Chapter 3: Mobile Personal Content Uncovered 77 International Society for Presence Research (2006) Online document, avail- able at http://www.temple.edu/ispr Karat C-M., Brodie C., and Karat J. (2006) Usable Privacy and Security for Personal Information Management. ACM Communications, January 2006, Volume 49, Number 1, pp. 56–57. ACM Press, New York, NY, USA. Kosch H. et al. (2005) The life cycle of multimedia metadata. IEEE Multimedia, Volume.12, Number 1, pp. 8 86, January–March 2005. Mori, R. (1990) Superdistribution: The Concept and the Architecture. The Transactions of the IEICE, Volume. 73, Number 7 (July l990), Special Issue on Cryptography and Information Security. O’Reilly T. (2005) What Is Web 2.0: Design Patterns and Business Models for the Next Generation of Software. Online document, available at http:// www.oreilly.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html Päivärinta, T. and Munkvold, B.E. (2005) Enterprise Content Management: An Integrated Perspective on Information Management. Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS ‘05), pp. 96–96 Roush W. (2006). Inside the Spyware Scandal. MIT Technology Review, May/ June 2006, pp. 49–57. Salminen I., Lehikoinen J., and Huuskonen P. (2005) Developing an Extensi- ble Mobile Metadata Ontology. Proceedings of the Ninth IASTED Interna- tional Conference on Software Engineering and Applications, pp. 266–272. ACTA Press. Scott B. (2005) A Contemporary History of Digital Journalism. Television & New Media, Volume 6, Number. 1, pp. 89–126, SAGE Publications
Personal Content Experience Page 100 Page 102