Data Wealth, Data Poverty, Science and Cyberinfrastructure 1
暂无分享,去创建一个
[1] Geoffrey C. Bowker,et al. Understanding infrastructure: History, heuristics and cyberinfrastructure policy , 2007, First Monday.
[2] M. Nedeva,et al. Changing Science: The Advent of Neo‐liberalism , 2006 .
[3] William H. Dutton. Reconfiguring Access to Information and Expertise in the Social Sciences: The Social Shaping and Implications of Cyberinfrastructure ∗ , 2007 .
[4] Rob Procter,et al. Aligning Technical and Human Infrastructures in the Semantic Web: a socio-technical perspective , 2007 .
[5] Karen Ruhleder,et al. Steps Toward an Ecology of Infrastructure: Design and Access for Large Information Spaces , 1996, Inf. Syst. Res..
[6] W. Dutton. The Web of Technology and People: Challenges for Economic and Social Research , 1999 .
[7] Charles Anderson,et al. The end of theory: The data deluge makes the scientific method obsolete , 2008 .
[8] Steve Sawyer,et al. Conceptualizing information, technology, and people: Comparing information science and information systems literatures , 2007, J. Assoc. Inf. Sci. Technol..
[9] D. Edge,et al. The social shaping of technology , 1988 .
[10] Leslie Haddon,et al. The Contribution of Domestication Research to In-Home Computing and Media Consumption , 2006, Inf. Soc..
[11] Michael E. Papka,et al. Integrating cyberinfrastructure into existing e-Social Science research , 2007 .
[12] Cory P. Knobel,et al. Understanding Infrastructure: Dynamics, Tensions, and Design , 2007 .
[13] Les Gasser,et al. Information Infrastructures for Distributed Collective Practices , 2006, Computer Supported Cooperative Work (CSCW).
[14] Wanda J. Orlikowski,et al. Research Commentary: Desperately Seeking the "IT" in IT Research - A Call to Theorizing the IT Artifact , 2001, Inf. Syst. Res..
[15] R. D. Buzzell,et al. The PIMS Principles: Linking Strategy to Performance , 1987 .
[16] Daniel Atkins,et al. Revolutionizing Science and Engineering Through Cyberinfrastructure: Report of the National Science Foundation Blue-Ribbon Advisory Panel on Cyberinfrastructure , 2003 .
[17] John M. Abowd,et al. New Approaches to Confidentiality Protection: Synthetic Data, Remote Access and Research Data Centers , 2004, Privacy in Statistical Databases.
[18] Martha E. Williams,et al. Annual Review of Information Science and Technology , 2008 .
[19] Anne E. Trefethen,et al. The Data Deluge: An e-Science Perspective , 2003 .
[20] B. Clark. Places of Inquiry: Research and Advanced Education in Modern Universities , 1997 .