[1]Song D H. Power struggles in Korean cyberspace and Korean cyber asylum seekers[J]. Cultural Policy, Criticism & Management Research,2011,1(1):47.
[2]Cho D. Real name verification law on the Internet:A poison or cure for privacy?[M]∥Economics of Information Security and Privacy III, New York:Springer, 2011:239261.
[3]Cho D, Kim S, Acquisti A. Empirical analysis of online anonymity and user behaviors:The impact of real name policy[C]∥Proc of the 45th Hawaii International Conference on System Science (HICSS), 2012:30413050.
[4]Oh Y, Obi T, Lee J S, et al. Empirical analysis of Internet identity misuse:Case study of South Korean real name system[C]∥Proc of the 6th ACM Workshop on Digital Identity Management, 2010:2734.
[5]Brainard J, Juels A, Rivest R L, et al. Fourthfactor authentication:Somebody you know[C]∥Proc of the 13th ACM Conference on Computer and Communications Security, 2006:168178.
[6]Schechter S, Egelman S, Reeder R W. It’s not what you know, but who you know[C]∥Proc of CHI’09,2009:1.
[7]Zhan J, Fang X. Authentication using multilevel social networks[M]∥Knowledge Discovery, Knowlege Engineering and Knowledge Management, Berlin:Springer, 2011:3549.
[8]Ellison N B. Social network sites:Definition, history, and scholarship[J]. Journal of ComputerMediated Communication, 2007,13(1):210230.
[9]Ellison N, Steinfield C, Lampe C. The benefits of facebook “friends”:Exploring the relationship between college students’ use of online social networks and social capital[J]. Journal of ComputerMediated Communication, 2007,12(4):11431168.
[10]Maheswaran M, Ali B, Ozguven H, et al. Online identities and social networking[M]∥Handbook of Social Network Technologies and Applications, New York:Springer,2010:241267.
[11]Clarke R.Human identification in information systems:Management challenges and public policy issues[J]. Information Technology & People, 1994,7(4):637. |