نتایج جستجو برای: virtual identity

تعداد نتایج: 263724  

Journal: :Networking Knowledge: Journal of the MeCCSA Postgraduate Network 2007

2014
Matthias Wibral

Reputation systems aim to induce honest behavior in online trade by providing information about past conduct of users. Online reputation, however, is not directly connected to a person, but only to the virtual identity of that person. Users can therefore shed a negative reputation by creating a new account. We study the effects of such identity changes on the efficiency of reputation systems. W...

2002
C. M. Chewar D. Scott McCrickard John M. Carroll

Community networks are digital infrastructures designed to strengthen bonds and build social capital between members of a community, facilitating accomplishment of goals. As we consider how community network implementations can be improved, we recognize the potential that social translucence and activity notification introduces to other forms of CSCW. We investigate how the underlying notion of...

Journal: :Cyberpsychology, behavior and social networking 2013
Stefan Stieger Christoph Burger Manuel Bohn Martin Voracek

Social networking sites such as Facebook attract millions of users by offering highly interactive social communications. Recently, a counter movement of users has formed, deciding to leave social networks by quitting their accounts (i.e., virtual identity suicide). To investigate whether Facebook quitters (n=310) differ from Facebook users (n=321), we examined privacy concerns, Internet addicti...

Journal: :IJeC 2011
Babak Sohrabi Aryan Gholipour Behnam Amiri

This paper attempts to examine the effects of virtual team dimensions on social identities of its members. A review of the literature shows that the geographically dispersed, culturally diverse as well as temporary dimensions of virtual teams do not match with their stability as members have different ethnic, social, or cultural backgrounds. Sources like culture, place, and time seem to continu...

2007
Daniel E. Holcomb Wayne P. Burleson Kevin Fu

RFID applications create a need for low-cost security and privacy in potentially hostile environments. Our measurements show that initialization of SRAM produces a physical fingerprint. We propose a system of Fingerprint Extraction and Random Numbers in SRAM (FERNS) that harvests static identity and randomness from existing volatile CMOS storage. The identity results from manufacture-time physi...

2013
Prasenjit Kumar Patra Pranshu Saxena Rajwinder Singh Randy Butler Von Welch Douglas Engert Ian Foster Steven Tuecke John Volmer Carl Kesselman Gurmeet Singh Ewa Deelman Gaurang Mehta Karan Vahi Mei-Hui Su M. Li P. van Santen D. W. Walker O. F. Rana M. A. Baker Toyotaro Suzumura Hidemoto Nakada Satoshi Matsuoka Henri Casanova Ali Raza Butt Sumalatha Adabala Nirav H. Kapadia

Today, individuals and institutions in science, research organization and industry are increasingly forming virtual organizations to pool resources and tackle a common objective. Massive amount of information has been passed not only confined into particular country but also spread out across the globe. Participants in virtual organizations commonly need to share resources such as data archives...

2007
Raquel Benbunan-Fich Shoshana Altschuller

This research addresses the concept of electronic self-portrayal in synchronous computermediated communication of ad-hoc virtual teams. Electronic self-portrayal is the extent to which a communication system portrays the true identity of its users. It is hypothesized that increased information available due to self-portrayal will have an effect upon the trust and performance of ad-hoc virtual t...

2004
Mikko Juhani Pitkänen Marko Niinimäki John White Tapio Niemi

This paper presents a case study of using virtual organization technologies in database access. A virtual organization (VO) is a collection of people in the same administrative domain. A user can belong to many virtual organizations and have a different role (user, client, administrator,..) in each of them. An authorization of a user to different services within a VO is based on the user’s iden...

2012
Sara Jeza Alotaibi Mike Wald

The wide spread of services on the internet has aggravated the issue of maintaining multiple identities such as the virtual identities that are based on specific login credentials like username, passwords and PINs. On the other hand, multiple physical identities also prove to be difficult to maintain since different sources require the presence of different smart cards, mobile devices or other ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید