@inproceedings{ls_leimeister, address = {Aachen}, author = {Manouchehri, S. and Höfer, A. and Winand, U.}, booktitle = {Mobiles Computing in der Medizin}, editor = {Leimeister, J. M. and Mauro, C. and Krcmar, H. and Eymann, T. and Koop, A.}, interhash = {bbe86916dc410372e5be7386614b90d9}, intrahash = {ebff41ea298d1fdcd8475165fc4f6e57}, pages = {137-148}, publisher = {Shaker Verlag}, title = {Mobile Nutzung von Social Software im Gesundheitswesen}, year = 2007 } @article{ls_leimeister, author = {Kuhlenkamp, A. and Manouchehri, S. and Mergel, I. and Winand, U.}, booktitle = {Social Software. HMD Praxis der Wirtschaftsinformatik}, editor = {Hildebrand, K. and Hofmann, J.}, interhash = {15bf01e776647ec19ff15b4cebfb2f73}, intrahash = {a82cad5957425f4830736e25429c12b4}, number = 252, pages = {27-35}, publisher = {dpunkt.verlag}, title = {Privatsphäre versus Erreichbarkeit bei der Nutzung von Social Software}, year = 2006 } @article{ls_leimeister, author = {Bohl, O. and Manouchehri, S. and Winand, U.}, booktitle = {Web 2.0. HMD Praxis der Wirtschaftsinformatik}, editor = {Beck, A. and Mörike, M. and Sauerburger, H.}, interhash = {0d70488e7bc67f0cb8a103df7f24c567}, intrahash = {99588a33ba54652b24f5209a6545a1d7}, number = 255, pages = {27-36}, publisher = {dpunkt.verlag}, title = {Unternehmerische Wertschöpfung im Kontext des Web 2.0}, year = 2007 } @incollection{ls_leimeister, address = {Lohmar/Köln}, author = {Bohl, O. and Manouchehri, S.}, booktitle = {Wissen, Vernetzung, Virtualisierung}, editor = {von Kortzfleisch, H. F. O. and Bohl, O.}, interhash = {24ed1bf40227f81c94ef616a5b2c3600}, intrahash = {d10cf9e6524db11847357a1e6f7a6d61}, pages = {449-460}, publisher = {Eul Verlag}, title = {Vertrauensaspekte beim Einsatz von Social Software}, year = 2008 } @incollection{ls_leimeister, address = {Hershey, USA}, author = {Bohl, O. and Manouchehri, S.}, booktitle = {Handbook of Research on Social Interaction Technologies and Collaboration Software: Concepts and Trends}, editor = {Dumova, T. and Fiordo, R.}, interhash = {93a8b03597298d47a54a27ea41a40299}, intrahash = {6ca839edb44b3bbe8b13ee8a293e8bbf}, title = {Corporate added value in the context of Web 2.0}, year = 2009 } @incollection{ls_leimeister, address = {Berlin}, author = {v. Kortzfleisch, H. and Mergel, I. and Manouchehri, S. and Schaarschmidt, M.}, booktitle = {Web 2.0 Neue Perspektiven im E-Business, Web 2.0 Neue Perspektiven für Marketing und Medien }, editor = {Walsh, G. and Hass, B. and Kilian, T.}, interhash = {0fa1f1036693b1ccaaa480f87104dba0}, intrahash = {6c18c3982b802f6e2e5a919f95bb26a8}, note = {Web 2.0 Neue Perspektiven für Marketing und Medien }, pages = {73-90}, publisher = {Springer Verlag}, title = {Corporate Web 2.0 applications: Motives, organizational embeddedness and creativity}, year = 2007 } @incollection{ls_leimeister, address = {Hershey, USA}, author = {Manouchehri, S. and Winand, U.}, booktitle = {Handbook of Research on Web 2.0, 3.0 and X.0: Technologies, Business and Social Applications}, editor = {Murugesan, S.}, interhash = {dabde7f39f4266b7d5f7112821504f07}, intrahash = {a85e42dfe87362a7451386dfd8df97be}, publisher = {IGI Global}, title = {Health care 2.0: The use of Web 2.0 in health care}, year = 2009 } @inproceedings{ls_leimeister, address = {Vial Real, Portugal}, author = {Bohl, O. and Manouchehri, S. and Ammermueller, S. and Gerstheimer, O.}, booktitle = {Proceedings of the IADIS International Conference, WWW/Internet 2007}, editor = {Isaías, P. and Nunes, M. B. and Barroso, J.}, interhash = {fc6c239e1308e911790ed98ca325ad98}, intrahash = {9e48fb5a6d84bd6390576a4720e2a3de}, pages = {138-143}, title = {Migration of mobile social networks}, volume = 2, year = 2007 } @inproceedings{ls_leimeister, address = {Toronto}, author = {Bohl, O. and Manouchehri, S. and Ammermueller, S. and Gerstheimer, O.}, booktitle = {The Sixth International Conference on on the Management of Mobile Business. Proceedings of ICMB 2007, CD-Rom}, editor = {Archer, N. and Hassanein, K. and Yufei, Y.}, interhash = {55ea25f388ad1228ea8e0d8c0c6f489f}, intrahash = {57dfbbace34269f7c2277b13f7e6e7cd}, title = {Mobile social software - Potentials and limitations of enabling social networking}, year = 2007 } @inproceedings{krause2008logsonomy, abstract = {Social bookmarking systems constitute an established part of the Web 2.0. In such systems users describe bookmarks by keywords called tags. The structure behind these social systems, called folksonomies, can be viewed as a tripartite hypergraph of user, tag and resource nodes. This underlying network shows specific structural properties that explain its growth and the possibility of serendipitous exploration. Today’s search engines represent the gateway to retrieve information from the World Wide Web. Short queries typically consisting of two to three words describe a user’s information need. In response to the displayed results of the search engine, users click on the links of the result page as they expect the answer to be of relevance. This clickdata can be represented as a folksonomy in which queries are descriptions of clicked URLs. The resulting network structure, which we will term logsonomy is very similar to the one of folksonomies. In order to find out about its properties, we analyze the topological characteristics of the tripartite hypergraph of queries, users and bookmarks on a large snapshot of del.icio.us and on query logs of two large search engines. All of the three datasets show small world properties. The tagging behavior of users, which is explained by preferential attachment of the tags in social bookmark systems, is reflected in the distribution of single query words in search engines. We can conclude that the clicking behaviour of search engine users based on the displayed search results and the tagging behaviour of social bookmarking users is driven by similar dynamics.}, address = {New York, NY, USA}, author = {Krause, Beate and Jäschke, Robert and Hotho, Andreas and Stumme, Gerd}, booktitle = {HT '08: Proceedings of the Nineteenth ACM Conference on Hypertext and Hypermedia}, doi = {http://doi.acm.org/10.1145/1379092.1379123}, interhash = {6d34ea1823d95b9dbf37d4db4d125d2a}, intrahash = {e64d14f3207766f4afc65983fa759ffe}, isbn = {978-1-59593-985-2}, location = {Pittsburgh, PA, USA}, pages = {157--166}, publisher = {ACM}, title = {Logsonomy - Social Information Retrieval with Logdata}, url = {http://portal.acm.org/citation.cfm?id=1379092.1379123&coll=ACM&dl=ACM&type=series&idx=SERIES399&part=series&WantType=Journals&title=Proceedings%20of%20the%20nineteenth%20ACM%20conference%20on%20Hypertext%20and%20hypermedia}, vgwort = {17}, year = 2008 } @article{jaeschke2008tag, abstract = {Collaborative tagging systems allow users to assign keywords - so called "tags" - to resources. Tags are used for navigation, finding resources and serendipitous browsing and thus provide an immediate benefit for users. These systems usually include tag recommendation mechanisms easing the process of finding good tags for a resource, but also consolidating the tag vocabulary across users. In practice, however, only very basic recommendation strategies are applied. In this paper we evaluate and compare several recommendation algorithms on large-scale real life datasets: an adaptation of user-based collaborative filtering, a graph-based recommender built on top of the FolkRank algorithm, and simple methods based on counting tag occurences. We show that both FolkRank and Collaborative Filtering provide better results than non-personalized baseline methods. Moreover, since methods based on counting tag occurrences are computationally cheap, and thus usually preferable for real time scenarios, we discuss simple approaches for improving the performance of such methods. We show, how a simple recommender based on counting tags from users and resources can perform almost as good as the best recommender. }, address = {Amsterdam}, author = {Jäschke, Robert and Marinho, Leandro and Hotho, Andreas and Schmidt-Thieme, Lars and Stumme, Gerd}, doi = {10.3233/AIC-2008-0438}, editor = {Giunchiglia, Enrico}, interhash = {b2f1aba6829affc85d852ea93a8e39f7}, intrahash = {955bcf14f3272ba6eaf3dadbef6c0b10}, issn = {0921-7126}, journal = {AI Communications}, number = 4, pages = {231-247}, publisher = {IOS Press}, title = {Tag Recommendations in Social Bookmarking Systems}, url = {http://dx.doi.org/10.3233/AIC-2008-0438}, vgwort = {63}, volume = 21, year = 2008 } @inproceedings{ls_leimeister, address = {Zürich, Schweiz}, author = {Hartmann, M. and Prinz, A. and Hirdes, E. and Görlitz, R. and Rashid, A. and Weinhardt, C. and Leimeister, J. M.}, booktitle = {Wirtschaftsinformatik Konferenz (WI) 2011}, interhash = {eb6b86be78685402c244bc0eb06bcefc}, intrahash = {4ba839258e796c07068d6d25df3e7a47}, note = {210 (02-11)}, title = {Web 2.0 im Gesundheitswesen – Ein Literature Review zur Aufarbeitung aktueller Forschungsergebnisse zu Health 2.0 Anwendungen}, url = {http://www.uni-kassel.de/fb7/ibwl/leimeister/pub/JML_210.pdf}, volume = 10, year = 2011 } @article{springerlink:10.1007/s00287-010-0485-8, abstract = {Soziale Tagging-Systeme gehören zu den in den vergangenen Jahren entstandenen Web2.0-Systemen. Sie ermöglichen es Anwendern, beliebige Informationen in das Internet einzustellen und untereinander auszutauschen. Je nach Anbieter verlinken Nutzer Videos, Fotos oder Webseiten und beschreiben die eingestellten Medien mit entsprechenden Schlagwörtern (Tags). Die damit einhergehende freiwillige Preisgabe oftmals persönlicher Informationen wirft Fragen im Bereich der informationellen Selbstbestimmung auf. Dieses Grundrecht gewährleistet dem Einzelnen, grundsätzlich selbst über die Preisgabe und Verwendung seiner persönlichen Daten zu bestimmen. Für viele Funktionalitäten, wie beispielsweise Empfehlungsdienste oder die Bereitstellung einer API, ist eine solche Kontrolle allerdings schwierig zu gestalten. Oftmals existieren keine Richtlinien, inwieweit Dienstanbieter und weitere Dritte diese öffentlichen Daten (und weitere Daten, die bei der Nutzung des Systems anfallen) nutzen dürfen. Dieser Artikel diskutiert anhand eines konkreten Systems typische, für den Datenschutz relevante Funktionalitäten und gibt Handlungsanweisungen für eine datenschutzkonforme technische Gestaltung.}, address = {Berlin / Heidelberg}, affiliation = {Fachgebiet Wissensverarbeitung, Universität Kassel, Kassel, Deutschland}, author = {Krause, Beate and Lerch, Hana and Hotho, Andreas and Roßnagel, Alexander and Stumme, Gerd}, doi = {10.1007/s00287-010-0485-8}, interhash = {dc30e162dbb8700abdde78f86037cf2e}, intrahash = {69f3738deecd73594907183aa874ec1a}, issn = {0170-6012}, journal = {Informatik-Spektrum}, keyword = {Computer Science}, pages = {1-12}, publisher = {Springer}, title = {Datenschutz im Web 2.0 am Beispiel des sozialen Tagging-Systems BibSonomy}, url = {http://dx.doi.org/10.1007/s00287-010-0485-8}, year = 2010 } @article{hotho2010publikationsmanagement, abstract = {Kooperative Verschlagwortungs- bzw. Social-Bookmarking-Systeme wie Delicious, Mister Wong oder auch unser eigenes System BibSonomy erfreuen sich immer gr{\"o}{\ss}erer Beliebtheit und bilden einen zentralen Bestandteil des heutigen Web 2.0. In solchen Systemen erstellen Nutzer leichtgewichtige Begriffssysteme, sogenannte Folksonomies, die die Nutzerdaten strukturieren. Die einfache Bedienbarkeit, die Allgegenw{\"a}rtigkeit, die st{\"a}ndige Verf{\"u}gbarkeit, aber auch die M{\"o}glichkeit, Gleichgesinnte spontan in solchen Systemen zu entdecken oder sie schlicht als Informationsquelle zu nutzen, sind Gr{\"u}nde f{\"u}r ihren gegenw{\"a}rtigen Erfolg. Der Artikel f{\"u}hrt den Begriff Social Bookmarking ein und diskutiert zentrale Elemente (wie Browsing und Suche) am Beispiel von BibSonomy anhand typischer Arbeitsabl{\"a}ufe eines Wissenschaftlers. Wir beschreiben die Architektur von BibSonomy sowie Wege der Integration und Vernetzung von BibSonomy mit Content-Management-Systemen und Webauftritten. Der Artikel schlie{\ss}t mit Querbez{\"u}gen zu aktuellen Forschungsfragen im Bereich Social Bookmarking.}, author = {Hotho, Andreas and Benz, Dominik and Eisterlehner, Folke and J{\"a}schke, Robert and Krause, Beate and Schmitz, Christoph and Stumme, Gerd}, file = {dpunkt Product page:http\://hmd.dpunkt.de/271/05.html:URL}, interhash = {4555775b639fe1ec65a302a61ee6532c}, intrahash = {250d83c41fb10b89c73f54bd7040bd6e}, issn = {1436-3011}, journal = {HMD -- Praxis der Wirtschaftsinformatik}, month = {#feb#}, pages = {47-58}, title = {{Publikationsmanagement mit BibSonomy -- ein Social-Bookmarking-System f{\"u}r Wissenschaftler}}, volume = {Heft 271}, year = 2010 } @inproceedings{krause2008antisocialb, author = {Krause, Beate and Schmitz, Christoph and Hotho, Andreas and Stumme, Gerd}, booktitle = {Proc. of the Fourth International Workshop on Adversarial Information Retrieval on the Web}, interhash = {a45d40ac7776551301ad9dde5b25357f}, intrahash = {6357f535000a383f228f1e8e56ca86ca}, title = {The Anti-Social Tagger - Detecting Spam in Social Bookmarking Systems}, url = {http://airweb.cse.lehigh.edu/2008/submissions/krause_2008_anti_social_tagger.pdf}, year = 2008 }