Skip to main content

Social History of Computing and Online Social Communities

  • Reference work entry
  • First Online:
Book cover Encyclopedia of Social Network Analysis and Mining
  • 47 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 2,500.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Blei N, Jordan MI (2003) Latent Dirichlet allocation. J Mach Learn Res 3:993–1022 MATH

    MATH  Google Scholar 

  • Bylaws for Internet Corporation for Assigned Names and Numbers (ICANN) (2005). http://www.icann.org/general/bylaws.htm. Retrieved Apr 2013

  • Chew M, Balfanz D, Laurie B (2013) (Under)mining privacy in social networks, Google Inc. http://w2spconf.com/2008/papers/s3p2.pdf. Retrieved Apr 2013

  • Deerwester S, Dumais S, Landauer T, Furnas G, Harsh-man R (1990) Indexing by latent semantic analysis. J Am Soc Inf Sci 41(6):39–407

    Article  Google Scholar 

  • Evolving the High Performance Computing and Communications Initiative to Support the Nation’s Information Infrastructure—Executive Summary (2013). http://www.nap.edu/openbook.php?record_id=4948. Retrieved Apr 2013

  • Fox R (2000) News track: age and sex. Commun ACM 43(9):9

    Article  Google Scholar 

  • Hofmann T (1999) Probabilistic latent semantic indexing. In: Proceedings of the twenty-second annual international SIGIR conference, Berkeley

    Google Scholar 

  • Kizza JM (1999) Ethical and social issues in the information age. Springer, New York

    Google Scholar 

  • Kizza JM (2005) Computer network security. Springer, New York MATH

    MATH  Google Scholar 

  • Kizza JM (2013) Ethical and social issues in the information age, 5th edn. Springer, London

    Book  Google Scholar 

  • Klerks P (2001) The network paradigm applied to criminal organizations: theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections 24(3):53–65

    Google Scholar 

  • Koch M, Richter A, Schlosser A (2007) Services and applications for IT-supported social networking in companies. Wirtschaftsinformatik 6(49):448–455

    Article  Google Scholar 

  • Kramer RM (1999) Trust and distrust in organizations: emerging perspectives, enduring questions. Ann Rev Psychol 50:569–598

    Article  Google Scholar 

  • Krebs VE (2001) Mapping networks of terrorist of cells. Connections 24:43–52

    Google Scholar 

  • Sparrow MK (1991) The application of network analysis to criminal intelligence — an assessment of the prospects. Soc Netw 13:251–274

    Article  Google Scholar 

  • Walsh M (2013) Court backs student on Facebook page criticizing teacher, NewsWeek. http://blogs.edweek.org/edweek/school_law/2010/02/court_backs,student_on_faceboo.html. Retrieved Apr 2013

  • Web Surpasses One Billion Documents: Inktomi and NEC Research Institute Complete First Web Study (2000) Inktomi News & Events, Jan 2000

    Google Scholar 

  • Wresch W (1996) Disconnected: haves and have-nots in the information age, “Information Age Haves and Have-Nots.” Rutgers University Press. ISBN-10:0813523702

    Google Scholar 

  • Xu J, Chen H (2005) Analyzing and visualization. Com-mun ACM 48:100–107

    Article  Google Scholar 

  • Yang L, Liu F, Kizza JM, Ege RK (2009) Discovering latent topics from dark websites. In: IEEE symposium on computational intelligence in cyber security, IEEE Xplore, Nashville

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joseph M. Kizza .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Kizza, J.M., Yang, L. (2018). Social History of Computing and Online Social Communities. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-7131-2_94

Download citation

Publish with us

Policies and ethics