Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Blei N, Jordan MI (2003) Latent Dirichlet allocation. J Mach Learn Res 3:993–1022 MATH
Bylaws for Internet Corporation for Assigned Names and Numbers (ICANN) (2005). http://www.icann.org/general/bylaws.htm. Retrieved Apr 2013
Chew M, Balfanz D, Laurie B (2013) (Under)mining privacy in social networks, Google Inc. http://w2spconf.com/2008/papers/s3p2.pdf. Retrieved Apr 2013
Deerwester S, Dumais S, Landauer T, Furnas G, Harsh-man R (1990) Indexing by latent semantic analysis. J Am Soc Inf Sci 41(6):39–407
Evolving the High Performance Computing and Communications Initiative to Support the Nation’s Information Infrastructure—Executive Summary (2013). http://www.nap.edu/openbook.php?record_id=4948. Retrieved Apr 2013
Fox R (2000) News track: age and sex. Commun ACM 43(9):9
Hofmann T (1999) Probabilistic latent semantic indexing. In: Proceedings of the twenty-second annual international SIGIR conference, Berkeley
Kizza JM (1999) Ethical and social issues in the information age. Springer, New York
Kizza JM (2005) Computer network security. Springer, New York MATH
Kizza JM (2013) Ethical and social issues in the information age, 5th edn. Springer, London
Klerks P (2001) The network paradigm applied to criminal organizations: theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands. Connections 24(3):53–65
Koch M, Richter A, Schlosser A (2007) Services and applications for IT-supported social networking in companies. Wirtschaftsinformatik 6(49):448–455
Kramer RM (1999) Trust and distrust in organizations: emerging perspectives, enduring questions. Ann Rev Psychol 50:569–598
Krebs VE (2001) Mapping networks of terrorist of cells. Connections 24:43–52
Sparrow MK (1991) The application of network analysis to criminal intelligence — an assessment of the prospects. Soc Netw 13:251–274
Walsh M (2013) Court backs student on Facebook page criticizing teacher, NewsWeek. http://blogs.edweek.org/edweek/school_law/2010/02/court_backs,student_on_faceboo.html. Retrieved Apr 2013
Web Surpasses One Billion Documents: Inktomi and NEC Research Institute Complete First Web Study (2000) Inktomi News & Events, Jan 2000
Wresch W (1996) Disconnected: haves and have-nots in the information age, “Information Age Haves and Have-Nots.” Rutgers University Press. ISBN-10:0813523702
Xu J, Chen H (2005) Analyzing and visualization. Com-mun ACM 48:100–107
Yang L, Liu F, Kizza JM, Ege RK (2009) Discovering latent topics from dark websites. In: IEEE symposium on computational intelligence in cyber security, IEEE Xplore, Nashville
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media LLC, part of Springer Nature
About this entry
Cite this entry
Kizza, J.M., Yang, L. (2018). Social History of Computing and Online Social Communities. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-7131-2_94
Download citation
DOI: https://doi.org/10.1007/978-1-4939-7131-2_94
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-7130-5
Online ISBN: 978-1-4939-7131-2
eBook Packages: Computer ScienceReference Module Computer Science and Engineering