Creepy but inevitable?: the evolution of social networking
暂无分享,去创建一个
[1] Kate Raynes-Goldie,et al. Aliases, Creeping, and Wall Cleaning: Understanding Privacy in the Age of Facebook , 2010, First Monday.
[2] Cliff Lampe,et al. Negotiating Privacy Concerns and Social Capital Needs in a Social Media Environment , 2011, Privacy Online.
[3] Lindsay T. Graham,et al. A Review of Facebook Research in the Social Sciences , 2012, Perspectives on psychological science : a journal of the Association for Psychological Science.
[4] Eszter Hargittai,et al. Whose Space? Differences Among Users and Non-Users of Social Network Sites , 2007, J. Comput. Mediat. Commun..
[5] D. Boyd. Taken Out of Context: American Teen Sociality in Networked Publics , 2010 .
[6] Rosta Farzan,et al. Results from deploying a participation incentive mechanism within the enterprise , 2008, CHI.
[7] Mor Naaman,et al. Is it really about me?: message content in social awareness streams , 2010, CSCW '10.
[8] Jill Palzkill Woelfer,et al. Homeless young people on social network sites , 2012, CHI.
[9] Joshua Fogel,et al. Internet social network communities: Risk taking, trust, and privacy concerns , 2009, Comput. Hum. Behav..
[10] Anna Wu,et al. Detecting professional versus personal closeness using an enterprise social network site , 2010, CHI.
[11] David R. Millen,et al. Learning by seeing: photo viewing in the workplace , 2009, CHI.
[12] Yang Wang,et al. Privacy in Online Social Networking at Workplace , 2009, 2009 International Conference on Computational Science and Engineering.
[13] Zeynep Tufekci,et al. Facebook, Youth and Privacy in Networked Publics , 2012, ICWSM.
[14] K. Seers. Qualitative data analysis , 2011, Evidence Based Nursing.
[15] Cliff Lampe,et al. Perceptions of facebook's value as an information source , 2012, CHI.
[16] Michael J. Muller,et al. Use and reuse of shared lists as a social content type , 2008, CHI.
[17] David R. Millen,et al. Identity management: multiple presentations of self in facebook , 2007, GROUP.
[18] B. Hogan. The Presentation of Self in the Age of Social Media: Distinguishing Performances and Exhibitions Online , 2010 .
[19] Cliff Lampe,et al. A face(book) in the crowd: social Searching vs. social browsing , 2006, CSCW '06.
[20] Robert E. Kraut,et al. Using facebook after losing a job: differential benefits of strong and weak ties , 2013, CSCW.
[21] Pernilla Qvarfordt,et al. Exploring the workplace communication ecology , 2010, CHI.
[22] Mary Beth Rosson,et al. How and why people Twitter: the role that micro-blogging plays in informal communication at work , 2009, GROUP.
[23] Ban Al-Ani,et al. Bridging between organizations and the public: volunteer coordinators' uneasy relationship with social computing , 2012, CHI.
[24] Jonathan Grudin,et al. A longitudinal study of Facebook, LinkedIn, & Twitter use , 2012, CHI.
[25] Cliff Lampe,et al. Bowling online: social networking and social capital within the organization , 2009, C&T.
[26] Werner Geyer,et al. People Sensemaking and Relationship Building on an Enterprise Social Network Site , 2009, 2009 42nd Hawaii International Conference on System Sciences.
[27] A. Brenner. Twitter Use 2012 , 2012 .
[28] Elizabeth F. Churchill,et al. Faceted identity, faceted lives: social and technical issues with being yourself online , 2011, CSCW.
[29] Tad Hogg,et al. Effects of feedback and peer pressure on contributions to enterprise social media , 2009, GROUP.
[30] Jonathan Grudin,et al. When social networks cross boundaries: a case study of workplace use of facebook and linkedin , 2009, GROUP.
[31] Deirdre K. Mulligan,et al. Stopping spyware at the gate: a user study of privacy, notice and spyware , 2005, SOUPS '05.
[32] Alfred Kobsa,et al. Don't Disturb My Circles! Boundary Preservation Is at the Center of Location-Sharing Concerns , 2012, ICWSM.
[33] Yang Wang,et al. "I regretted the minute I pressed share": a qualitative study of regrets on Facebook , 2011, SOUPS.
[34] P. Leonardi,et al. Social Media Use in Organizations: Exploring the Affordances of Visibility, Editability, Persistence, and Association , 2013 .
[35] Ed H. Chi,et al. Talking in circles: selective sharing in google+ , 2012, CHI.
[36] Jun Zhang,et al. A case study of micro-blogging in the enterprise: use, value, and related issues , 2010, CHI.
[37] Robert E. Kraut,et al. Social capital on facebook: differentiating uses and users , 2011, CHI.
[38] Mikhil Masli,et al. An open, social microcalender for the enterprise: timely? , 2011, CHI.
[39] Frederic Stutzman,et al. Boundary regulation in social media , 2012, CSCW.
[40] Jonathan Grudin,et al. Crossing Boundaries: A Case Study of Employee Blogging , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[41] Michael J. Muller,et al. Motivations for social networking at work , 2008, CSCW.
[42] J. DiMicco,et al. People Sensemaking and Relationship Building on an Enterprise Social Network Site , 2009 .
[43] David R. Millen,et al. Stuff IBMers Say: Microblogs as an Expression of Organizational Culture , 2012, ICWSM.
[44] Cliff Lampe,et al. Changes in use and perception of facebook , 2008, CSCW.
[45] Kate Ehrlich,et al. Microblogging Inside and Outside the Workplace , 2010, ICWSM.
[46] B MilesMatthew,et al. Qualitative Data Analysis , 2009, Approaches and Processes of Social Science Research.
[47] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[48] Ian Sommerville,et al. The Management and Use of Social Network Sites in a Government Department , 2011, Computer Supported Cooperative Work (CSCW).