From facilitating interactivity to managing hyperconnectivity: 50 years of human-computer studies

Abstract Five decades ago advances in integrated circuits and time-sharing operating systems made interactive use of computers economically feasible. Visions of man-computer symbiosis and the augmentation of man’s intellect became realistic research objectives. The initial focus was on facilitating interactivity through improved interface technology, and supporting its application through good practices based on experience and psychological principles. Within a decade technology advances made low cost personal computers commonly available in the home, office and industry, and these were rapidly enhanced with software that made them attractive in a wide range of applications from games to office automation and industrial process control. Within three decades the Internet enabled human–computer interaction to extend across local, national and international networks, and, within four, smartphones and tablets had made access to computers and networks almost ubiquitous to any person, at any time and any place. Banking, commerce, institutional and company operations, utility and government infrastructures, took advantage of, and became dependent on, interactive computer and networking capabilities to such an extent that they have now been assimilated in our society and are taken for granted. This hyperconnectivity has been a major economic driver in the current millennium, but it has also raised new problems as malevolent users anywhere in the world have become able to access and interfere with critical personal, commercial and national resources. A major issue for human–computer studies now is to maintain and enhance functionality, usability and likeability for legitimate users whilst protecting them from malevolent users. Understanding the issues involved requires a far broader consideration of socio-economic issues than was required five decades ago. This article reviews various models of the role of technology in human civilization that can provide insights into our current problematique.

[1]  Brian R. Gaines,et al.  The learning curves underlying convergence , 1998 .

[2]  Brian R. Gaines,et al.  Perspectives on Fifth Generation Computing , 2004 .

[3]  Jerome Kagan,et al.  The Temperamental Thread: How Genes, Culture, Time and Luck make Us Who We Are , 2010 .

[4]  Holly Pittman,et al.  Evolution of Mind, Brain, and Culture , 2013 .

[5]  Jean Piaget,et al.  L'équilibration des structures cognitives : problème central du développement , 1975 .

[6]  Tom Standage The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century's On-line Pioneers , 1998 .

[7]  Norman H. Lehrer,et al.  Recent progress on a high-resolution, meshless, direct-view storage tube , 1966, AFIPS '66 (Fall).

[8]  P. K. Rao The Economics of Transaction Costs: Theory, Methods and Applications , 2002 .

[9]  David B. Yoffie,et al.  Competing in the Age of Digital Convergence , 1997 .

[10]  Donald A. Norman,et al.  Affordance, conventions, and design , 1999, INTR.

[11]  Gerwin Schalk,et al.  Brain–computer symbiosis , 2008, Journal of neural engineering.

[12]  U. Pesch,et al.  Fictions and frictions: Promises, transaction costs and the innovation of network technologies , 2019, Social studies of science.

[13]  T Vickers Computer Augmentation of Human Reasoning , 1966 .

[14]  Elinor Harris Solomon Virtual Money: Understanding the Power and Risks of Money's High-Speed Journey into Electronic Space , 1997 .

[15]  R. Malik,et al.  The viewdata revolution , 1979 .

[16]  Jeffrey Carr,et al.  Inside cyber warfare , 2011 .

[17]  Michael R. Williams,et al.  A history of computing technology , 1985 .

[18]  Barry Wellman,et al.  Networked: The New Social Operating System , 2012 .

[19]  M. Mcluhan Understanding Media: The Extensions of Man , 1964 .

[20]  Thierry Bardini,et al.  Bootstrapping: Douglas Engelbart, coevolution, and the origins of personal computing , 2000 .

[21]  Brian Kahin,et al.  Coordinating the Internet , 1997 .

[22]  A. Sachs,et al.  Mathematical Cuneiform Texts. , 1946 .

[23]  J. Hoffecker,et al.  The Information Animal and the Super-brain , 2013 .

[24]  danah boyd,et al.  It's Complicated: The Social Lives of Networked Teens , 2014 .

[25]  Lee Altenberg,et al.  Genome Growth and the Evolution of the Genotype-Phenotype Map , 1995, Evolution and Biocomputation.

[26]  Brian Winston,et al.  Media,Technology and Society : A History: From the Telegraph to the Internet , 1998 .

[27]  John L. Holland,et al.  Exploring careers with a typology: What we have learned and some new directions. , 1996 .

[28]  Stella C. Chia Seeking Justice on the Web: How News Media and Social Norms Drive the Practice of Cyber Vigilantism , 2019, Social Science Computer Review.

[29]  Guido Möllering,et al.  Handbook of Research Methods on Trust , 2012 .

[30]  James Hampden Howard,et al.  Electronic information display systems , 1963 .

[31]  M. V. Simkin,et al.  Theory of citing , 2011, 1109.2272.

[32]  George Veletsianos,et al.  Higher education scholars' participation and practices on Twitter , 2012, J. Comput. Assist. Learn..

[33]  Nigel Shadbolt,et al.  Knowledge acquisition and the rise of social machines , 2013, Int. J. Hum. Comput. Stud..

[34]  Katherine M. White,et al.  In Their Own Words: Why Teenagers Don't Use Social Networking Sites , 2011, Cyberpsychology Behav. Soc. Netw..

[35]  Lisa Jardine,et al.  Worldly Goods: A New History of the Renaissance , 1996 .

[36]  R. Dawes,et al.  A Conceptual Review of Decision Making in Social Dilemmas: Applying a Logic of Appropriateness , 2004, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.

[37]  Henry Chesbrough,et al.  How open innovation can help you cope in lean times. , 2009 .

[38]  Marshall T. Poe,et al.  A History of Communications: Media and Society from the Evolution of Speech to the Internet , 2010 .

[39]  E. Hall The Silent Language , 1959 .

[40]  Babak Akhgar,et al.  Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities , 2016 .

[41]  A. J. Meadows Communication in science , 1974 .

[42]  James R. Beniger The Control Revolution: Technological and Economic Origins of the Information Society , 1986 .

[43]  Michael Erbschloe Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code , 2004 .

[44]  Chris Stringer,et al.  Modern human origins: progress and prospects. , 2002, Philosophical transactions of the Royal Society of London. Series B, Biological sciences.

[45]  Peter J. Huber,et al.  Ancient astronomy and celestial divination , 2001 .

[46]  Joseph Weizenbaum On-line user languages , 1966 .

[47]  Eva Jablonka,et al.  Transformations of Lamarckism: From Subtle Fluids to Molecular Biology , 2011 .

[48]  Amy Nicole Langville,et al.  Google's PageRank and beyond - the science of search engine rankings , 2006 .

[49]  B. Vickery Scientific Communication in History , 2000 .

[50]  Graeme Donald Snooks,et al.  THE DYNAMIC SOCIETY: Exploring the sources of global change , 1996 .

[51]  Brian R. Gaines,et al.  A Conceptual Framework for Person-Computer Interaction in Distributed Systems , 1988 .

[52]  O. Williamson,et al.  The mechanisms of governance , 1996 .

[53]  Sumit Ghosh,et al.  Cybercrimes: A Multidisciplinary Analysis , 2011 .

[54]  Jan A.G.M. van Dijk,et al.  The network society , 1997 .

[55]  J. McCarthy,et al.  A time-sharing debugging system for a small computer , 1899, AFIPS Spring Joint Computing Conference.

[56]  Brian Shackel,et al.  Usability - Context, framework, definition, design and evaluation , 1991, Interact. Comput..

[57]  Peter Damerow,et al.  Archaic Bookkeeping: Early Writing and Techniques of Economic Administration in the Ancient Near East , 1994 .

[58]  J. Searle Mind, Language, And Society: Philosophy In The Real World , 1998 .

[59]  Brian R. Gaines,et al.  A learning model for forecasting the future of information technology , 1986 .

[60]  A. Korotayev A Compact Macromodel of World System Evolution , 2005 .

[61]  Michael N. Huhns,et al.  Robust Software , 2002, IEEE Internet Comput..

[62]  Brian R. Gaines,et al.  Stochastic computing , 1967, AFIPS '67 (Spring).

[63]  Evgeny V. Morozov,et al.  Liberation Technology: Whither Internet Control? , 2011 .

[64]  Malcolm McCullough Book Review: Ambient Commons: Attention in the Age of Embodied Information , 2013 .

[65]  Diane Coyle,et al.  The weightless world: strategies for managing the digital economy , 1999 .

[66]  E. Eisenstein The printing press as an agent of change : communications and cultural transformations in early-modern Europe : volumes I and II , 1980 .

[67]  Tim Owen,et al.  New Perspectives on Cybercrime , 2017 .

[68]  R. Kurzweil,et al.  The Singularity Is Near: When Humans Transcend Biology , 2006 .

[69]  M. Vanhaeren,et al.  Archaeological Evidence for the Emergence of Language, Symbolism, and Music–An Alternative Multidisciplinary Perspective , 2003 .

[70]  D. L. Bitzer,et al.  The plasma display panel: a digitally addressable display with inherent memory , 1899, AFIPS '66 (Fall).

[71]  Chiungjung Huang,et al.  Social network site use and Big Five personality traits: A meta-analysis , 2019, Comput. Hum. Behav..

[72]  Joseph M. Hatfield Social engineering in cybersecurity: The evolution of a concept , 2018, Comput. Secur..

[73]  E. C. Lallana,et al.  The Information Age , 2014 .

[74]  James Martin After the Internet: Alien Intelligence , 2000 .

[75]  Etienne Wenger,et al.  Communities of Practice: Learning, Meaning, and Identity , 1998 .

[76]  Xiaotian Yang,et al.  An investigation of non-use and abandonment of microblogging , 2012, Seventh International Conference on Digital Information Management (ICDIM 2012).

[77]  A. Maslow Motivation and Personality , 1954 .

[78]  R. Boyd,et al.  Culture and the evolution of human cooperation , 2009, Philosophical Transactions of the Royal Society B: Biological Sciences.

[79]  Michael Friedewald,et al.  Safeguards in a world of ambient intelligence , 2008 .

[80]  T. P. Hughes,et al.  The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology , 1989 .

[81]  Heiner Ganβmann,et al.  Money — a symbolically generalized medium of communication? On the concept of money in recent sociology ∗ , 1988 .

[82]  Andrea Manica,et al.  A geographically explicit genetic model of worldwide human-settlement history. , 2006, American journal of human genetics.

[83]  Samuel C. McQuade Encyclopedia of Cybercrime , 2008 .

[84]  J. Henrich,et al.  The weirdest people in the world? , 2010, Behavioral and Brain Sciences.

[85]  J. Lewis-Williams The mind in the cave : consciousness and the origins of art , 2002 .

[86]  Jeremy Freese,et al.  The evolution of human sociality : a Darwinian conflict perspective , 2002 .

[87]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[88]  Tatiana Tropina,et al.  Self- and Co-regulation in Cybercrime, Cybersecurity and National Security , 2015, SpringerBriefs in Cybersecurity.

[89]  Jeffrey M. Bradshaw From knowledge science to symbiosis science , 2013, Int. J. Hum. Comput. Stud..

[90]  W. B. Wriston Bits, Bytes, and Diplomacy , 1997 .

[91]  Haralambos Mouratidis,et al.  Safety and Security in Multiagent Systems , 2009 .

[92]  I. Pool,et al.  The Social Impact of the Telephone , 1978 .

[93]  Kenneth C. Laudon,et al.  E-commerce: Business, Technology, Society , 2002 .

[94]  P. Stoneman,et al.  The Economic Analysis of Technological Change , 1983 .

[95]  Edgar R. Weippl,et al.  Advanced social engineering attacks , 2015, J. Inf. Secur. Appl..

[96]  A. Thornton,et al.  Identifying teaching in wild animals , 2010, Learning & behavior.

[97]  J. Abbate,et al.  Inventing the Internet , 1999 .

[98]  K Rupp,et al.  The Economic Limit to Moore's Law , 2011, IEEE Transactions on Semiconductor Manufacturing.

[99]  Daniel M. Laby Apple II , 2000, Science.

[100]  C. Marchetti,et al.  Society as a Learning System : Discovery, Invention, and Innovation Cycles Revisited : Technological Forecasting and Social Change , 1980 .

[101]  Aboul Ella Hassanien,et al.  Brain-Computer Interfaces - Current Trends and Applications , 2014, rain-Computer Interfaces.

[102]  U. Fischbacher,et al.  Social norms and human cooperation , 2004, Trends in Cognitive Sciences.

[103]  David D. Clark Designing an Internet , 2018 .

[104]  Kim Sterelny,et al.  From hominins to humans: how sapiens became behaviourally modern , 2011, Philosophical Transactions of the Royal Society B: Biological Sciences.

[105]  Loy A. Singleton Global Impact: The New Telecommunication Technologies , 1989 .

[106]  Cristina Elena Turcu,et al.  The 2 nd International Conference on Integrated Information Internet of Things as Key Enabler for Sustainable Healthcare Delivery , 2013 .

[107]  L. Winner Autonomous Technology: Technics-out-of-Control as a Theme in Political Thought , 1977 .

[108]  Geoffrey Hindley A history of roads , 1971 .

[109]  Eleanor Robson,et al.  Mathematics in Ancient Iraq: A Social History , 2008 .

[110]  Finn Brunton Spam: A Shadow History of the Internet , 2013 .

[111]  Burton Grad,et al.  The Creation and the Demise of VisiCalc , 2007, IEEE Annals of the History of Computing.

[112]  J. Tainter The Collapse of Complex Societies , 1988 .

[113]  Zeynep Tufekci GROOMING, GOSSIP, FACEBOOK AND MYSPACE , 2008 .

[114]  L. Floridi The Onlife Manifesto: Being Human in a Hyperconnected Era , 2014 .

[115]  Jeff Howe,et al.  Crowdsourcing: Why the Power of the Crowd Is Driving the Future of Business , 2008, Human Resource Management International Digest.

[116]  Herman H. Goldstine The Computer from Pascal to von Neumann , 1972 .

[117]  John Joseph Fahie,et al.  A history of electric telegraphy to the year 1837 , 1884 .

[118]  Ethan Mollick,et al.  Establishing Moore's Law , 2006, IEEE Annals of the History of Computing.

[119]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[120]  Mari Carmen Domingo,et al.  An overview of the Internet of Things for people with disabilities , 2012, J. Netw. Comput. Appl..

[121]  Shoshana Zuboff The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power , 2019 .

[122]  Florian Michahelles,et al.  Architecting the Internet of Things , 2011 .

[123]  Brian R. Gaines,et al.  Modeling and forecasting the information sciences , 1991, Inf. Sci..

[124]  Bernard Peters,et al.  Security considerations in a multi-programmed computer system , 1967, AFIPS '67 (Spring).

[125]  A. Brooks,et al.  The revolution that wasn't: a new interpretation of the origin of modern human behavior. , 2000, Journal of human evolution.

[126]  Lionel Casson,et al.  Travel in the Ancient World , 1974 .

[127]  A. Zaheer,et al.  Handbook of Trust Research , 2006 .

[128]  Douglas F. Parkhill,et al.  The Challenge of the Computer Utility , 1966 .

[129]  E. Tenner Why things bite back : technology and the revenge of unintended consequences , 1996 .

[130]  Marianne Junger,et al.  Priming and warnings are not effective to prevent social engineering attacks , 2017, Comput. Hum. Behav..

[131]  James Martin,et al.  The Wired Society , 1978 .

[132]  Jennifer Chu-Carroll,et al.  Building Watson: An Overview of the DeepQA Project , 2010, AI Mag..

[133]  Michael Swaine,et al.  Fire in the Valley: The Making of the Personal Computer , 1984 .

[134]  Braden Allenby Designer warriors: Altering conflict—and humanity itself? , 2018, Bulletin of the Atomic Scientists.

[135]  Revital Marom,et al.  The Promise and Peril of Hyperconnectivity for Organizations and Societies , 2012 .

[136]  Graeme Donald Snooks,et al.  The laws of history , 1998 .

[137]  Walter J. Karplus On-line computing : time-shared man-computer systems , 1967 .

[138]  Susan Oyama The Ontogeny of Information: Developmental Systems and Evolution , 2000 .

[139]  Dominique Carré,et al.  Hyperconnectivity: Economical, Social and Environmental Challenges , 2018 .

[140]  Robert U. Ayres,et al.  Information, Entropy, and Progress: A New Evolutionary Paradigm , 1997 .

[141]  Brian R. Gaines,et al.  The collective stance in modeling expertise in individuals and organizations , 1994 .

[142]  Brian R. Gaines,et al.  Organizational Knowledge Acquisition , 2004 .

[143]  E. Wilson,et al.  The Social Conquest of Earth , 2013 .

[144]  Alex Csiszar,et al.  The Scientific Journal: Authorship and the Politics of Knowledge in the Nineteenth Century , 2018 .

[145]  R. Coase,et al.  The Firm, the Market, and the Law , 1990 .

[146]  J. Burrell Invisible Users: Youth in the Internet Cafés of Urban Ghana , 2012 .

[147]  H. Peyton Young,et al.  The Evolution of Social Norms , 2015 .

[148]  H. Farrell The Consequences of the Internet for Politics , 2012 .

[149]  Jorge Luis Borges Ficciones (1935-1944) , 1944 .

[150]  Paul van Schaik,et al.  The design and evaluation of a theory-based intervention to promote security behaviour against phishing , 2019, Int. J. Hum. Comput. Stud..

[151]  Jack Kelly Gunpowder: Alchemy, Bombards, And Pyrotechnics: The History Of The Explosive That Changed The World , 2004 .

[152]  Lillian Hoddeson,et al.  Crystal Fire: The Birth of the Information Age , 1998 .

[153]  Geert Hofstede,et al.  National Cultures in Four Dimensions: A Research-Based Theory of Cultural Differences among Nations , 1983 .

[154]  Jennifer Daryl Slack,et al.  The Ideology of the Information Age , 1987 .

[155]  Don Tapscott,et al.  Grown Up Digital: How the Net Generation is Changing Your World , 2008 .

[156]  M. Heithaus,et al.  Individuals as information sources: Could followers benefit from leaders’ knowledge? , 2013 .

[157]  M. D. Mey The Cognitive Paradigm , 1992 .

[158]  Chris Stringer,et al.  Using genetic evidence to evaluate four palaeoanthropological hypotheses for the timing of Neanderthal and modern human origins. , 2010, Journal of human evolution.

[159]  R. C. O. Matthews,et al.  The Long Wave in Economic Life. , 1982 .

[160]  Karine E Silva,et al.  Vigilantism and cooperative criminal justice:: Is there a place for cybersecurity vigilantes in cybercrime fighting , 2018 .

[161]  Brian R. Gaines,et al.  Sixth generation computing: a conspectus of the Japanese proposals , 1986, SGAR.

[162]  Alessandro Vespignani,et al.  Evolution and Structure of the Internet: A Statistical Physics Approach , 2004 .

[163]  Albert Y. Zomaya,et al.  Grid Computing for Bioinformatics and Computational Biology , 2007, Wiley series on bioinformatics.

[164]  Hein S. Venter,et al.  Social engineering attack examples, templates and scenarios , 2016, Comput. Secur..

[165]  Marshall McLuhan,et al.  The Global Village: Transformations in World Life and Media in the 21st Century , 1989 .

[166]  Chihiro Suematsu Transaction Cost Management: Strategies and Practices for a Global Open Economy , 2014 .

[167]  Joseph Weizenbaum,et al.  and Machine , 1977 .

[168]  B.R. Gaines,et al.  Some experience in interactive system development and application , 1975, Proceedings of the IEEE.

[169]  D. Morris,et al.  A General Translation Program for Phrase Structure Languages , 1962, JACM.

[170]  Wei Xu,et al.  Study and Application of Typical Disaster Monitoring and Early Warning System in Metal Mine , 2012 .

[171]  Brian Merchant,et al.  The One Device: The Secret History of the iPhone , 2017 .

[172]  Joseph N. Pelton,et al.  Smart Cities of Today and Tomorrow , 2018 .

[173]  George Basalla,et al.  The Evolution of Technology: Selection (2): Social and Cultural Factors , 1989 .

[174]  E. Jablonka,et al.  Evolution in Four Dimensions: Genetic, Epigenetic, Behavioral, and Symbolic Variation in the History of Life , 2005 .

[175]  J. B. Strother,et al.  Information Overload: An International Challenge for Professional Engineers and Technical Communicators , 2012 .

[176]  Tonio Adam Andrade,et al.  The Gunpowder Age: China, Military Innovation, and the Rise of the West in World History , 2016 .

[177]  J. C. R. Licklider,et al.  Man-Computer Symbiosis , 1960 .

[178]  Kai Riemer,et al.  Social Transactions on Social Network Sites: Can Transaction Cost Theory Contribute to a Better Understanding of Internet Social Networking? , 2010, Bled eConference.

[179]  Christian Damsgaard Jensen,et al.  The Role of Identity in Pervasive Computational Trust , 2005 .

[180]  Johan Galtung,et al.  Human needs: A contribution to the current debate , 1980 .

[181]  William H. Dutton,et al.  Cultural divides and digital inequalities: attitudes shaping Internet and social media divides* , 2017 .

[182]  Paulina Wu,et al.  Impossible to Regulate: Social Media, Terrorists, and the Role for the U.N. , 2015 .

[183]  Pamela Briggs,et al.  Using protection motivation theory in the design of nudges to improve online security behavior , 2019, Int. J. Hum. Comput. Stud..

[184]  J. Ganascia Views and Examples on Hyper-Connectivity , 2015 .

[185]  Woodrow Hartzog,et al.  Privacy’s Blueprint: The Battle to Control the Design of New Technologies , 2018 .

[186]  J. Vernant,et al.  Ancestor of the West: Writing, Reasoning and Religion in Mesopotamia, Elam and Greece. , 2001 .

[187]  H. Paul Shuch,et al.  Searching for Extraterrestrial Intelligence: SETI Past, Present, and Future , 2013 .

[188]  William H. McNeill,et al.  The Human Web: A Bird's-Eye View of World History , 2003 .

[189]  Pierre Lévy,et al.  Collective Intelligence: Mankind's Emerging World in Cyberspace , 1997 .

[190]  T. Nam,et al.  Understanding the gap between perceived threats to and preparedness for cybersecurity , 2019, Technology in Society.

[191]  Gina Masullo Chen,et al.  Why do women write personal blogs? Satisfying needs for self-disclosure and affiliation tell part of the story , 2012, Comput. Hum. Behav..

[192]  N. Kshetri The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives , 2010 .

[193]  Christos N. Pitelis,et al.  Transaction Costs, Markets and Hierarchies , 1994 .

[194]  D. Flaherty Protecting privacy in surveillance societies: the federal republic of germany , 1989 .

[195]  Dimitra I. Kaklamani,et al.  Improving Quality of Life with the Internet of Everything , 2017 .

[196]  Diana Crane,et al.  Invisible colleges. Diffusion of knowledge in scientific communities , 1972, Medical History.

[197]  Thomas R. Gruber Nature, nurture, and knowledge acquisition , 2013, Int. J. Hum. Comput. Stud..

[198]  Adil Al-Yasiri,et al.  Privacy, Trust and Identity in Pervasive Computing: A Review of Technical Challenges and Future Research Directions , 2012, ArXiv.

[199]  Nadine Schuurman,et al.  Tweet Me Your Talk: Geographical Learning and Knowledge Production 2.0 , 2013 .

[200]  H. Gintis,et al.  A Cooperative Species: Human Reciprocity and Its Evolution , 2011 .

[201]  K. Montgomery Generation Digital: Politics, Commerce, and Childhood in the Age of the Internet , 2007 .

[202]  P. Ehrlich,et al.  Can a collapse of global civilization be avoided? , 2013, Proceedings of the Royal Society B: Biological Sciences.

[203]  M. Hobart,et al.  Information Ages: Literacy, Numeracy, and the Computer Revolution , 1998 .

[204]  Tim Bergin,et al.  The Origins of Word Processing Software for Personal Computers: 1976-1985 , 2006, IEEE Annals of the History of Computing.

[205]  J. Shotter Agentive spaces, the "background", and other not well articulated influences in shaping our lives , 2013 .

[206]  Norman F. Cantor,et al.  In the Wake of the Plague , 2001 .

[207]  Lee David Schur Time-shared computer languages: An introduction to conversational computing , 1973 .

[208]  James W. Cortada,et al.  Before the Computer: IBM, NCR, Burroughs, and Remington Rand and the Industry They Created, 1865-1956 , 1994 .

[209]  Bradley L. Kirkman,et al.  A quarter century of Culture's Consequences: a review of empirical research incorporating Hofstede's cultural values framework , 2006 .

[210]  Tommaso Bertolotti,et al.  Facebook Has It: The Irresistible Violence of Social Cognition in the Age of Social Networking , 2011, Int. J. Technoethics.

[211]  Tal Z. Zarsky,et al.  Social Justice, Social Norms and the Governance of Social Media , 2015 .

[212]  John Gallaugher,et al.  Social Media and Customer Dialog Management at Starbucks , 2010, MIS Q. Executive.

[213]  W. Dizard The coming information age : an overview of technology, economics, and politics , 1982 .

[214]  Jerzy A. Wojciechowski Ecology of Knowledge , 2001 .

[215]  Akbar Zaheer,et al.  Handbook of Advances in Trust Research , 2013 .

[216]  M. Pigliucci,et al.  Evolution, the Extended Synthesis , 2010 .

[217]  Glyn Lawson,et al.  Exploring Interpretations of Data from the Internet of Things in the Home , 2013, Interacting with computers.

[218]  Christopher Krügel,et al.  A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.

[219]  Brian R. Gaines,et al.  Knowledge acquisition: Past, present and future , 2013, Int. J. Hum. Comput. Stud..

[220]  Guglielmo Lanzani,et al.  A hybrid bioorganic interface for neuronal photoactivation. , 2011, Nature communications.

[221]  Biz Stone,et al.  Who Let the Blogs Out?: A Hyperconnected Peek at the World of Weblogs , 2004 .

[222]  Richard Ling,et al.  Taken for Grantedness: The Embedding of Mobile Communication into Society , 2012 .

[223]  R. Coase The Nature of the Firm , 1937 .

[224]  Adam N. Joinson,et al.  Exploring susceptibility to phishing in the workplace , 2018, International Journal of Human-Computer Studies.

[225]  Peggy Aldrich Kidwell,et al.  Landmarks in digital computing : a Smithsonian pictorial history , 1995 .

[226]  Selin Kesebir,et al.  The Superorganism Account of Human Sociality , 2012, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.

[227]  Daniel R. Headrick,et al.  When Information Came of Age: Technologies of Knowledge in the Age of Reason and Revolution, 1700-1850 , 2000 .

[228]  W. Mcneill Plagues and Peoples , 1977, The Review of Politics.

[229]  Y. Gingras Mapping the structure of the intellectual field using citation and co-citation analysis of correspondences , 2010 .

[230]  Douglas C. Engelbart,et al.  A conceptual framework for the augmentation of man's intellect , 1988 .

[231]  M. Castells The rise of the network society , 1996 .

[232]  S. Hsi,et al.  Crowdsourcing and Curating Online Education Resources , 2013, Science.

[233]  Richard Joyce,et al.  Cooperation and its Evolution , 2013 .

[234]  Robert C. Daley,et al.  An experimental time-sharing system , 1962, AIEE-IRE '62 (Spring).

[235]  D. Bickerton Language and Species , 1990 .

[236]  L. Harper,et al.  Epigenetic inheritance and the intergenerational transfer of experience. , 2005, Psychological bulletin.

[237]  Olga M. Khessina,et al.  It’s time to sober up: The direct costs, side effects and long-term consequences of creativity and innovation , 2018 .

[238]  D. Trottier Digital Vigilantism as Weaponisation of Visibility , 2017 .

[239]  Antoinette Rouvroy,et al.  Privacy, Data Protection, and the Unprecedented Challenges of Ambient Intelligence , 2007 .

[240]  Brian R. Gaines,et al.  HCI in the Next Millennium: Supporting the World Mind , 1999, INTERACT.

[241]  Kimball Fisher,et al.  The Distributed Mind: Achieving High Performance Through the Collective Intelligence of Knowledge Work Teams , 1997 .

[242]  Colin Potts,et al.  Design of Everyday Things , 1988 .

[243]  Yujia Peng,et al.  Brain-Computer Interface for Cyberpsychology , 2019, Analyzing Human Behavior in Cyberspace.

[244]  W. Noble,et al.  Human Evolution, Language and Mind: A Psychological and Archaeological Inquiry , 1996 .

[245]  Efrem Sigel,et al.  Videotext : the coming revolution in home/office information retrieval , 1980 .

[246]  Lewis Carroll,et al.  Alice Through the Looking-Glass and What Alice Found There , 1871 .

[247]  A. Gardner,et al.  Sixteen common misconceptions about the evolution of cooperation in humans , 2011 .

[248]  Barney Warf,et al.  Geographies of global Internet censorship , 2011 .

[249]  Sharad Malik,et al.  Morpheus: A Vulnerability-Tolerant Secure Architecture Based on Ensembles of Moving Target Defenses with Churn , 2019, ASPLOS.

[250]  Geoff Emberling,et al.  Visible language : inventions of writing in the ancient Middle East and beyond , 2010 .