Networking Reference
In-Depth Information
65. R. Rosenzweig, Can history be open source? wikipedia and the future of the past. J. Am. Hist.
93 (1), 117-146 (2006)
66. S. Saavedraa, K. Hagerty, B. Uzzi,
Synchronicity, instant messaging, and performance
(PNAS) ,
pp. 1018462108v1-201018462 (2011)
67. E. Sillence, P. Briggs, P.R. Harris, L. Fishwick, How do patients evaluate and make use of
online health information? Soc. Sci. Med. 64 , 1853-1862 (2007)
68. O. Siobhan, F. Ferraro, Managing the boundary of an 'open' project, in IESE Research Papers
69. M. Srivastava, T. Abdelzaher, B.K. Szymanski, Human-centric sensing. Phil. Trans. R. Soc.
370 ser. A 1958 , 176-197 (2012)
70. K. Starbird, L. Palen, (how) will the revolution be retweeted?: information diffusion and the
2011 egyptian uprising, in Proceedings of the ACM 2012 conference on Computer Supported
Cooperative Work , Seattle, pp. 7-16 (2012)
71. K.J. Stewart, Trust transfer on the world wide web. Organiz. Sci. 14 (1), 5-17 (2003)
72. F.Y. Wang, D. Zeng, J.A. Hendler, Q. Zhang, Z. Feng, Y. Gao, H. Wang, G. Lai, A study of the
human flesh search engine: crowd-powered expansion of online knowledge.
IEEE Comput.
43 (8), 45-53 (2010)
73. Y. Wang, C.W. Hang, M.P. Singh A probabilistic approach for maintaining trust based on
evidence. J. Artif. Intell. Res 40 , 221-267 (2011)
74. J. Waxman, The Old 80/20 Rule Take One on the Jaw. Internet Trends Report 1999 REview
(Alexa Research, San Francisco, 2000)
75. R. West, The psychology of security. Commun. ACM 51 (4), 34-40 (2008)
76. L. Xiong, L. Liu, Building trust in decentralized peer-to-peer electronic communities, in Fifth
International Conference on Electronic Commerce Research (ICECR-5) Montreal, Canada
77. N. Yee, J.N. Bailenson, M. Urbanek, F. Chang, D. Merget, The unbearable likeness of
being digital: the persistence of nonverbal social norms in online virtual environments.
CyberPsychol. Behav. 10 (1), 115-121 (2007)
78. B. Yu, M. Singh, K. Sycara,
Developing trust in large-scale peer-to-peer systems,
First Symposium on Multi-Agent Security and Survivability , Drexel, pp. 1-10 (2004)
Search MirCeyron ::

Custom Search