Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- abstractApril 2014
The afterlife of digital identity
CHI EA '14: CHI '14 Extended Abstracts on Human Factors in Computing SystemsPages 343–346https://doi.org/10.1145/2559206.2559964The death of a user challenges many of the assumptions we hold for social network sites, social media, and digital identity architecture. Death provides a natural breaching experiment that violates core design assumptions about the relationship between ...
- extended-abstractFebruary 2013
The afterlife of identity
CSCW '13: Proceedings of the 2013 conference on Computer supported cooperative work companionPages 39–42https://doi.org/10.1145/2441955.2441967The death of a user challenges many of the assumptions we hold for social network sites, social media, and digital identity architecture. Death represents a natural breaching experiment that violates core design assumptions about the relationship ...
- research-articleMay 2012
Homeless young people on social network sites
CHI '12: Proceedings of the SIGCHI Conference on Human Factors in Computing SystemsPages 2825–2834https://doi.org/10.1145/2207676.2208686This paper reports on the use of social network sites (MySpace and Facebook) by homeless young people, an extraordinary user population, made so in part by its vulnerability. Twenty-three participants of diverse ethnicities, 11 women and 12 men (mean ...
- research-articleMarch 2011
"We will never forget you [online]": an empirical investigation of post-mortem myspace comments
CSCW '11: Proceedings of the ACM 2011 conference on Computer supported cooperative workPages 123–132https://doi.org/10.1145/1958824.1958843The proliferation of social network sites has resulted in an increasing number of profiles representing deceased users. In this paper, we present the results of a mixed-methods empirical study of 205,068 comments posted to 1,369 MySpace profiles of ...
- ArticleAugust 2010
Online Social Network Popularity Evolution: An Additive Mixture Model
ASONAM '10: Proceedings of the 2010 International Conference on Advances in Social Networks Analysis and MiningPages 346–350https://doi.org/10.1109/ASONAM.2010.48Nowadays, users of online platforms can manage their own visibility and therefore popularity by mixing self-publishing activities and social networking. If one can develop strategies for building a reputation, his success is not determined only by his ...
- research-articleJune 2008
Dynamic prediction of communication flow using social context
HT '08: Proceedings of the nineteenth ACM conference on Hypertext and hypermediaPages 49–54https://doi.org/10.1145/1379092.1379105In this paper, we develop a temporally evolving representation framework for context that can efficiently predict communication flow in social networks between a given pair of individuals. The problem is important because it facilitates determining ...
- research-articleJune 2008
Socialtrust: tamper-resilient trust establishment in online communities
JCDL '08: Proceedings of the 8th ACM/IEEE-CS joint conference on Digital librariesPages 104–114https://doi.org/10.1145/1378889.1378908Web 2.0 promises rich opportunities for information sharing, electronic commerce, and new modes of social interaction, all centered around the "social Web" of user-contributed content, social annotations, and person-to-person social connections. But the ...
- research-articleNovember 2007
Judging you by the company you keep: dating on social networking sites
GROUP '07: Proceedings of the 2007 ACM International Conference on Supporting Group WorkPages 371–378https://doi.org/10.1145/1316624.1316680This study examines dating strategies in Social Networking Sites (SNS) and the features that help participants achieve their dating goals. Qualitative data suggests the SNS feature, the friends list, plays a prominent role in finding potential dates, ...
- ArticleOctober 2007
Who's really in your top 8: network security in the age of social networking
SIGUCCS '07: Proceedings of the 35th annual ACM SIGUCCS fall conferencePages 131–134https://doi.org/10.1145/1294046.1294077Social engineering has been around for a long time, even at the college level. From the days when someone stood around a dormitory door waiting for someone else to open it, pretending to have forgotten his or her key, to today where virtually every ...