Property | Value |
dcterms:bibliographicCitation
|
<http://dblp.uni-trier.de/rec/bibtex/journals/computer/KarahasanovicBVLNP09>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Amela_Karahasanovic>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Bram_Lievens>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Jeroen_Vanattenhoven>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Jo_Pierson>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Karen_Torben_Nielsen>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Petter_Bae_Brandtz%E2%88%9A%C2%B6g>
|
foaf:homepage
|
<http://dx.doi.org/doi.org%2F10.1109%2FMC.2009.186>
|
foaf:homepage
|
<https://doi.org/10.1109/MC.2009.186>
|
dc:identifier
|
DBLP journals/computer/KarahasanovicBVLNP09
(xsd:string)
|
dc:identifier
|
DOI doi.org%2F10.1109%2FMC.2009.186
(xsd:string)
|
dcterms:issued
|
2009
(xsd:gYear)
|
swrc:journal
|
<https://dblp.l3s.de/d2r/resource/journals/computer>
|
rdfs:label
|
Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications.
(xsd:string)
|
foaf:maker
|
<https://dblp.l3s.de/d2r/resource/authors/Amela_Karahasanovic>
|
foaf:maker
|
<https://dblp.l3s.de/d2r/resource/authors/Bram_Lievens>
|
foaf:maker
|
<https://dblp.l3s.de/d2r/resource/authors/Jeroen_Vanattenhoven>
|
foaf:maker
|
<https://dblp.l3s.de/d2r/resource/authors/Jo_Pierson>
|
foaf:maker
|
<https://dblp.l3s.de/d2r/resource/authors/Karen_Torben_Nielsen>
|
foaf:maker
|
<https://dblp.l3s.de/d2r/resource/authors/Petter_Bae_Brandtz%E2%88%9A%C2%B6g>
|
swrc:number
|
6
(xsd:string)
|
swrc:pages
|
42-49
(xsd:string)
|
owl:sameAs
|
<http://bibsonomy.org/uri/bibtexkey/journals/computer/KarahasanovicBVLNP09/dblp>
|
owl:sameAs
|
<http://dblp.rkbexplorer.com/id/journals/computer/KarahasanovicBVLNP09>
|
rdfs:seeAlso
|
<http://dblp.uni-trier.de/db/journals/computer/computer42.html#KarahasanovicBVLNP09>
|
rdfs:seeAlso
|
<https://doi.org/10.1109/MC.2009.186>
|
dc:subject
|
Internet/Web, Web 2.0, Ethics, Security & privacy, Software engineering, Social networking, Human-centered computing
(xsd:string)
|
dc:title
|
Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications.
(xsd:string)
|
dc:type
|
<http://purl.org/dc/dcmitype/Text>
|
rdf:type
|
swrc:Article
|
rdf:type
|
foaf:Document
|
swrc:volume
|
42
(xsd:string)
|