References
[1]. G. Ahn and H. Hu, (2007). “Towards Realizing a Formal
th RBAC Model in Real Systems,” Proceedings of 12 ACM
Symposiam on Access Control Models and Technologies,
pp.215-224.
[2]. G. Ahn, H.Hu, J. Lee, and Y. Meng, (2010).
“Representing and Reasoning about Web Access Control
th Policies,” Proceedings of IEEE 34 Annual Computer
Software and Applications Conference (COMPSAC), pp.
137-146.
[3]. A. Besmer and H.R. Lipford, (2010). “Moving beyond
Untagging: Photo Privacy in a Tagged World,”
th Proceedings of 28 International Conference on Human
Factors in Computing Systems, pp.1563-1572.
[4]. L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, (2009). “All
Your Contacts Are Belong to Us: Automated Identity theft
th Attacks on Social Networks,” Proceedings of 18
International Conference on World Wide Web, pp.551-
560.
[5]. B. Carminati and E. Ferrari, (2011). “Collaborative
Access Control in OnLine Social Networks,” Proceedings of
Seventh International Conference on Collaborative
Computing: Networking, Applications and Work sharing
(Collaborate-Com), pp.231-240.
[6]. B. Carminati, E. Ferrari, and A. Perego(2006). “Rule-
Based Access Control for Social Networks,” Proceedings of
International Conference on the Move to Meaningful
Internet Systems, pp. 1734-1744.
[7]. Richard D. Nordstrom, Richard L. Pinkerton (1999).
“Taking Advantage of Internet-Sources to Build a
Competitive intelligence system”, Competitive
Intelligence Review, Vol.10(1), pp.56-61.
[8]. A. Pirttila (1998). “Organizing Competitive intelligence
Activities in a Corporate Organization”, Aslib Proceedings.
Vol.50(4), pp.79-84.
[9]. P. L. Tom (1991). “Managing Information as a
Corporate Resource”, Harper Collins Publishers, Second
Edition.
[10]. J. I. Jr. Cash (1994). “Building the Information –age
Organization: Structure, Control, and Information Technologies”, Third Edition, Irwin Book Series in
Information Systems.
[11]. Chen H C, Chau M, Zeng D (2002). “CI spider: a tool
for Competitive Intelligence on the Web”, Decision
Support Systems, Vol.34(1), pp.1-17.
[12]. Powell J H, Bradford J P (2000). “Targeting
intelligence Gathering in a Dynamic Competitive
Environment”. International Journal of Information
Management, Vol. 20(3), pp.181-195.
[13]. Porter, A. L. and Cunningham, S. W. (2005). “Tech
Mining: Exploiting New Technologies for Competitive
Advantage”, Sixth Edition, Hoboken, N. J.Wiley.
[14]. Guo, W.D. Xin, Z.H. Wang, L.L. and Du, W.W. (2007).
“Establishment Research of Competitive Intelligence
nd System in Telecom Enterprises”, 2 International
Conference on Research and Practical Issues of Enterprise
Information Systems, Beijing, Peoples R China, pp.14-16.