Bridging Space Over Time: Global Virtual Team Dynamics and Effectiveness
Organization Science
Virtual Collaboration Spaces: The EVE Community
SAINT '03 Proceedings of the 2003 Symposium on Applications and the Internet
Distributed and Parallel Databases
ACM SIGGROUP Bulletin - Special issue on online learning communities
A web service for CSCW applications
WebMedia '05 Proceedings of the 11th Brazilian Symposium on Multimedia and the web
Access control in collaborative commerce
Decision Support Systems
Secure resource sharing on cross-organization collaboration using a novel trust method
Robotics and Computer-Integrated Manufacturing
Games for virtual team building
Proceedings of the 7th ACM conference on Designing interactive systems
Digital workspace for optimal E-business strategies
DNCOCO'08 Proceedings of the 7th conference on Data networks, communications, computers
A Virtual Enterprise Oriented Access Control Mechanism
ISECS '09 Proceedings of the 2009 Second International Symposium on Electronic Commerce and Security - Volume 01
Propensity to connect with others, social networks and job satisfaction of nurses
ICCOM Proceedings of the 13th WSEAS international conference on Communications
Development of interactive software for teaching three-dimensional analytic geometry
DIWEB'09 Proceedings of the 9th WSEAS international conference on Distance learning and web engineering
ACE'10 Proceedings of the 9th WSEAS international conference on Applications of computer engineering
Collaborative virtual environments: from birth to standardization
IEEE Communications Magazine
Hi-index | 0.00 |
In interactive networked collaborative virtual environment (NCVE), users work in a group to be involved in interactive activities such as game, discussion and learning. However, without having a clearly defined roles and access control of the different level of users, interaction within a virtual environment will not be effectively carried out as these virtual interactions lack of many communication cues as users are physically invisible. Our research uses content analyses to explore various roles, played by users and access rights granted to each role, specifically in e-learning, project management and game. Therefore, we present seven classes of roles based on eight functional activities in a hierarchical and peer to peer virtual organization. A clear role and well defined job function could strictly outline users' access right to ensure smooth communication and secure protection as well as users privacy.