Personal Identity", The Stanford Encyclopaedia of Philosophy (Fall 2002 Edition), Edward N. Zalta (ed.), http://plato.stanford.edu/archives/fall2002/entries/identity-personal

Pratt, M. G. (1998); To Be Or Not To Be: Central Questions in Organizational Identification; In D. A. Whetten, and Godfreey, Paul C. (Ed.), Identity in Organizations (pp. 171-207). Thousand Oaks: Sage. 

Prieto-Diaz R (2002); "A faceted approach to building ontologies," presented at Information Reuse and Integration, 2003. IRI 2003. IEEE International Conference on, 2003. 

PRIME (2004); Privacy and Identity Management for Europe Consortium: Framework V0, D14.0.a; 9 June, 2004;http://www.prime-project.eu.org/public/prime_products/deliverables/pub_del_D14.0.a_ec_wp14.0_V4_final.pdf

Rand Matt (2004); “Extreme Blogging”; Forbes, december 2004. http://www.forbes.com/best/2004/1213/bow001.html

Ricoeur Paul (1992), Oneself as another, Chicago and London: University of Chicago Press 1992 

Rost Martin (2003), “An Introduction to the Concept http://www.calt.insead.edu/fidis/workshop/workshop-wp2-december2003/

Thomas J. C., W. A. Kellogg, and T. Erickson (2001); The knowledge management puzzle: Human and social factors in knowledge management; IBM Systems Journal, Volume 40, Number 4, 2001 

Tung, L., et al. (2001): An Empirical Investigation of Virtual Communities and Trust. Proceedings of the 22nd International Conference on Information Systems, 2001, pp. 307-320 

Uschold, M., Gruninger, M., (1996), "Ontologies: principles, methods and applications", The Knowledge Engineering Review, Vol. 11, No. 2, pp. 93-136. 

Wenger Etienne (1999). Communities of Practice: Learning, Meaning, and Identity Cambridge University Press, December 1999 

 

 

See also: 

The Fidis Wiki (restricted access). 

http://internal.fidis.net/178.0.html?tx_a1wiki_pi1[keyword]=t2.1%20definition

 

The FIDIS WP2 collection of identity resources at: 

http://www.calt.insead.edu/fidis/information/news/ (to be later transferred at http://www.fidis.net/).

 

 

 

 

Conclusion and Future work  fidis-wp2-del2.1_Inventory_of_topics_and_clusters_03.sxw  
29 / 29