Building Trusted Social Media Communities: A Research Roadmap for Promoting Credible Content
暂无分享,去创建一个
[1] Brandon Van Der Heide,et al. A social network as information: The effect of system generated reports of connectedness on credibility on Twitter , 2012, Comput. Hum. Behav..
[2] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[3] Charles J. Kacmar,et al. Factors and effects of information credibility , 2007, ICEC.
[4] Alan Mislove,et al. Iolaus: securing online content rating systems , 2013, WWW.
[5] Jonathan Lazar,et al. Understanding Web Credibility: A Synthesis of the Research Literature , 2007, Found. Trends Hum. Comput. Interact..
[6] C. Dwork,et al. Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment , 2008 .
[7] B. Shneiderman,et al. The Reader-to-Leader Framework: Motivating Technology-Mediated Social Participation , 2009 .
[8] Steve Harrison,et al. Time: a method of detecting the dynamic variances of trust , 2010, WICOW '10.
[9] Ben Shneiderman,et al. Motivation for Participation in Online Neighborhood Watch Communities: An Empirical Study Involving Invitation Letters , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[10] Jennifer Golbeck,et al. Analyzing the Social Web , 2013 .
[11] Sheizaf Rafaeli,et al. Predictors of answer quality in online Q&A sites , 2008, CHI.
[12] Aniket Kittur,et al. Can you ever trust a wiki?: impacting perceived trustworthiness in wikipedia , 2008, CSCW.
[13] Victoria L. Rubin. On deception and deception detection: Content analysis of computer-mediated stated beliefs , 2010, ASIST.
[14] Batya Friedman,et al. Trust online , 2000, CACM.
[15] Adam Jatowt,et al. Proceedings of the 4th workshop on Information credibility , 2010, WWW 2010.
[16] Baldwin Fd. In Web we trust , 2000 .
[17] Daniel Gooch,et al. Communications of the ACM , 2011, XRDS.
[18] Ben Shneiderman,et al. “In Web We Trust”: Establishing Strategic Trust Among Online Customers Irina Ceaparu, Dina Demner, Edward Hung, , 2016 .
[19] Jyh-Jeng Wu,et al. Factors affecting members' trust belief and behaviour intention in virtual communities , 2008, Behav. Inf. Technol..
[20] Jacob Ratkiewicz,et al. Truthy: mapping the spread of astroturf in microblog streams , 2010, WWW.
[21] B. J. Fogg,et al. Elements that affect web credibility: early results from a self-report study , 2000, CHI Extended Abstracts.
[22] Jeffrey Nichols,et al. Analyzing the quality of information solicited from targeted strangers on social media , 2013, CSCW '13.
[23] Jacob Ratkiewicz,et al. Detecting and Tracking Political Abuse in Social Media , 2011, ICWSM.
[24] B. J. Fogg,et al. The elements of computer credibility , 1999, CHI '99.
[25] Ben Shneiderman,et al. Designing trust into online experiences , 2000, CACM.
[26] Jacob Ratkiewicz,et al. Detecting and Tracking the Spread of Astroturf Memes in Microblog Streams , 2010, ArXiv.
[27] Jennifer Golbeck,et al. Computing with Social Trust , 2008, Human-Computer Interaction Series.
[28] Ben Shneiderman,et al. Analyzing Social Media Networks with NodeXL: Insights from a Connected World , 2010 .
[29] B. J. Fogg,et al. Persuasive technology: using computers to change what we think and do , 2002, UBIQ.
[30] C. Batson,et al. Four Motives for Community Involvement , 2002 .
[31] Venkatesan Guruswami,et al. CopyCatch: stopping group attacks by spotting lockstep behavior in social networks , 2013, WWW.
[32] Bongwon Suh,et al. So you know you're getting the best possible information: a tool that increases Wikipedia credibility , 2009, CHI.
[33] Michael Hicks,et al. Defeating script injection attacks with browser-enforced embedded policies , 2007, WWW '07.