The Community for Technology Leaders
RSS Icon
Issue No.06 - June (2009 vol.42)
pp: 42-49
Amela Karahasanovic , SINTEF ICT and University of Oslo
Petter Bae Brandtzæg , SINTEF ICT and University of Oslo
Jeroen Vanattenhoven , Katholieke Universiteit Leuven
Bram Lievens , Vrije Universiteit Brussel
Karen Torben Nielsen , Vrije Universiteit Brussel
Jo Pierson , Vrije Universiteit Brussel
An analysis of three user studies of Web 2.0 applications reveals the most important requirements related to ethical issues. The development of features that support these requirements should be tailored to the type of application and specific community needs.
Internet/Web, Web 2.0, Ethics, Security & privacy, Software engineering, Social networking, Human-centered computing
Amela Karahasanovic, Petter Bae Brandtzæg, Jeroen Vanattenhoven, Bram Lievens, Karen Torben Nielsen, Jo Pierson, "Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications", Computer, vol.42, no. 6, pp. 42-49, June 2009, doi:10.1109/MC.2009.186
1. T. O'Reilly, "What Is Web 2.0: Design Patterns and Business Models for the Next Generation of Software,"30 Sept. 2005, O'Reilly Media; 2005/09/30what-is-web-20.html.
2. I. Paus-Hasebrink, C. Ortner, and C.W. Wijnen, "Safer Internet Issues Related to Web 2.0 Applications," presentation, 28 Nov. 2008, 2nd European Communication Conf., European Communication Research and Education Assoc. (ECREA); .
3. R.A. Baron and D. Byrne, Social Psychology: Understanding Human Interaction, 5th ed., Allyn and Bacon, 1987.
4. J. Palme, "Legal and Ethical Aspects of Computer-Mediated Communication," Arachnet Electronic J. Virtual Culture,30 June 1993; .
5. P.B. Brandtzæg and J. Heim, "User Loyalty and Online Communities: Why Members of Online Communities Are Not Faithful," Proc. 2nd Int'l Conf. Intelligent Technologies for Interactive Entertainment (Intetain 08), article no. 11, ICST, 2008.
6. J. Vanattenhoven, "Research Blog: Eliciting User Needs and Experiences," The NordiCHI 2008 Workshops: New Approaches to Requirements Elicitation &How Can HCI Improve Social Media Development?, Tapir, 2008, pp. 19-24.
7. B. Lievens et al., "Proxy Technology Assessment as a Multi-Method Approach for Identifying Social Requirements of Co-Creative Media," The NordiCHI 2008 Workshops: New Approaches to Requirements Elicitation &How Can HCI Improve Social Media Development?, Tapir, 2008, pp. 12-18.
8. B.H. Kaare et al., "In the Borderland between Family Orientation and Peer Culture: The Use of Communication Technologies among Norwegian Teens," New Media &Society, vol. 9, no. 4, 2007, pp. 603-624.
9. S.U. Kelly, C. Sung, and S. Farnham, "Designing for Improved Social Responsibility, User Participation, and Content in On-line Communities," Proc. SIGCHI Conf. Human Factors in Computing Systems: Changing Our World, Changing Ourselves (CHI 02), ACM Press, 2002, pp. 391-398.
10. J.T. Lehikoinen, J. Lehikoinen, and P. Huuskonen, "Understanding Privacy Regulation in Ubicomp Interactions," Personal Ubiquitous Computing, vol. 12, no. 8, 2008, pp. 543-553.
11. K. Strater and H. Richter, "Examining Privacy and Disclosure in a Social Networking Community," Proc. 3rd Symp. Usable Privacy and Security (Soups 07), ACM Press, 2007, pp. 157-158.
12. A. Abdul-Rahman and S. Hailes, "Supporting Trust in Virtual Communities," Proc. 23rd Hawaii Int'l Conf. System Sciences (HICSS 00), vol. 6, IEEE CS Press, 2000, p. 6007.
22 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool