You are here: Resources > FIDIS Deliverables > Identity of Identity > D2.2: Set of use cases and scenarios > 

D2.2: Set of use cases and scenarios

Conclusion  Title:
REFERENCES
 

 

References

 

Barkham Patrick (2005); “Blogger sacked for sounding off”; The Guardian, Wednesday January 12, 2005 

Becker David (2002); “Game exchange dispute goes to court”; Cnet news.com, February 7, 2002 

Becker David (2002 b);  “Online gaming’s cheating heart”; Cnet news.com, June 7, 2002

Becker David (2004); “Inflicting pain on ‘griefers’”; CNET News.com, December 13, 2004 

Beenen, Gerard, Ling, Kimberly, Wang, Xiaoqing, Chang, Klarissa, Frankowski, Dan, Resnick, Paul, and Robert E Kraut (2004). "Using Social Psychology to Motivate Contributions to Online Communities". To appear in Proceedings of ACM CSCW 2004 Conference on Computer Supported Cooperative Work, Chicago, IL. 2004

Berman, Joshua and Amy Bruckman (2001); “The Turing Game: Exploring Identity in an Online Environment”; Convergence, 7(3), 83-102, 2001.

Borzo Jeanette (2004); “Online Social Networks Are Havens for Job Hunters”; CareerJournal.com, September 23rd, 2004 http://www.careerjournal.com/jobhunting/networking/20040923-borzo.html

Bourdieu, Pierre. (1980), “Le capital social: notes provisoires”. In Actes de la recherche en sciences sociales, volume 31, pp. 2-3.

Braunschweig Carolina (2003); “The new Internet Gamble”; Venture Capital Journal, December 2003 

Brunker Mike (2000); “EBay reins in anti-shilling ‘posse’”; MSNBC, Oct. 26, 2000http://www.msnbc.com/news/481550.asp

Castronova Edward (2004); “The Price of Bodies: A Hedonic Pricing Model of Avatar Attributes in a Synthetic World”; Kyklos, Vol. 57, No. 2, pp. 173-196, May 2004http://papers.ssrn.com/sol3/papers.cfm?abstract_id=546921

Castronova, Edward (2003), "The Price of ‘Man’ and ‘Woman’: A Hedonic Pricing Model of Avatar Attributes in a Synthethic World" (June 2003). CESifo Working Paper Series No. 957. http://ssrn.com/abstract=415043

Dellarocas, Chrysanthos (2000); “Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior”; Proceedings of the 2nd ACM Conference on Electronic Commerce, October 2000. 

Erickson, T., Halverson, C., Kellogg, W. A., Laff, M. and Wolf, T. (2002); "Social Translucence: Designing Social Infrastructures that Make Collective Activity Visible." Communications of the ACM (Special issue on Community, ed. J. Preece), Vol. 45, No. 4, pp. 40-44, 2002.

Fattah Hassan,  Paul Pamela (2002); “Gaming Gets Serious - market, survey data on online gaming - Statistical Data Included”; American Demographics,  May 1, 2002

Fox Susannah, Janna Quitney Anderson and Lee Rainie (2005); “The Future of the Internet”; Pew Internet & American Life Project report; 9 January 2005 

Friedman, E. and P. Resnick (2001). "The Social Cost of Cheap Pseudonyms." Journal of Economics and Management Strategy 10(2): 173-199.

Granovetter Mark (1973); “The Strength of Weak Ties"; The American Journal of Sociology, 78 (May): 1360-1380, 1973 

Hu Jim (2004), “Study: Broadband leaps past dial-up”, CNET News.com, August 18, 2004. 

Jean Camp L. (2004), “Digital Identity”; IEEE Technology & Society, Vol 23, No 3 pp. 34- 41 (2004).

Jordan Ken, Jan Hauser, and Steven Foster (2003); “The Augmented Social Network: Building identity and trust into the next-generation Internet”; First Monday, Volume 8, Number 8 — August 4th 2003http://www.firstmonday.org/issues/issue8_8/jordan/

Kahney Leander (2004), “Social Nets Not Making Friends”, Wired magazine, Jan. 28, 2004  

Kanellos Michael (2005); “Gates taking a seat in your den”; Cnet news.com, January 5, 2005http://news.com.com/Gates+taking+a+seat+in+your+den/2008-1041_3-5514121.html

Kumar R., Novak J., Raghavan P., Tomkins A. (2004); "Structure and evolution of blogspace"; Communications of the ACM 47(12): 35-39, 2004.

Leonard Andrew (2004); “You are who you know”; Salon.com, June 15, 2004http://www.salon.com/tech/feature/2004/06/15/social_software_one/

Li Charlene (2004); “Profiles: The Real Value of Social Networks”; Forrester Research, July 15, 2004 

McCullagh Declan (2004); “Gmail and its discontents”, by, CNET News.com, April 26, 2004 

McCullagh Declan (2004b); “Security officials to spy on chat rooms”, by, CNET News.com, November 24, 2004 

Metz Rachel (2004); Blogs May Be a Wealth Hazard; Wired magazine, December 6, 2004 http://www.wired.com/news/culture/0,1284,65912,00.html

Nardi, B., Whittaker, S, Schwarz, H. (2000); "It’s Not What You Know, It’s Who You Know: Work in the Information Age"; First Monday, May, 2000 

Nardi B., Schiano D., Gumbrecht M., Swartz L. (2004); "Why we blog"; Communications of the ACM 47(12): 41-46, 2004. 

Patil, S. and A. Kobsa (2004): Instant Messaging and Privacy. Proceedings of HCI 2004, Leeds, England. 

Rainie Lee (2005); “The state of blogging”; Pew Internet & American Life Project report, DATA MEMO, January 2005 

Resnick, P., R. Zeckhauser, J. Swanson, and K. Lockwood (2002); "The Value of Reputation on eBay: A Controlled Experiment," U. of Michigan Working paper, originally presented at the ESA conference, June 2002 

Resnick, Paul, Richard Zeckhauser, Eric Friedman and Ko Kuwabara (2000); “Reputation Systems: Facilitating Trust in Internet Interactions”; Communications of the ACM, 43(12), December 2000.

Saunders Christopher (2002); “Enterprise IM Spurs Privacy Concerns”; Instant Messaging Planet.com, November 18, 2002 http://www.instantmessagingplanet.com/enterprise/article.php/1502941

Shiu Eulynn and Amanda Lenhart (2004); “How Americans Use Instant Messaging”; Pew Internet & American Life Project report, September 2004. 

Smith Elliot Blair (2003); "Wall St. Bloodhounds Track IMs for Clues"; USA Today, 23 September 2003. http://www.usatoday.com/money/companies/management/2003-09-18-ims_x.htm

Stafford Thomas F. and Dennis Gonier Communications of the ACM archive, Volume 47 ,

Steinkuehler, C. A. (2004). “Learning in massively multiplayer online games”; In Y. B. Kafai, W. A. Sandoval, N. Enyedy, A. S. Nixon, & F. Herrera (Eds.), Proceedings of the Sixth International Conference of the Learning Sciences (pp.521–528).Mahwah, NJ: Erlbaum. 

Suitt Halley (2003); “A Blogger in Their Midst”; Harvard Business Review, vol. 81, no. 9, September 2003.

Van Gelder, Lindsy (1991); "The Strange Case of the Electronic Lover"; In Computerization and Controversy: Value Conflicts and Social Choices, edited by Charles Dunlop and Rob Kling, Pages 364-375.

Warner Melanie (2003); “eBay’s Worst Nightmare”; FORTUNE, Monday, May 12, 2003 

Watts Duncan (1999); “Small Worlds: The Dynamics of Networks between Order and Randomness”; Princeton University Press, Princeton, 1999).

 

 

Conclusion  fidis-wp2-del2.2.Cases_stories_and_Scenario_04.sxw  
69 / 69