Categories
Tags
- 2011
- 2012
- ACM
- Business Applications
- Cloud Computing
- Collaborative filtering
- Collaborative Innovation Networks
- Collective intelligence
- Communication Networks
- Communication Networks
- Communities
- Community Detection
- Conference
- CSCL
- CSCW
- Data Mining
- eLearning
- Groups
- HCI
- IEEE
- Journal
- Knowledge Management
- Linked Data
- Mobile Social
- Modeling
- Network
- p2p
- Political Networks
- Privacy
- Risk Security in Social Contexts
- Security
- Semantic Web
- SNA
- Social Behavior Modeling
- Social Computing
- Social Computing Theories
- Social Media
- Social Network Analysis
- Social Networks
- Social semantic web
- Social System Design and Architectures
- Trust
- Web 2.0
- Web Mining
- Workshop
-
Recent Posts
- Abstract
- Call for Papers: Special Session on Evolution of Social Networks (ESN 2012)Call for Papers: Special Session on Evolution of Social Networks (ESN 2012)
- Call For Papers: Fourth International Conference on Computational Aspects of Social Networks (CASoN 2012)
- Call For Papers: International Workshop on Complex Networks and their Applications (Complex Networks 2012)
- Call For Papers: SIGSPATIAL International Workshop on Location-Based Social Networks (LBSN 2012)
Recent Comments
Archives
Daily Archives: July 4, 2011
Call For Papers: First International Workshop on Security and Privacy in Social Networks (SPSN 2011)Call For Papers: First International Workshop on Security and Privacy in Social Networks (SPSN 2011)
SPSN 2011: First Int. Workshop on Security and Privacy in Social Networks 2011 Link: http://spsn11.media.mit.edu/ In conjunction with IEEE Conference on Social Computing 9\10 October 2011, Boston, Massachusetts Overview As the area of online social networking develops and many online … Continue reading
Posted in Conferences
Tagged 2011, Collaborative detection, Collaborative Innovation Networks, Communication Networks, Identity theft, IEEE, Information leakage, Malware propagation, MIT, Network, Peer-to-peer, Privacy, Privacy management, Risk Security in Social Contexts, Security mechanisms, Social currency mechanisms, Social Networks, Trust
Leave a comment