Sciweavers

422 search results - page 19 / 85
» Privacy-enabling social networking over untrusted networks
Sort
View
ASUNAM
2009
IEEE
15 years 6 months ago
Transformation of Online Representation through Time
In order to understand the evolution of online identities, we measured the correlation between past and current representations of self on the MySpace social network. We applied s...
Roya Feizy, Ian Wakeman, Dan Chalmers
HICSS
2006
IEEE
121views Biometrics» more  HICSS 2006»
15 years 5 months ago
Enterprise Architecture: A Social Network Perspective
IS Architecture emerges as a result of a sequence of IS project implementations. The architecture that emerges can be viewed as a network of software components linked by their in...
David Dreyfus, Bala Iyer
CSCW
2004
ACM
15 years 5 months ago
Emergent networks, locus of control, and the pursuit of social capital
In this paper we examine the relationship between emergent social network characteristics in a computer-supported collaborative learning course and locus of control. An emergent c...
Michael Stefanone, Jeffrey T. Hancock, Geri Gay, A...
CEAS
2006
Springer
15 years 3 months ago
Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts
In this paper we detail the use of e-mail social network analysis for the detection of security policy violations on computer systems. We begin by formalizing basic policies that ...
Adam J. O'Donnell, Walter C. Mankowski, Jeff Abrah...
ASUNAM
2009
IEEE
15 years 4 months ago
Mining the Dynamics of Music Preferences from a Social Networking Site
In this paper we present an application of our incremental graph clustering algorithm (DENGRAPH) on a data set obtained from the music community site Last.fm. The aim of our study...
Nico Schlitter, Tanja Falkowski