<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>CEUR-WS.org</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Social Tagging Systems - Shall we use the collaborative and collec- tive approach to gather competency related information?</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Petra I. Thielen, Saarland University</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2010</year>
      </pub-date>
      <volume>570</volume>
      <fpage>20</fpage>
      <lpage>21</lpage>
      <abstract>
        <p>Social Tagging as a decentralized collaborative and collective approach to describe, structure, and share digital objects with user created</p>
      </abstract>
      <kwd-group>
        <kwd>competency acquisition</kwd>
        <kwd>conceptual framework</kwd>
        <kwd>reliability</kwd>
        <kwd>validity</kwd>
        <kwd>classical testing theory</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        The popularity of Social Tagging has rapidly increased since 2004 [
        <xref ref-type="bibr" rid="ref50 ref60">52, 62</xref>
        ]. Social
Tagging is mostly known from private application context. Once evolved from Social
Bookmarking Service (delicious)4, social tagging systems have become one of the
bestknown web-based [
        <xref ref-type="bibr" rid="ref40">42</xref>
        ] social software applications. One reason for its ongoing
      </p>
      <sec id="sec-1-1">
        <title>4 http:// delicious.com</title>
        <p>
          popularity is their simplicity and ease of use: Everybody can be a tagger, who interacts
collaboratively, or collectively with other taggers in a web-based community for the
purpose to administer, describe, share, structure and maintain several kinds of digital
objects, e.g. pictures (Flickr5), videos (YouTube6) or WebPages (delicious) using
selfcreated keywords called tags [
          <xref ref-type="bibr" rid="ref40">42</xref>
          ]. Taggers do not have to obey any rules or a bound to
a controlled vocabulary; so, social tagging systems are anarchic decentralized social
indexing systems as well.
        </p>
        <p>
          Apart from private usage social tagging has also been applied for corporate purposes,
e.g. to support and facilitate customers‟ navigation, e.g. product search (Amazon7) by
means of product-related tags created by the customers themselves. Meanwhile, it is
also possible to use social tagging systems to describe and augment personal profiles
using tags. This special form of social tagging is also meant as people-tagging [
          <xref ref-type="bibr" rid="ref13 ref15 ref16">13, 15,
16</xref>
          ]. So far, it has been used for both private and corporate communities e.g.
organizations to gather, acquire and retrieve characterizing tags [
          <xref ref-type="bibr" rid="ref16 ref44">16, 46</xref>
          ].
Moreover, social tagging systems have also become relevant for e-HRM tasks. So far
there already exist few approaches which mainly focus on augmenting employees‟
profiles with characterizing tags [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] contributed by the employees themselves. First
promising results have already shown that social tagging systems are useful to facilitate
the corporate search for knowledge management, to discover employees‟ connections
and support the expert finding, e.g. IBM Lotus connections8 [
          <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
          ]. Another approach
combines people-tagging and ontology maturing to support competence management
mainly focused on augmenting competency models with tags [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>However, the applicability of social tagging for competence management still seems not
to be exhausted. Social Tagging systems might also be a promising method to support
competency acquisition, which belongs to the main functions of competency
management as well. It pursues the purpose to provide reliable and valid personal
related information, gathered by means of measuring, observing and describing
methods. Having both kind of information it gets possible to align required job-related
target-competencies with actual competences. Alignment results are for instance needed
in human resource management to schedule and control e-HRM tasks, such as strategy,
planning, acquisition, requirement, deployment and development.</p>
        <p>
          Although previous researches confirmed social tagging systems enable the provision of
characterizing tags; there is need of further research to detect systematically appropriate
variants of social tagging systems to support competency acquisition. Further it still
lacks evidence if they are also able to ensure the provisioning of reliable and valid
information [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. Hence, we focus on design characteristics and quality of those systems
from the classical testing theories‟ point of view. In short, the following questions are
answered:
        </p>
        <p>Q1: Which possibilities do social tagging systems offer to gather competency
related information?</p>
      </sec>
      <sec id="sec-1-2">
        <title>5 http://www.flickr.com/</title>
      </sec>
      <sec id="sec-1-3">
        <title>6 http://www.youtube.com/</title>
        <p>7 http://www.amazon.com/gp/tagging/cloud?redirect=true</p>
      </sec>
      <sec id="sec-1-4">
        <title>8 http://www-01.ibm.com/software/de/lotus/wdocs/connection/</title>
        <sec id="sec-1-4-1">
          <title>Q2: Do they ensure the provision of reliable and valid information?</title>
          <p>To answer the first question Chapter 2 regards several variants of social tagging systems
from an external view and to filter appropriate ones. In a second step the internal view
focuses on the dimensions social tagging systems consists of, and presents a conceptual
framework to detect possible design characteristics to gather competency-related
information.</p>
          <p>To answer the second question Chapter 3 introduces the quality criteria of the classical
testing theory, on which in Chapter 4 the social tagging systems are analyzed if they are
able to ensure reliable and valid data information. Difficulties and benefits social
tagging systems offer are discussed. Chapter 5 summarizes the results and gives an
outlook on future research.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Conceptual Framework</title>
      <p>
        Social tagging systems (social classification systems [
        <xref ref-type="bibr" rid="ref55">57</xref>
        ], collaborative tagging systems
[
        <xref ref-type="bibr" rid="ref60">62</xref>
        ]) is a collective term that comprises different system variants. It is at present still
unclear if every social tagging system version is appropriate to support competency
acquisition. Hence, we give a short overview on existing system versions detecting
appropriate social tagging system variants.
1.1
      </p>
      <p>
        Social tagging systems – System variants (External view)
Social Tagging Systems allow a categorization from different perspectives. Firstly, the
stability distinct between closed and open systems. In open systems the taggers
fluctuation is very high, because the taggers are not bound to the system (delicious);
whereas in closed systems the same taggers stay for a longer time and the tagger group
remains stable (IBM lotus connections) [
        <xref ref-type="bibr" rid="ref10 ref13">10, 13</xref>
        ]. Secondly, the taggers‟ transparency
within the system separates transparent systems from anonymously ones. In the former
taggers use their real names, whereas in the latter taggers act anonymously and hide
their identity using “nicknames”. Thirdly, social tagging systems, based on their entry
barriers, can be split in systems with minor entry barriers [
        <xref ref-type="bibr" rid="ref41">43</xref>
        ] and systems with major
entry barriers. Fourthly, their purpose separates privately used from corporate ones.
System variants
Open Systems are wide spread mainly in private usage. Everybody can become a
member of such an open community, because taggers just have to sign in with their
email address, first name and last name. It is the taggers decision to use real names or
fictive ones, so transparency cannot be ensured. They are not bound to the system;
hence, fluctuation level is high. Further, there also exist open social tagging systems
which are used for corporate purpose, e.g. Amazon. The entry barrier is higher than the
first variant, because only customers are allowed to tag, who are transparent for the
company, because of their customer profile. Closed social tagging systems can be found
in both private and corporate application [
        <xref ref-type="bibr" rid="ref56">58</xref>
        ]. In private application context Collabio
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] has to be mentioned a “Facebook”9 application which allows persons to be
characterized by other persons with the help of tags in a playful way. Entry barrier is the
profile owner decides who is allowed to tag e.g. friends or colleagues. Taggers are
consequently transparent to the profile owner and other taggers. Those taggers are
bound to the system for reasons of social reputation, consequently their fluctuation is
low.
      </p>
      <p>For the context of competence acquisition which takes places in a corporate
environment a closed social tagging system is required. The opportunity to tag is
restricted to a special tagger group, the organizational members. Taggers interact
transparently within the system, and can be identified by their personal ID and real
names as well. The entrance to those systems is bound to the employment contract that
limit and regulate the period tagger belongs to the systems and how long they obtain a
special role and job. Normally, there is low fluctuation within a closed organization.
Hence, a corporate purpose is given, so we narrow the variety of all social tagging
systems for this paper to closed ones that provide a high transparency of the tagger, low
fluctuation and the corporate purpose as well. In the next step we focus on the elements
social tagging systems consist of from an internal view.</p>
      <sec id="sec-2-1">
        <title>9 http://apps.facebook.com/collabio/</title>
        <p>1.2</p>
        <p>
          Social Tagging Systems – Dimensions (Internal view)
Previous external view has narrowed the number of several social tagging systems to
special closed ones with special attributes. Now, we have also to narrow the number of
tagger, digital objects and tags, which are required for competency acquisition.
Social Tagging Systems consist of three related dimensions: tagger, digital objects and
tags [
          <xref ref-type="bibr" rid="ref40 ref9">9, 42</xref>
          ]. Taggers are the persons who interact within the closed community. They
obtain several roles at the same time, e.g. they are producer and consumer of their tags
[
          <xref ref-type="bibr" rid="ref53">55</xref>
          ]. Digital objects are the resources to tag, and tags are used to describe, augment and
structure several kinds of them; thereby the same tag can be added to one or many
objects.
        </p>
        <p>
          In context of competency acquisition the variety of those dimensions is restricted.
Taggers get additional attributes; they are organizational members, employees,
superiors, subordinates and work mates as well. Further, not every digital object is
needed to be tagged. We just focus on competency profiles [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. Finally, we regard only
competency related information as special content [
          <xref ref-type="bibr" rid="ref61">63</xref>
          ] so the tags are also narrowed to
those which contain and competency-related information. However, this seems not to be
enough to acquire all facets competency acquisition is composed of. Further filtering
views on the limited closed social tagging systems and its dimensions seems be
sufficient to define them more detailed. So each single element is regarded in the
following from several sub dimensions that originate from competency acquisition.
In detail, the profile dimension focuses on appropriate profile types and several
characteristics of transparency [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. The tagger dimension focuses on taggers rights
with the closed system, hierarchical level, and taggers‟ perspectives. Further the number
of taggers, their incentive to contribute, their independence and visibility is regarded.
Finally, the tag dimension has a focus on suggested tags, permitted tag-types, number of
equal and different tags for single taggers, the acquisition of a temporal dimension,
weighted tags, scope of tags, granularity of tags, tag structuring and font size. All
dimensions, sub dimensions and combinable characteristics are composed in the figure
below and presented in detail in subsequent paragraphs.
        </p>
        <p>Conceptual Framework - Internal View
Dimensions Subdimensions
Profiles
Tagger
Tags</p>
        <p>Type
Transparency
Rights
Hierarchcal level
Perspective
Number
Incentive
Independence
Visibility
Sugesstions</p>
        <p>Characteristics
Individual
Transparent</p>
        <p>Use
Create
Equal
Self
Single
Voluntary
Given
Transparent
Given</p>
        <p>Delete
Job
Non Transparent
Change
Unequal
Others
Multiple
Compulsory
Not Given
Anonymous
Not Given
Tag Types
Use of the same Tag
Number
of
different</p>
        <p>Unlimited
Taegmsporal dimension
Weight
Scope
Granularity
Structure
Fontsize</p>
        <p>Unrestricted
Single
Given
Given
Professional
Predefined
Given
Equal</p>
        <p>
          Restricted
Actual competency profiles reflect individuals‟ (e.g. employees‟) competency stock,
whereas target competency profiles point out required job related competencies [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. A
comparison of both helps to detect competency gaps [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. Based on this information,
measures of personnel requirement planning, recruiting or training can be adopted.
Consequently, the alignment of actual and target competencies represents a main
function of competency acquisition. Hence, social tagging systems might support both
competency profiles, individuals „and job related ones.
        </p>
        <sec id="sec-2-1-1">
          <title>Transparency (Transparent, Non-Transparent)</title>
          <p>
            Individuals „competence is sensitive personal-related information; therefore, a selected
group of experts has to acquire and assess individuals‟ competence. A transparency of
individuals‟ competency profiles, contributed tags and tag creators for all tagger seems
to be debatable against the background of data protection. Some people-tagging systems
[
            <xref ref-type="bibr" rid="ref13 ref15">13, 15</xref>
            ] just allow a transparent view on individuals profiles [
            <xref ref-type="bibr" rid="ref40">42</xref>
            ], provided that the
profile owner and participating tagger agree with that. However, research results show
taggers tend to a non-transparent, private solution [
            <xref ref-type="bibr" rid="ref47">49</xref>
            ] when it refers to the tags
attached to their profile. Thereby it is for the tagger to decide on who and how many
taggers are allowed to have a look on their profile.
1.2.2
          </p>
          <p>Tagger</p>
        </sec>
        <sec id="sec-2-1-2">
          <title>Rights (Create, Use, Change, Delete)</title>
          <p>
            Taggers obtain several rights and roles in social tagging systems [
            <xref ref-type="bibr" rid="ref60">62</xref>
            ]. Taggers are
consequently entitled to create and use tags for profile description. Due to the context of
competency acquisition and in particular the augmentation of individuals‟ profiles
taggers have to obtain additional rights, e.g. changing or deleting tags, if they are
inappropriate or false [
            <xref ref-type="bibr" rid="ref13 ref47">13, 49</xref>
            ]. These rights might also be helpful to eliminate obsolete
tags keeping the profiles up to date.
          </p>
        </sec>
        <sec id="sec-2-1-3">
          <title>Hierarchical level (Equal, Unequal)</title>
          <p>
            A specialty of social tagging systems is that all taggers are treated equally; everybody
can tag and there are no hierarchical differences [
            <xref ref-type="bibr" rid="ref51">53</xref>
            ]. However, for the purpose of
competency acquisition taggers action is embedded into a closed organizational system,
where taggers from several hierarchical levels interact. Every hierarchical level also
reflects a special power of decision and expertise [
            <xref ref-type="bibr" rid="ref34">35</xref>
            ], e.g. not every organizational
member is currently allowed to assess and ascertain competencies. Mutually tagging
already exists in social tagging systems; however mutual assessing within an
organization is possible but not common [
            <xref ref-type="bibr" rid="ref38">39</xref>
            ]. Hence, social tagging allows mutual
tagging over several hierarchy levels where all taggers are considered unequal or
without the hierarchical restriction, where all taggers are considered equal.
          </p>
        </sec>
        <sec id="sec-2-1-4">
          <title>Perspective (Self, Other)</title>
          <p>
            Self-description and assessment by others represent two well-known aptitude testing
methods [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ], which are often used for competency acquisition and assessment. Social
Tagging also offers taggers the opportunity to describe their own profiles (both
jobrelated and personal-related) as well as foreign ones [
            <xref ref-type="bibr" rid="ref15">15</xref>
            ]. Social Tagging seems to be
particularly suitable and accepted by taggers in purpose of self-assessment and
selfreference as previous research results show [
            <xref ref-type="bibr" rid="ref14 ref20 ref21 ref40 ref44 ref62">14, 21, 22, 42, 46, 64</xref>
            ]. For the reason that
taggers can have both points of view social tagging systems offer both perspectives:
tagging themselves or others [
            <xref ref-type="bibr" rid="ref3">3</xref>
            ].
          </p>
        </sec>
        <sec id="sec-2-1-5">
          <title>Number (Single, Multiple)</title>
          <p>
            There are several methods to acquire competencies. One of them is the single-appraisal
such as a self-description or the single appraisal by the supervisor [
            <xref ref-type="bibr" rid="ref36 ref38">37, 39</xref>
            ]. A
comparison of both represents a common method to gather competency-related
information. Apart from those methods there are further methods that include the
appraisal of multiple raters, which differ from each other by their perspectives [
            <xref ref-type="bibr" rid="ref38">39</xref>
            ].
Social Tagging Systems also allows a single tagger to describe profiles and a
description of the same profile by a group of tagger from several perspectives as well
[
            <xref ref-type="bibr" rid="ref59">61</xref>
            ]. So the number of tagger can vary between one (single -assessment) and many
(multiple appraisal).
          </p>
        </sec>
        <sec id="sec-2-1-6">
          <title>Incentives (Voluntary, Compulsory)</title>
          <p>
            Social Tagging Systems base on the principle of voluntary participation of taggers. This
principle has led to a high acceptance [
            <xref ref-type="bibr" rid="ref41">43</xref>
            ]. But Social Tagging System can only then be
effective when a minimum of tags and profiles is given. More important become the
taggers‟ incentives. So, the question is if the competence acquisition should be carried
out through social tagging systems on a volunteer or compulsory base. Research
findings show that taggers can be split by their motivation [
            <xref ref-type="bibr" rid="ref13 ref40 ref54">13, 42, 56</xref>
            ]. So, for instance,
some of them tag for their own sake or for the sake the others [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ]. Some tag for reasons
of self-presentation [
            <xref ref-type="bibr" rid="ref40 ref62">42, 64</xref>
            ] or just to store tags [
            <xref ref-type="bibr" rid="ref15 ref48 ref49">15, 50, 51</xref>
            ]. Further motivation has also
been detected in the users need to be a part of a community. However, compulsory
incentives have also been detected [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ], e.g. Social pressure can also be a reason why
taggers tag to get not excluded from the community [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ]. So, voluntary and compulsory
incentives can be distinguished. Both are relevant for competency assessment, because
in closed social tagging systems with corporate purposes a contribution of tags serves
predominantly corporate and non-private purposes, for which voluntary contribution or
commitment cannot be ensured [
            <xref ref-type="bibr" rid="ref32">33</xref>
            ].
          </p>
        </sec>
        <sec id="sec-2-1-7">
          <title>Independence (Given, Not Given)</title>
          <p>
            Social tagging is based on the principle of collaborative object description and taggers
interexchange. While the description of a profile just by one single tagger might be time
consuming and incomplete, social tagging systems use taggers collaborative
participation to get multiple perspectives and a broad description. However, taggers in
most cases do not acts independent from each other. It is more like a transparence and
mutual influence between them [
            <xref ref-type="bibr" rid="ref48">50</xref>
            ]. They swap tags as ideas through a transparent
visualization in order to collect multiple descriptions, synonyms or alternative
descriptions.
          </p>
          <p>
            Those can be improved if taggers are influenced by tags from others, and an internal
vocabulary evolves and gets more stable over time [
            <xref ref-type="bibr" rid="ref35">36</xref>
            ]. However, there are few
approaches in which taggers act independent from each other in order to filter the best
describing tags for a digital object [
            <xref ref-type="bibr" rid="ref59">61</xref>
            ]. So, one can decide for dependence or
independence over the taggers, but due to the requirements of data protection
independence over the taggers shall be recommended.
          </p>
        </sec>
        <sec id="sec-2-1-8">
          <title>Visibility (Transparent, Anonym)</title>
          <p>
            Once a tag has been added to an object, its source cannot be traced anymore. In most
cases the tag creator remains invisible. Because of its collaborative sharing character
tags become common property [
            <xref ref-type="bibr" rid="ref48">50</xref>
            ] and can be reused by other taggers, which means
one tag can be related with many taggers. However, to avoid inappropriate tags or tag
spam [
            <xref ref-type="bibr" rid="ref37">38</xref>
            ] it might become important to identify the tagger who causes the false tag
[
            <xref ref-type="bibr" rid="ref47">49</xref>
            ]. Two cases remain disputable. The first is the transparency and visibility of the
related tagger for all others, the second is an anonymous solution, where the tagger
remains invisible for reason of data protection and to ensure taggers freedom of opinion.
1.2.3
          </p>
          <p>Tags</p>
        </sec>
        <sec id="sec-2-1-9">
          <title>Suggestions (Given, Not Given)</title>
          <p>
            A vexed characteristic for social tagging systems is the taggers‟ free choice of
vocabulary without being bound to controlled vocabularies. Ambiguity of language has
often been discussed as a main disadvantage of social tagging systems [
            <xref ref-type="bibr" rid="ref25 ref51">26,
53</xref>
            ].Therefore, existing approaches tend to get social tagging more structured and
recommend to support taggers vocabulary choice by suggested tags [
            <xref ref-type="bibr" rid="ref18 ref40 ref61">18, 42,63</xref>
            ]. There
are already several approaches to suggest tags, e.g. previously used tags [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ], tags with
similar spell, frequently used ones or the latest ones. Each kind of suggestion aims to
reduce the ambiguity of language [
            <xref ref-type="bibr" rid="ref18 ref51 ref57">18, 53, 59</xref>
            ]. It is the taggers‟ choice to accept the
suggest tags or ignore them. Hence, suggestions can be given or not.
          </p>
        </sec>
        <sec id="sec-2-1-10">
          <title>Types (Unrestricted, Restricted)</title>
          <p>
            Apart from suggestions a variety of tag-types results from the ambiguity of language
[
            <xref ref-type="bibr" rid="ref20 ref21">21, 22</xref>
            ]. However, it still lacks a complete categorization. We can roughly separate
single-word-tags from compounded-tags [
            <xref ref-type="bibr" rid="ref57">59</xref>
            ] as well as objective tags from subjective
ones [
            <xref ref-type="bibr" rid="ref33">34</xref>
            ]. But there are also tag-types only made for the tagger himself to retrieve its
own information, which are meaningless for other taggers. For the purpose of
competency acquisition just tag-types that contain competency related information are
required, not all tag types can be used [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ]. Hence, two cases remain to decide for, a
reduction of allowed tag-types [
            <xref ref-type="bibr" rid="ref61">63</xref>
            ] or tagging without constraints.
          </p>
        </sec>
        <sec id="sec-2-1-11">
          <title>Use of the same tags (Single, Multiple)</title>
          <p>
            Normally, competency acquisition methods include a scale to measure the degree each
competence has got or is required. However, in social tagging systems a rating scale is
missing [
            <xref ref-type="bibr" rid="ref30 ref53">31, 55</xref>
            ]. Social rating systems represent another social software category. To
express the importance a tag has got for one profile, taggers sometimes use the same tag
multiple times. But in some social tagging systems the multiple use of the same tag for
one tagger counts once even if it is added twice or multiple times to the same object. A
reuse of tags by one tagger might also a method to express the importance the tag has
got for the profile or the degree to which a competency is given or needed.
          </p>
        </sec>
        <sec id="sec-2-1-12">
          <title>Number of different tags (Unlimited, Limited)</title>
          <p>
            In social tagging systems taggers are not limited in the number of tags they add to an
object [
            <xref ref-type="bibr" rid="ref21">22</xref>
            ]. It is the taggers‟ choice how many tags he or she wants to contribute, that‟s
why the number of tags varies among the tagger. Using social tagging systems for
competency acquisition regulations to determine the number of tags might be necessary
to avoid an assessment bias within a profile and tag spam [
            <xref ref-type="bibr" rid="ref37">38</xref>
            ]. However, regulations
towards a fixed number of tags might also cause spam [
            <xref ref-type="bibr" rid="ref37">38</xref>
            ] tags, when taggers just add
tag because they have to. Hence one has to decide for a limited or unlimited number of
different tags.
          </p>
        </sec>
        <sec id="sec-2-1-13">
          <title>Temporal dimension (Given, Not Given)</title>
          <p>
            Some social tagging systems consist of more than three elements; some also include a
temporal dimension to acquire the date a tag occurs for the first time or every time it has
been changed. With the additional temporal dimension changes over the time could be
measured. The additional temporal dimension might also useful for competency
acquisition to depict changes in the profiles over time [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ].
          </p>
        </sec>
        <sec id="sec-2-1-14">
          <title>Weight (Equal, Unequal)</title>
          <p>
            Another specialty of social tagging systems is the equality in weight every tag has
within the system. This is related with the equal treatment of each tagger. However, a
weighted tag might be a method to underline the tags‟ importance [
            <xref ref-type="bibr" rid="ref61">63</xref>
            ], e.g. the
superiors‟ tags might be more important for individuals profiles than the subordinates‟
one. Otherwise latest added tags might be more important than those which were added
a year ago. So, one can decide for unequally or equally weighted tags.
          </p>
        </sec>
        <sec id="sec-2-1-15">
          <title>Scope (Professional Competence, Personal Competence)</title>
          <p>
            Current people tagging approaches allow taggers to describe profiles in an unstructured
manner [
            <xref ref-type="bibr" rid="ref13 ref27">13, 28</xref>
            ]. Focusing on competency acquisition there are several dimensions
respectively facets competence consists of [
            <xref ref-type="bibr" rid="ref23 ref36 ref58">24, 37, 60</xref>
            ]. According to the DQR
competence can be subdivided in two sections: professional and personal competence
[19]. Hence, social tagging might cover the whole scope or just one of both sections
[
            <xref ref-type="bibr" rid="ref58">60</xref>
            ].
          </p>
        </sec>
        <sec id="sec-2-1-16">
          <title>Granularity (Predefined, Not Predefined)</title>
          <p>
            Apart from the dimensions competence consists of there are also differences
considering the granularity a competence is ascertained. The more granular a
competency is acquired the easier it is to align actual and target competencies.
However, ambiguity of language and the absence of rules in social tagging systems
allow every hierarchical level [
            <xref ref-type="bibr" rid="ref61">63</xref>
            ] within the tags [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ]. To gather more accurate
information we suggest predefining granular levels. Alternatively to this suggestion a
non predefined characteristic is also possible.
          </p>
        </sec>
        <sec id="sec-2-1-17">
          <title>Structure (Given, Not Given)</title>
          <p>
            Unlike taxonomies, where terms are clearly kept in strict mono- hierarchical
parentchild relations in social tagging systems each tagger can create his or her own structure
[
            <xref ref-type="bibr" rid="ref41 ref53">43, 55</xref>
            ]. In most cases those structures are individual and cannot be matched with
others. Tags can also been aggregated, e.g. compounded as tag bundles [
            <xref ref-type="bibr" rid="ref40 ref51 ref57">42, 53, 59</xref>
            ].
Further there exist approaches, which recommend a predefined structure, e.g. by means
of given metadata, to get tags more accurate [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ]. Another research recommends
predefined facets or dimensions, where tags can be sub ordered [
            <xref ref-type="bibr" rid="ref46">48</xref>
            ]. In order to get a
more aggregated view on competencies a given structure through predefined facets or
metadata might be helpful. However it depends on number and quality of facets or
metadata whether this is effective [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ]. So, one can decide for an integrated structure or a
structure less characteristic.
          </p>
        </sec>
        <sec id="sec-2-1-18">
          <title>Font size (Equal, Unequal))</title>
          <p>
            Finally, tag visualization as one of the main social tagging characteristics remains to
discuss. There are various ways to visualize tags. Tags can be ordered as tag-clouds or
they can be listed both horizontally and vertically. It‟s further on possible to order them
either alphabetically, or semantically, or visualize them as unordered [
            <xref ref-type="bibr" rid="ref26">27</xref>
            ]. Each
visualization aims at supporting social navigation [
            <xref ref-type="bibr" rid="ref37 ref48 ref50">38, 50, 52</xref>
            ]. Apart from structure the
font sized can vary. In most cases a big font size represents a high frequency [
            <xref ref-type="bibr" rid="ref29">30</xref>
            ],
upto-datedness or occurrence. But it is also possible to visualize all tags in an equal font
size.
2
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Theoretical Foundation - Quality Criteria</title>
      <p>
        Competency acquisition deals with measuring, elicitation and collection of competency
related information; thereby, it gets usually supported by electronically diagnostic
instruments for aptitude testing. Creating a scientific fundament each instrument used
for competency acquisition requires a theoretical foundation that in most cases is based
on a measuring theory. Each theory or model has several assumptions and is founded to
quality criteria which have to be observed. Competence is a construct of aptitude testing
[
        <xref ref-type="bibr" rid="ref58">60</xref>
        ]. Normally, methods to measure competencies for competency acquisition are
evaluated by quality criteria, particularly reliability and validity that result from
classical testing theory [
        <xref ref-type="bibr" rid="ref24">25</xref>
        ]. So, classical testing theory seems to be an appropriate
theory to evaluate social tagging systems. In the following assumptions of classical
testing theory are presented in short.
2.1
      </p>
      <p>
        Assumptions
Classical testing bases on three main assumptions (axioms) and additional assumptions
as well. All of them concern the measuring process and in particular the measured
values [
        <xref ref-type="bibr" rid="ref42">44</xref>
        ]. Firstly, the existence axiom declares that the real value exists as the
expected value of a measurement. Secondly, the connectivity axiom implies that each
measured value consists of both a true and an error value. It implies each measurement
is defected with errors. Thirdly, the independence axiom precludes that there is
dependence between error values and true values among several persons. It is
additionally assumed that error values within a person are not related. Further
independence over participating raters is assumed [
        <xref ref-type="bibr" rid="ref24">25</xref>
        ]. Classical testing theory mainly
considers the quality of a measurement or elicitation from the measurement errors point
of view; therefore it is also called “measurement error theory”. Measurement errors or
error values can be subdivided in coincidental errors and systematical errors [
        <xref ref-type="bibr" rid="ref22">23</xref>
        ]. The
former results from internal and external influences a person is affected with. They
appear infrequently and are non predictable. The latter appears in pattern and results
from errors within the theoretical or empirical measuring model. According to the
classical testing theory error values result from the lack of quality. Thereby the degree
of quality can be estimated with quality criteria, in particular, reliability and validity
which will be subsequently introduced.
2.1.1
      </p>
      <p>
        Reliability
Reliability is „ (…) the degree of accuracy a procedure has with regard to the
characteristic to be measured.“ [35, p. 250][
        <xref ref-type="bibr" rid="ref28">29</xref>
        ]. It is also a degree for the stability a
measuring instrument has got. [
        <xref ref-type="bibr" rid="ref42">44</xref>
        ]. Reliability requires two temporal distanced
measurements which have to congruent in their measured values. So, reliability is a
measure how prone a measuring method is for coincidental error values. Getting reliable
results or measured values rules, regulations, norms and structures are necessary
required.
      </p>
      <p>
        The estimation of reliability embraces stability over time (re-test reliability), internal
stability and at last the agreement over several raters in their interpretation of measured
values. In detail re-test reliability can be estimated if there are two measurements at
different times in which the same group uses the same method to measure or ascertain
the same thing. A special kind of re-test reliability is the intra-rater reliability, a measure
for the stability of measured values within one rater over time [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Estimating internal
consistency it requires a measuring method to be divisible into many equal small
measurements, which count as a measurement for their own [
        <xref ref-type="bibr" rid="ref28">29</xref>
        ]. If all measurements
deliver the same measured values, internal consistency is given. Thirdly,
inter-raterreliability can be estimated if a fixed group of rater is ensured, who interpret the same
measured value independent from each other in the same way. It implies a measuring
method to be clear and accurate so that coincident interpretation errors can be
minimized.
2.2
      </p>
      <p>
        Validity
Validity is a measure how trustworthy, complete and valid a measuring method is. It is
given if a measuring method exactly measures what it is supposed to do and nothing
else. Validity can be assumed as given if theoretical argument and empirical results
underline this. Validity represents further a measure, how prone a measuring method is
from both systematical and coincidental error values [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        There are several ways to estimate validity. Firstly, content validity is a measure if the
applied measuring method actually measures the whole content respectively every facet
of the regarded construct. It implies that a construct is measurable and a fixed definition
exists which contains every facets the construct exits of it [
        <xref ref-type="bibr" rid="ref58">60</xref>
        ]. To estimate or test the
content validity normally experts are interviewed, respectively, consulted. This is what
we call face validity, which is given if the majority of experts agree with the definition.
Secondly, criterion validity is a measure to what extent measured values match with
present or future external criterion. Simultaneously or present comparison is regarded
by concurrent validity, whereas predictive validity focuses on delayed comparisons.
Thirdly, construct validity is given if actually the contrast is measured and nothing else.
To put that in our perspective construct validity is given if all measured values refer to
competence and not to intelligence. Convergence validity is given if several measuring
methods get the same measured values. Discriminate validity is given if measuring
different constructs provide different measured values.
3
      </p>
    </sec>
    <sec id="sec-4">
      <title>Discussion</title>
      <p>
        Based on conceptual and theoretical assumptions we answer the question if social
tagging systems, as limited before, are able to ensure the provision of reliable and valid
competency related information. In the following at the first step we examine to what
extent social tagging systems ensure the measuring of both quality criteria. At the
second step we show up the sources of coincidental and systematical errors and give
recommendations to minimize them referring to our conceptual framework.
Estimating intra- rater reliability or re-test reliability a temporal dimension is required to
compare tags within one tagger over time. Further, it has to be ensured that a tagger
remains for a fixed period within a social tagging system. It is necessary that at least
two measurements at different times can be done to compare changes within the tags.
This is only to ensure in closed systems, because in open ones there is nothing that
bounds a tagger to a system, whereas in closed systems the employment contract
regulates the length of a period a tagger is bound to the organization. It still lacks
research if competency related tags within one tagger are stable over time. Tags
represent the taggers vocabulary, which develops over time as well as the tagger‟s
personality and competence. Although previous findings show that some patterns of
stability in the taggers vocabulary choice and spelling exist [
        <xref ref-type="bibr" rid="ref48">50</xref>
        ], it remains unclear if
their understanding of the tag content remains also the same.
      </p>
      <p>
        However, just the fact that the taggers belong to the organization does not guarantee
their contribution yet. Previous findings show taggers can be distinguished in power
user respectively normal taggers who tag frequently and lurkers who tag infrequently or
just profit of existing information [
        <xref ref-type="bibr" rid="ref48 ref49">50, 51</xref>
        ]. This aggravates the validation of re-rest
reliability and intra-rater-reliability for all taggers.
      </p>
      <p>
        Currently, there is just a voluntary incentive; taggers are free to contribute tags driven
by their own motivation. A compulsory incentive for now does not exist. However, if
taggers are not expected to contribute, re-test reliability respectively
intra-raterreliability might be hardly to estimate. But a compulsory incentive might also increase
the spam tag [
        <xref ref-type="bibr" rid="ref61">63</xref>
        ] because taggers just tag because they have to.
      </p>
      <p>
        Estimating internal consistency implies that the measurement method, e.g. social
tagging systems can be divided into many smaller measurements which measure the
construct competence in an equal manner. Social tagging systems consist of multiple
taggers, profiles and tags and it is possible to form smaller social tagging systems within
one system. However, there are differences between each single tagger, profile and tags,
so equality of each dimension is hardly to attest. For instance, there are several tag types
which vary in their accurateness, objectivity and content. Not all of them are appropriate
to ascertain competencies [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Further, spam tags exist [
        <xref ref-type="bibr" rid="ref37 ref52">38, 54</xref>
        ] that does not contain any
relevant content. So consistency within the measurement method is hardly to attest.
Estimating inter-rater-reliability implies that at least two taggers tag the same profile. In
social tagging systems multiple taggers describe the same digital object in a
collaborative manner. However, the number of tagger varies depending on the digital
object, respectively, profile. It is possible that just one or all taggers describe a profile,
because there are no rules that restrict a minimum of taggers. Referring to the
conceptual approach there are several possibilities to estimate inter-rater-reliability
exist, e.g. estimating inter-rater-reliability over several perspectives (self-assessment
and foreign appraisal) [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], several hierarchical level or within one hierarchical level
can be done.
      </p>
      <p>
        Secondly, inter-rater-reliability requires congruence over taggers‟ interpretation of the
same measured value. In social tagging systems there are neither rules nor regulations
concerning the vocabulary choice. This causes the ambiguity of language social tagging
systems are known for, in particular tags are imprecise [
        <xref ref-type="bibr" rid="ref25">26</xref>
        ]. Synonyms, homonyms,
abbreviations and so on are not excluded because taggers are free in their vocabulary
choice. However, taggers differ from each other in their linguistic power of expression,
cognitive talents and domain knowledge [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Hence, ambiguity can be avoided neither
in the spelling, nor in the understanding or sense a tag has [
        <xref ref-type="bibr" rid="ref30 ref51 ref52">31, 53, 54</xref>
        ]. For example,
although an individual‟s profile is tagged multiple times by different taggers with
„leadership ability“, inter-rater-reliability cannot be attested at all because each tagger
might have its own understanding, what “leadership ability” is [
        <xref ref-type="bibr" rid="ref16 ref43">16, 45</xref>
        ]. Tags are
consequently not accurate to interpret, in particular single-word tags offer polysemy
[
        <xref ref-type="bibr" rid="ref3 ref55">3,57</xref>
        ]. But can be used as a start tag which can be augmented with more specific tags.
Further there tags with multiple or additional hidden meanings that are just
understandable for a special group, called socio-semantic tags [
        <xref ref-type="bibr" rid="ref33 ref55">34, 57</xref>
        ]. Apart from
objective tags there subject related ones [
        <xref ref-type="bibr" rid="ref31">32</xref>
        ], which can just be understood or
interpreted by the tagger himself [
        <xref ref-type="bibr" rid="ref13 ref31 ref49 ref51 ref6">6, 13, 32, 51, 53</xref>
        ]. So, we recommend limiting the
tagtypes to those tag types which are clear for all taggers. Problems to interpret tags in an
accurate manner might further result from different granularities within the tags.
Finegranular tags might be more accurate than large-grained ones, e.g. the tag „C++“ is
more defining than “computerlanguage”. We recommend a predefined granularity level;
however, it needs further research to detect which granularity-level is the best.
Independence from the participating taggers for each tagger has to be observed for
competency acquisition and assessment procedures [
        <xref ref-type="bibr" rid="ref34">35</xref>
        ] according to the German
requirements for proficiency assessment procedures and classical testing theory as well.
In detail, it concerns the processes of acquisition, interpretation and evaluation of
competency related information respectively tags. It is especially relevant for personal
related information and individual‟s competency profile description due to the fact that
competencies are sensitive personal-related data. However, social tagging systems
follow the principle of collaborative tag sharing and a mutual transparency of all
contributed tags [
        <xref ref-type="bibr" rid="ref13 ref15 ref16">13, 15, 16</xref>
        ]. So it requires a special characteristic as we presented in
the conceptual framework.
      </p>
      <p>
        Assuming each tagger tags independent from others the same profile, multiple single
descriptions of one profile are given to estimate their inter-rater reliability. In this
combination multiple tagger are involved in a collective way. To ensure independence
the transparency we recommend to keep profiles and the foreign related tags
nontransparent for the tagger that he or she just see own contributed tags [
        <xref ref-type="bibr" rid="ref59">61</xref>
        ].Thus
coincidental errors that result from external influences might be minimized.
Nevertheless, coincidental errors result from both influence sources externals and
internals as well. This has been scarcely confirmed in [
        <xref ref-type="bibr" rid="ref29 ref48">30, 50</xref>
        ], which show taggers are
influenced by their own subjective point of view and other taggers‟ influence as well.
Internal coincidental errors result from the taggers‟ current temper and personality. So,
every tagger is influenced by its own idiosyncratic subjective point of view [
        <xref ref-type="bibr" rid="ref19">20</xref>
        ].
Socially desired tags cannot be avoided at all [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Otherwise, tags can consciously been
avoided [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], e.g. to strip other taggers a special competence which tagger do not have
themselves or just to save another tagger to be not connected with an expertise they
want not to related with [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Underestimation or overestimation of their own or foreign
competencies might occur as well [
        <xref ref-type="bibr" rid="ref22">23</xref>
        ].
      </p>
      <p>
        However, classical testing theory assumes the true values are the expected values, so the
mean of multiple measure values might compensate error values. Social tagging
systems already use the wisdom of multiple taggers to describe the same object. The
congruence over several taggers in his or her profile description helps to detect relevant
tags. Research results from social indexing show, taggers agree on core terms [
        <xref ref-type="bibr" rid="ref58">60</xref>
        ],
which are mostly defining for a digital object. Nevertheless, even if tags just appear
once ,they can be valuable [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].Therefore, social tagging seems to be an appropriate
method to minimize internal coincidental error values. The more taggers are involved,
the more objective a profile description might become [
        <xref ref-type="bibr" rid="ref35">36</xref>
        ], it might also be helpful to
improve inter indexer inconsistency [
        <xref ref-type="bibr" rid="ref20 ref21 ref29">21, 22, 30</xref>
        ]. Further subjective coincidental errors
in competency acquisition could be reduced [
        <xref ref-type="bibr" rid="ref22">23</xref>
        ].
      </p>
      <p>
        However non-transparent solutions act against the collaborative character social tagging
systems has. Hence, we recommend a transparent solution, in which a tagger is
influenced by external criteria (foreign tags) but all taggers interact invisibly with each
just other over their tags. Thereby, all tags are in an equal font size to avoid halo effects
[
        <xref ref-type="bibr" rid="ref22 ref26">23, 27</xref>
        ]. So, every tagger gets more objective information, foreign tags work as
suggestions and it is the taggers decision to use the same tags or create new ones. So,
taggers might be inspired by other tags to find additional rich deep information. It
requires further research whether this approach observes the requirements for
proficiency assessment and data protection.
      </p>
      <p>
        Finally, due to the accuracy and trustworthiness [
        <xref ref-type="bibr" rid="ref34">35</xref>
        ] to estimate inter-rater-reliability it
requires equal expertise or domain knowledge for all taggers. In social tagging systems
an expertise is not required [
        <xref ref-type="bibr" rid="ref17 ref41 ref50">17, 43, 52</xref>
        ], each tagger is allowed to participate [
        <xref ref-type="bibr" rid="ref49">51</xref>
        ]
However, it requires empirical research to test if non-experts tags are less defining than
experts [
        <xref ref-type="bibr" rid="ref30 ref49">31, 51</xref>
        ].Taggers differ in their expertise and knowledge, especially if we
assume that they are from several hierarchical levels. But every single tagger has got
special domain knowledge and might contribute hidden but important competency
related information [
        <xref ref-type="bibr" rid="ref30 ref5">5, 31</xref>
        ]. For example, a tagger who has no special expertise in
competency acquisition might know in detail which competencies his job requires. On
the other hand, work mates might also know each other from another perspective than
superiors or subordinates do, similarly to the multiple-rater-assessments. So, we
recommend reaching equality in the taggers expertise as required to weight tags
corresponding with the hierarchical level or by the distance a tagger has to the profile
owner or job.
      </p>
      <p>
        In sum, it remains debatable if social tagging systems provide hard, reliable and
accurate competency-related information. But using the recommended characteristics
coincidental error sources might be minimized, which required further research.
However, rich, deep competency-related information from many different perspectives
can be gained [
        <xref ref-type="bibr" rid="ref4 ref7">4, 7</xref>
        ]. Social tagging systems seem to be appropriate to detect hidden
information [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], which is hardly to collect over all facets with current methods in such a
simple manner. Especially for self-description they seem to be an appropriate method
[
        <xref ref-type="bibr" rid="ref16 ref44 ref48">16, 46,50</xref>
        ] because taggers can describe their own competencies in their own words as
detailed as required.
3.2
Estimating content validity it requires a fix measuring model that defines all facets
dimensions competence consists of, in a special granularity [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. However, social tagging
systems do not provide any guidelines or definitions. They rather aim at the collection
of all possible descriptions a digital object or construct might have. Social Tagging
systems are foreign from controlled vocabularies, in which a single group of experts
defines what competence is, the facets it consist of and how granular it is to ascertain.
Instead of consulting experts to evaluate the face validity, social tagging systems use the
collective knowledge of taggers to get a broad, rich and extensive definition. So content
validity in social tagging systems is not based on a fixed definition but it is rather a
continuous evolutionary defining process. This procedure is already used in
combination with ontologies to augment competency models supported by employee‟s
commitment [
        <xref ref-type="bibr" rid="ref32 ref6">6, 33</xref>
        ]. So, content validity is difficult to estimate. Estimating criterion
validity needs external criteria, e.g. empirically measured values to which tags can be
compared with. This could be difficult to prove because competence is hardly to
measure directly [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Hence, the estimation of concurrent and predictive validity
requires further research. Estimating construct validity implies that, firstly, the construct
is measurable and it, secondly, can be clearly distinguished from other constructs [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
This seems to be difficult for multifaceted constructs such as competence [
        <xref ref-type="bibr" rid="ref23">24</xref>
        ], because
there are several definitions and in part overlapping understandings what competence is
[
        <xref ref-type="bibr" rid="ref36">37,41</xref>
        ]. Competence is a latent construct that consist depending on the situation of more
or less facets [
        <xref ref-type="bibr" rid="ref2">2, 41</xref>
        ]. The harder it is to ascertain all facets with one measurement
method [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. But competencies are everywhere to detect, so each tag might be able to
ascertain a small facet of competence [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. To estimate convergent validity we
recommend comparing tags with existing definitions and measured values gained by
other conventional methods. If they are congruent concurrent validity is given.
Estimating discriminate validity requires additional social tagging systems that ascertain
other construct profiles with the same tagger. Both require further research.
4
      </p>
    </sec>
    <sec id="sec-5">
      <title>Conclusion</title>
      <p>Firstly, we answered the question which possibilities social tagging systems offer to
gather competency related information. In order to do this we systematically examined
social tagging systems from external and internal points of view and presented a
conceptual framework that consists of several design characteristics ordered by social
tagging dimensions and selected sub dimensions.</p>
      <p>
        Secondly, we aimed at finding out if social tagging systems are able to ensure the
allocation of reliable and valid competency related information. To examine this we
regarded social tagging systems from the point of view of classical testing theory. In
particular, we focused on their reliability and validity. It has been detected that the
absence of rules, independence from the taggers and missing expertise as well as the
ambiguity of language aggravate the estimation of reliability and validity. The main
disadvantages result from the shortness of tags that allows different understandings and
interpretability. So, from classical testing theory‟s point of view social tagging systems
do not fulfill the requirements to gather hard-reliable and consequently valid
competency-related information. This was previously assumed in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], who consider the
flexibility and ambiguity of social tagging systems as a negatively influence on the
quality of tags [
        <xref ref-type="bibr" rid="ref49">51</xref>
        ]. Social tagging procedure is similar to qualitative research methods
that use the language of the society and acquire or gather data from the participant‟s
point of view, who describe constructs through their own eyes [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
Nevertheless, using social tagging for competency acquisition is valuable for e-HRM.
Because of their decentralized collaborative character, it is a free choice of vocabulary
and missing structure social tagging systems are accepted by many people. Their
commitment could be helpful to ascertain more hidden, deep and rich information by
several multiple perspective which otherwise would not have been ascertained [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
Using the collective or collaborative gathering approach social tagging systems consist
of multiple perspectives from several points of views can also make competency-related
information more accurate [
        <xref ref-type="bibr" rid="ref29">30</xref>
        ]. Further benefits, social tagging systems additionally
provide, are hardly to detect with chosen quality criteria. So we propose another
evaluation by substitute quality criteria e.g. efficiency, effectiveness [
        <xref ref-type="bibr" rid="ref29">30</xref>
        ], relevance and
usefulness.
[19] German Qualifications Framework Working Group (2009) Discussion proposal for
a German Qualifications Framework for Lifelong Learning,
http://www.deutscherqualifikationsrahmen.de/SITEFORUM?&amp;t=/Default/gateway
&amp;i=1215181395066&amp;application=menu&amp;l=1&amp;active=no&amp;ParentID=12157726270
52&amp;xref=http%3A//www.google.de/url%3Fsa%3Dt%26source%3Dweb%26ct%3D
res%26cd%3D2%26ved%3D0CAwQFjAB%26url%3Dhttp%253A%252F%252Fw
ww.deutscherqualifikationsrahmen.de%252Fportals%252Fdqrbbj%252Fexport%25
2Fder_dqr%252Findex.html%26rct%3Dj%26q%3Ddqr%26ei%3Dj55RS7_HAo3z
_AbClIiaCg%26usg%3DAFQjCNGI9RgArrGCgvvonoybzdb5CiOVsw
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Bar-Ilan</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shoham</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Idan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Shachak</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2008</year>
          ):
          <article-title>Structured versus unstructured tagging:a case study</article-title>
          ,
          <source>Online Information Review</source>
          <volume>32</volume>
          (
          <issue>5</issue>
          ).
          <fpage>635</fpage>
          -
          <lpage>647</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Bailey</surname>
            ,
            <given-names>K. D.</given-names>
          </string-name>
          (
          <year>2007</year>
          ) Methods of social Research, 4th Vol. Free Press NY
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Berendt</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Hanser</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>Tags are not Metadata, but „Just more Content“- to Some People</article-title>
          , ICWSM '
          <fpage>07</fpage>
          .
          <string-name>
            <surname>Colorado</surname>
          </string-name>
          . http://warhol.wiwi.huberlin.de/~berendt/Papers/ICWSM07/berendt_hanser_ICWSM07.pdf,
          <source>last access 10.05</source>
          .2010
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Bernstein</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tan</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Czerwinski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Horvitz</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2008</year>
          )
          <article-title>Collabio: A Game for Annotating People within Social Networks</article-title>
          ,
          <source>In Proceedings of UIST</source>
          <year>2009</year>
          :
          <article-title>ACM Press NY Symposium on User Interface Software and Technology</article-title>
          . http://research.microsoft.com/en-us/um/people/horvitz/collabio.pdf,
          <source>last access 10.05</source>
          .2010
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Bischoff</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Firan</surname>
            ,
            <given-names>C. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nejdl</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Paiu</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2008</year>
          )
          <article-title>Can All Tags be Used for Search? In CIKM '08: Proceeding of the 17th ACM conference on Information and knowledge management (</article-title>
          <year>2008</year>
          )
          <fpage>203</fpage>
          -
          <lpage>212</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Braun</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kunzmann</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Schmidt</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2008</year>
          )
          <article-title>People tagging and ontology maturing: towards collaborative competence management</article-title>
          ,
          <source>David Randall and Pascal</source>
          Salembier (eds.):
          <article-title>From CSCW to Web 2.0: European Developments in Collaborative Design Selected Papers from COOP08</article-title>
          , Computer Supported Cooperative Work, Springer,
          <year>2010</year>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Bryman</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2008</year>
          )
          <article-title>Social research Methods, 3rd Edt</article-title>
          ., OVP Oxford Press, NY
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Brzozowski</surname>
            ,
            <given-names>M. J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sandholm</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Hogg</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>Effects on Feedback and Peer Pressure on Contributions to Enterprise Social Media</article-title>
          .
          <source>Proceedings of the ACM 2009 International Conference on Supporting Groupwork; ACM Press NY 61-70</source>
          http://www.hpl.hp.com/research/idl/papers/feedback/group2009feedback.pdf
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Cattuto</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Loreto</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Pietronero</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>Semiotic dynamics and collaborative tagging</article-title>
          ,
          <source>PNAS</source>
          .
          <fpage>1461</fpage>
          -
          <lpage>1464</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Damianos</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Griffith</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Cuomo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2006</year>
          )
          <article-title>Onomi: Social Bookmarking on a Corporate Intranet</article-title>
          ,
          <source>Proceedings of the WWW 2006 Collaborative Web Tagging Workshop</source>
          ,
          <year>2006</year>
          http://www.mitre.org/work/tech_papers/tech_papers_
          <volume>06</volume>
          /06_0352/06_0352.pdf
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>De Coi</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herder</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koesling</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lofi</surname>
            ,
            <given-names>C</given-names>
          </string-name>
          , Olmedilla,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Papapetrou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            &amp;
            <surname>Siberski</surname>
          </string-name>
          ,
          <string-name>
            <surname>W.</surname>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>A Model For Competence Gap Analysis, ECTEL06 conference</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Ehrlich</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lin</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Giffiths-Fisher</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>Searching for Experts in the Enterprise: Combining Text and Social Network Analysis</article-title>
          , GROUP‟
          <volume>07</volume>
          <issue>November 4</issue>
          -7
          <string-name>
            <given-names>Sanibel</given-names>
            <surname>Island</surname>
          </string-name>
          , Flirida USA ACM
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Farrell</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lau</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          (
          <year>2006</year>
          )
          <article-title>Fringe Contacts: People-Tagging for the Enterprise</article-title>
          .
          <source>In: Proceedings of the WWW 2006 Collaborative Web Tagging Workshop (Edinburgh</source>
          ,
          <year>2006</year>
          ). ACM Press, NY
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Farell</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lau</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Nusser</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>Building Communities with People-Tags</article-title>
          .
          <source>In: INTERACT (2)</source>
          , LNCS, Springer (
          <year>2007</year>
          ),
          <fpage>357</fpage>
          -
          <lpage>360</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Farrell</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lau</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wilcox</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Muller</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , (
          <year>2007</year>
          )
          <article-title>Socially augmenting employee profiles with people-tagging</article-title>
          .
          <source>ProcUIST</source>
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Farrell</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lau</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wilcox</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Muller</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Ehrlich</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2006</year>
          )
          <article-title>Augmenting employees profiles with people-tagging</article-title>
          , http://domino.research.ibm.com/library/cyberdig.nsf/papers/4DBEF46CBCE81493 85257222005806E0/$File/rj10395.pdf
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Gao</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dai</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Fu</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>Improving Personal tagging Consistency through Visualization of Tag Relevancy</article-title>
          , In: Ozok,
          <string-name>
            <given-names>A.A.</given-names>
            ;
            <surname>Zaphiris</surname>
          </string-name>
          ,
          <string-name>
            <surname>P</surname>
          </string-name>
          . (Eds.) Online Communities,
          <source>LNCS 5621</source>
          . Springer. Heidelberg 326-335
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Gemmel</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ramezani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schimoler</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Christiansen</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Mobasher</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>A Fast Effective Multi-Channeled Tag Recommender</article-title>
          , Proceedings of ECML PKDD http://www.kde.cs.uni-kassel.de/ws/dc09/papers/paper_25.pdf
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Glushko</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maglio</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matlock</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Barsalou</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2008</year>
          )
          <article-title>Categorization in the wild</article-title>
          ,
          <source>Trends in Cognitive Sciences</source>
          <volume>12</volume>
          (
          <issue>4</issue>
          ),
          <fpage>129</fpage>
          -
          <lpage>35</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Golder</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Hubermann</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2005</year>
          )
          <article-title>The Structure of Collaborative Tagging Systems Technical report</article-title>
          , Information Dynamics Lab, HP Labs. http://www.hpl.hp.com/research/idl/papers/tags/tags.pdf
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Golder</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Hubermann</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2006</year>
          )
          <article-title>Usage patterns of collaborative tagging systems</article-title>
          ,
          <source>Journal of Information Science</source>
          .
          <volume>32</volume>
          (
          <issue>2</issue>
          ).
          <fpage>198</fpage>
          -
          <lpage>208</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Greving</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>Messen und Skalieren von Sachverhalten</article-title>
          , in: Albers,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Klapper</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Konradt</surname>
          </string-name>
          ,
          <string-name>
            <surname>U</surname>
          </string-name>
          , Walter,
          <string-name>
            <given-names>A.</given-names>
            &amp;
            <surname>Wol</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
          (Hrsg.)
          <article-title>Methoden der empirischen Forschung, 2</article-title>
          . Überarbeitete und erweiterte Auflage, Gabler Wiesbaden,
          <fpage>65</fpage>
          -
          <lpage>78</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Grzeda</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2005</year>
          )
          <article-title>In competence we trust? Addressing conceptual ambiguity</article-title>
          ,
          <source>Journal of management development</source>
          .
          <volume>24</volume>
          (
          <issue>6</issue>
          )
          <fpage>530</fpage>
          -
          <lpage>545</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Gulliksen</surname>
            <given-names>H.</given-names>
          </string-name>
          (
          <year>1950</year>
          )
          <article-title>Theory of mental tests</article-title>
          , 1th Ed. Wiley &amp; Sons, London.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Guy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Tonkin</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2006</year>
          )
          <article-title>Folksonomies: Tidying up Tags? D-Lib Magazine 12(1</article-title>
          ). http://webdoc.sub.gwdg.de/edoc/aw/d-lib/dlib/january06/guy/01guy.html,
          <source>last access 10.05</source>
          .2010
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Halvey</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Keane</surname>
            ,
            <given-names>M.T .</given-names>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>An assessment of tag presentation Techniques, Poster zum www 2007 may 8-</article-title>
          12 Bannf Alberta Canada
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Hammond</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hanny</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lund</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Scott</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2005</year>
          ).
          <article-title>Social bookmarking tools - A general overview</article-title>
          .
          <source>D-Lib Magazine</source>
          <volume>11</volume>
          (
          <issue>4</issue>
          ).
          <source>April</source>
          (
          <year>2005</year>
          ) http://www.dlib.org/dlib/april05/hammond/04hammond.html,
          <source>last access 10.05</source>
          .2010
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Hartig</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Jude</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>Empirische Erfassung von Kompetenzen und psychometrische Kompetenzmodelle</article-title>
          . In: Hartig &amp;
          <string-name>
            <surname>J. Klieme</surname>
          </string-name>
          , E. (Eds.)
          <article-title>Möglichkeiten und Voraussetzungen technologiebasierter Kompetenzdiagnostik</article-title>
          .
          <source>BMBF. Bonn</source>
          .
          <volume>17</volume>
          -
          <fpage>36</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Hassan-Montero</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Herrero-Solana</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          (
          <year>2006</year>
          )
          <article-title>Improving tag Clouds as Visual Information Retrieval Interfaces</article-title>
          .,
          <source>In: Scit2006: International Conference on Multidisciplinary Information Sciences and Technologies Mérida</source>
          , Spain,
          <volume>10</volume>
          /
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [31]
          <string-name>
            <surname>Heckner</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>Tagging, Rating, Posting Studying Forms of User Contribution for Web-based Information Management</article-title>
          and
          <string-name>
            <given-names>Information</given-names>
            <surname>Retrieval</surname>
          </string-name>
          . Hülsbusch. Konstanz
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Heckner</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Neubauer</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Wolff</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2008</year>
          )
          <article-title>Tree, funny</article-title>
          , to_read, google: What are Tags Supposed to Achieve? In
          <source>SSM '08: Proceeding of the 2008 ACM workshop on Search in social media. 3-10</source>
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [33]
          <string-name>
            <surname>Heinsman</surname>
          </string-name>
          , H.,
          <string-name>
            <surname>de Hoogh</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koopmann</surname>
            <given-names>P</given-names>
          </string-name>
          . &amp; van
          <string-name>
            <surname>Muijen</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2008</year>
          )
          <article-title>Commitment, control, and the use of competency management</article-title>
          ,
          <source>in: Personnel</source>
          Review Vol.
          <volume>37</volume>
          (
          <issue>6</issue>
          )
          <year>2008</year>
          ,
          <fpage>609</fpage>
          -
          <lpage>628</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [34]
          <string-name>
            <surname>Höltschi</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aschoff</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Schwabe</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>2008</year>
          )
          <article-title>wehmütig</article-title>
          , witzig, wunderbar - Subjective
          <source>tags als Wegweiser im Web 2.0. Multikonferenz Wirtschaftsinformatik MKWI</source>
          <volume>200</volume>
          .,
          <fpage>1319</fpage>
          -
          <lpage>1330</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [35]
          <string-name>
            <surname>Hornke</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Pitts</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2004</year>
          )
          <article-title>DIN 33430 Requirements for proficiency assessment procedures and their implementation</article-title>
          . In:
          <string-name>
            <surname>Westhoff</surname>
            <given-names>K</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hellfritsch</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hornke</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kubinger</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lang</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moosbrugger</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Püschel</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Reimann</surname>
            <given-names>G</given-names>
          </string-name>
          . (Eds.)
          <article-title>Grundwissen für die berufsbezogene Eignungsbeurteilung nach DIN 33430</article-title>
          .
          <string-name>
            <surname>Pabst</surname>
          </string-name>
          , Lengerich
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [36]
          <string-name>
            <surname>Hotho</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jäschke</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Schmitz</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stumme</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>2006</year>
          )
          <article-title>Trend Detection in Folksonomies</article-title>
          . In: Goos,
          <string-name>
            <given-names>G.</given-names>
            ;
            <surname>Hartmanis</surname>
          </string-name>
          , J.,van Leeuwen,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (Eds.) Semantic Multimedia LNCS Springer.
          <volume>56</volume>
          -
          <fpage>70</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [37]
          <string-name>
            <surname>Kaufhold</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2006</year>
          )
          <article-title>Kompetenz und Kompetenzerfassung: Analyse und Beurteilung von Verfahren der Kompetenzerfassung</article-title>
          . Vs Verlag
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [38]
          <string-name>
            <surname>Koutrika</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Effendi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gyöngyi</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Heymann</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Garcia-Molina</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2008</year>
          )
          <article-title>Combating Spam in Tagging Systems: An Evaluation. Transactions on the Web 4(2)</article-title>
          . ACM Press 1
          <article-title>-34</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [39]
          <string-name>
            <surname>Lepsinger</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Lucia</surname>
            ,
            <given-names>A.D.</given-names>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>The Art</article-title>
          and
          <source>Science of 360-Degree Feedback: 2nd Edition</source>
          , Wiley &amp; Sons, San Francisco CA.
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [40]
          <string-name>
            <surname>Madden</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fox</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2006</year>
          ).
          <article-title>Pew Internet: Riding the Waves of "Web 2.0"</article-title>
          .Pew Internet. http://www.pewinternet.org/Reports/2006/
          <article-title>Riding-the-Waves-of-Web20.aspx</article-title>
          <string-name>
            <surname>Markus</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cooper-Thomas</surname>
            <given-names>H.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Allpress</surname>
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2005</year>
          )
          <article-title>Confounded by competencies? An evaluation of the Evolution</article-title>
          and
          <article-title>Use of Competency Models</article-title>
          .
          <source>In: New Zealand Journal of Psychology July</source>
          <year>2005</year>
          (
          <volume>2</volume>
          ).
          <fpage>117</fpage>
          -
          <lpage>126</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [42]
          <string-name>
            <surname>Marlow</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Naaman</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , boyd, d. &amp;
          <string-name>
            <surname>Davis</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2006</year>
          ). HT06,
          <string-name>
            <surname>Tagging</surname>
            <given-names>Paper</given-names>
          </string-name>
          , Taxonomy, Flickr, academic article, to read.
          <source>In Proceedings of the HYPERTEXT‟06: Proceedings of the seventeenth conference on Hypertext and hypermedia (odensee</source>
          ,
          <year>2006</year>
          ) ACM Press New York, NY.
          <fpage>31</fpage>
          -
          <lpage>40</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [43]
          <string-name>
            <surname>Mathes</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2004</year>
          )
          <article-title>Folksononmies Cooperative Classification and Communication Through Shared Metadata</article-title>
          , http://www.adammathes.com/academic/computermediated-communication/folksonomies.html
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [44]
          <string-name>
            <surname>Moosbrugger</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2008</year>
          )
          <article-title>Klassische Testheorie (KTT</article-title>
          ) in: Moosbrugger,
          <string-name>
            <given-names>H.</given-names>
            &amp;
            <surname>Kelava</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (Eds.) Testtheorie und Fragebogenkonstruktion, Springer, Berlin Heidelberg,.
          <volume>99</volume>
          -
          <fpage>113</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [45]
          <string-name>
            <surname>Muller</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2004</year>
          )
          <article-title>When Similiar Tags do not Describe Similiar Things: Evidence of Communities among Users</article-title>
          , http://domino.watson.ibm.com/cambridge/research.nsf/58bac2a2a6b05a1285256b3 0005b3953/5a6ac2e7302fe5c9852574b20070d985/$file/muller%
          <fpage>20</fpage>
          -
          <lpage>%</lpage>
          20when%
          <fpage>20similar</fpage>
          %
          <fpage>20tags</fpage>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [46]
          <string-name>
            <surname>Muller</surname>
            ,
            <given-names>M</given-names>
          </string-name>
          , Ehrlich,
          <string-name>
            <given-names>K.</given-names>
            &amp;
            <surname>Farrell</surname>
          </string-name>
          ,
          <string-name>
            <surname>Stephen</surname>
          </string-name>
          (
          <year>2006</year>
          )
          <article-title>Social Tagging and Self-Tagging for Impression Management, Submitted as an interactive poster to CSCW 2006, Banff</article-title>
          , November 2006
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [47]
          <string-name>
            <surname>Olson</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wolfram</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2006</year>
          )
          <article-title>Indexing Consistency and its implications for Information Architecture: A Pilot Study</article-title>
          , http://www.asis.org/~iasummit/2006/files/175_Presentation_Desc.pdf
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [48]
          <string-name>
            <surname>Quintarelli</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Resmini</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Rosati</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>FaceTag: Integration Bottom-up and Top-Down Classification in a Social Tagging System</article-title>
          ,
          <source>Bulletin of American Society for Information Science and Technology Juni/July</source>
          <year>2007</year>
          .
          <fpage>10</fpage>
          -
          <lpage>15</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [49]
          <string-name>
            <surname>Razavi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Iverson</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>Improving Personal Privacy in Social Systems with People-Tagging</article-title>
          ,
          <source>Conference on Supporting Group Work Proceedings of the ACM 2009 international conference on supporting group work Sanibel Island</source>
          , Florida, USA.
          <fpage>11</fpage>
          -
          <lpage>20</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [50]
          <string-name>
            <surname>Sen</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lam</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rashid</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Cosley</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Frankowski</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Osterhouse</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harper</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Riedl</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2006</year>
          )
          <article-title>tagging</article-title>
          , communities, vocabulary, evolution,
          <source>Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work , Alberta</source>
          ,
          <fpage>181</fpage>
          -
          <lpage>190</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [51]
          <string-name>
            <surname>Sen</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harper</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>LaPitz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Riedl</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>The Quest for Quality Tags</article-title>
          ,
          <source>Proceedings of the 2007 International ACM Conference on Supporting group work</source>
          , Sanibel Island, Florida, USA.
          <fpage>361</fpage>
          -
          <lpage>370</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [52]
          <string-name>
            <surname>Sinclair</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Cardew-Hall</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2008</year>
          )
          <article-title>The folksonomy tag Cloud: When is it useful</article-title>
          , in
          <source>: Journal of Information Science</source>
          <volume>31</volume>
          (
          <issue>1</issue>
          ) S.
          <fpage>15</fpage>
          -
          <lpage>29</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          [53]
          <string-name>
            <given-names>Smith</given-names>
            <surname>Gene</surname>
          </string-name>
          (
          <year>2008</year>
          )
          <article-title>tagging</article-title>
          .
          <article-title>People-powered Metadata for the social web</article-title>
          .
          <source>AddisonWesley Longman</source>
          . Amsterdam.
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          [54]
          <string-name>
            <surname>Šnuderl</surname>
          </string-name>
          ,
          <string-name>
            <surname>Katja</surname>
          </string-name>
          (
          <year>2008</year>
          )
          <article-title>Tagging: Can user-generated content improve our services?</article-title>
          <source>Statistical Journal of the IAOS</source>
          <volume>25</volume>
          (
          <issue>3</issue>
          -
          <fpage>4</fpage>
          ).
          <fpage>125</fpage>
          -
          <lpage>132</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          [55]
          <string-name>
            <surname>Stock</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Stock</surname>
            .
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2008</year>
          )
          <article-title>Wissensrepräsentation- Informationen auswerten und bereitstellen</article-title>
          , Oldenburg, München.
          <fpage>153</fpage>
          -
          <lpage>176</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          [56]
          <string-name>
            <surname>Thom-Santelli</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Muller</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Millen</surname>
            ,
            <given-names>D..</given-names>
          </string-name>
          (
          <year>2008</year>
          )
          <article-title>Social tagging roles: Publishers, Evangelists, Leaders</article-title>
          .
          <source>In: CHI 2008 Proceedings online social network. 1041-1044</source>
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          [57]
          <string-name>
            <surname>Tonkin</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2006</year>
          )
          <article-title>Searching for the long tail: Hidden structure in social tagging</article-title>
          . In: Furner,
          <string-name>
            <given-names>J.</given-names>
            &amp;
            <surname>Tennis</surname>
          </string-name>
          , J.T. (Eds.)
          <article-title>Proceedings of the 17th Workshop of the American society for information science and technology special interest group in classification research</article-title>
          . Austin, Texas. http://sal.cs.bris.ac.uk/Publications/Papers/2000579.pdf,
          <source>last access 10.05</source>
          .2010
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          [58]
          <string-name>
            <surname>Trant</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>Studying Social Tagging and Folksonomy: A Review and Framework, in: Journal of Digital Information Special Issue on Digital Libraries and User-Generated Content -</article-title>
          <year>2008</year>
          ,
          <volume>10</volume>
          (
          <issue>1</issue>
          )
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          [59]
          <string-name>
            <given-names>Vander</given-names>
            <surname>Wal</surname>
          </string-name>
          ,
          <string-name>
            <surname>T.</surname>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>Optimizing Tagging UI for People &amp; Search</article-title>
          , http://www.personalinfocloud.com/
          <year>2009</year>
          /01/optimizing-tagging
          <article-title>-ui-for-peoplesearch</article-title>
          .html,
          <source>last access 10.05</source>
          .2010
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          [60]
          <string-name>
            <surname>van Loo</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Semeijn</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2004</year>
          )
          <article-title>Definition and measuring Competences: an application to Graduate survey</article-title>
          , Quality &amp; Quantity Kluver Academic Publishers.
          <fpage>331</fpage>
          -
          <lpage>349</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          [61]
          <string-name>
            <surname>von Ahn</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dabbish</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2004</year>
          )
          <article-title>Labeling images with a computergame</article-title>
          .
          <source>ACM Conference on Human Factors in Computing Systems, CHI</source>
          .
          <fpage>319</fpage>
          -
          <lpage>326</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>
          [62]
          <string-name>
            <surname>Voß</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>Tagging, Folksonomy &amp; Co- Renaissance of Manual Indexing? In: Proceedings of the Open Innovation</article-title>
          .
          <source>Proc. 10th International Symposium for information science UVK</source>
          . Constance.
        </mixed-citation>
      </ref>
      <ref id="ref61">
        <mixed-citation>
          [63]
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mao</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Su</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2006</year>
          )
          <article-title>Towards the Semantic Web: Collaborative Tag Suggestions</article-title>
          ,
          <source>in: WWW2006: Proceedings of the Collaborative Web Tagging Workshop</source>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref62">
        <mixed-citation>
          [64]
          <string-name>
            <surname>Zollers</surname>
            ,
            <given-names>A</given-names>
          </string-name>
          (
          <year>2007</year>
          )
          <article-title>Emerging motivations for tagging: expression, performance, and activism</article-title>
          ,. in: WWW Workshop on tagging and
          <article-title>Metadata for Social information organization</article-title>
          ., http://citeseerx.ist.psu.edu/viewdoc/download?doi
          <source>=10.1.1.118.7409&amp;rep=rep1&amp;typ e=pdf., last access 10.05</source>
          .2010
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>