How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project
暂无分享,去创建一个
Kai Rannenberg | Markus Tschersich | Christian Kahl | Stephan Heim | Katja Böttcher | Kai Rannenberg | Markus Tschersich | Christian Kahl | K. Böttcher | Stephan Heim
[1] Karen Holtzblatt,et al. Requirements gathering: the human factor , 1995, CACM.
[2] Carl Clavedetscher,et al. User involvement: key to success , 1998 .
[3] Katarina Stanoevska-Slabeva,et al. Overview of business models for Web 2.0 communities , 2006, GeNeMe.
[4] Marit Hansen,et al. Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..
[5] Patrick P. Tsang,et al. Social Circles: Tackling Privacy in Social Networks , 2008 .
[6] C. Clavadetscher. User involvement: key to success , 1998 .
[7] ChenPeter Pin-Shan. The entity-relationship modeltoward a unified view of data , 1976 .
[8] Laurian M. Chirica,et al. The entity-relationship model: toward a unified view of data , 1975, SIGF.
[9] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[10] James E. Rumbaugh,et al. Getting Started: Using Use Cases to Capture Requirements , 1994, J. Object Oriented Program..
[11] R. Arlinghaus,et al. Reconciling traditional inland fisheries management and sustainability in industrialized countries, with emphasis on Europe , 2002 .
[12] Starr Roxanne Hiltz,et al. Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.
[13] Ben Laurie,et al. Under)mining Privacy in Social Networks , 2008 .