From facilitating interactivity to managing hyperconnectivity: 50 years of human-computer studies
暂无分享,去创建一个
[1] Brian R. Gaines,et al. The learning curves underlying convergence , 1998 .
[2] Brian R. Gaines,et al. Perspectives on Fifth Generation Computing , 2004 .
[3] Jerome Kagan,et al. The Temperamental Thread: How Genes, Culture, Time and Luck make Us Who We Are , 2010 .
[4] Holly Pittman,et al. Evolution of Mind, Brain, and Culture , 2013 .
[5] Jean Piaget,et al. L'équilibration des structures cognitives : problème central du développement , 1975 .
[6] Tom Standage. The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century's On-line Pioneers , 1998 .
[7] Norman H. Lehrer,et al. Recent progress on a high-resolution, meshless, direct-view storage tube , 1966, AFIPS '66 (Fall).
[8] P. K. Rao. The Economics of Transaction Costs: Theory, Methods and Applications , 2002 .
[9] David B. Yoffie,et al. Competing in the Age of Digital Convergence , 1997 .
[10] Donald A. Norman,et al. Affordance, conventions, and design , 1999, INTR.
[11] Gerwin Schalk,et al. Brain–computer symbiosis , 2008, Journal of neural engineering.
[12] U. Pesch,et al. Fictions and frictions: Promises, transaction costs and the innovation of network technologies , 2019, Social studies of science.
[13] T Vickers. Computer Augmentation of Human Reasoning , 1966 .
[14] Elinor Harris Solomon. Virtual Money: Understanding the Power and Risks of Money's High-Speed Journey into Electronic Space , 1997 .
[15] R. Malik,et al. The viewdata revolution , 1979 .
[16] Jeffrey Carr,et al. Inside cyber warfare , 2011 .
[17] Michael R. Williams,et al. A history of computing technology , 1985 .
[18] Barry Wellman,et al. Networked: The New Social Operating System , 2012 .
[19] M. Mcluhan. Understanding Media: The Extensions of Man , 1964 .
[20] Thierry Bardini,et al. Bootstrapping: Douglas Engelbart, coevolution, and the origins of personal computing , 2000 .
[21] Brian Kahin,et al. Coordinating the Internet , 1997 .
[22] A. Sachs,et al. Mathematical Cuneiform Texts. , 1946 .
[23] J. Hoffecker,et al. The Information Animal and the Super-brain , 2013 .
[24] danah boyd,et al. It's Complicated: The Social Lives of Networked Teens , 2014 .
[25] Lee Altenberg,et al. Genome Growth and the Evolution of the Genotype-Phenotype Map , 1995, Evolution and Biocomputation.
[26] Brian Winston,et al. Media,Technology and Society : A History: From the Telegraph to the Internet , 1998 .
[27] John L. Holland,et al. Exploring careers with a typology: What we have learned and some new directions. , 1996 .
[28] Stella C. Chia. Seeking Justice on the Web: How News Media and Social Norms Drive the Practice of Cyber Vigilantism , 2019, Social Science Computer Review.
[29] Guido Möllering,et al. Handbook of Research Methods on Trust , 2012 .
[30] James Hampden Howard,et al. Electronic information display systems , 1963 .
[31] M. V. Simkin,et al. Theory of citing , 2011, 1109.2272.
[32] George Veletsianos,et al. Higher education scholars' participation and practices on Twitter , 2012, J. Comput. Assist. Learn..
[33] Nigel Shadbolt,et al. Knowledge acquisition and the rise of social machines , 2013, Int. J. Hum. Comput. Stud..
[34] Katherine M. White,et al. In Their Own Words: Why Teenagers Don't Use Social Networking Sites , 2011, Cyberpsychology Behav. Soc. Netw..
[35] Lisa Jardine,et al. Worldly Goods: A New History of the Renaissance , 1996 .
[36] R. Dawes,et al. A Conceptual Review of Decision Making in Social Dilemmas: Applying a Logic of Appropriateness , 2004, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.
[37] Henry Chesbrough,et al. How open innovation can help you cope in lean times. , 2009 .
[38] Marshall T. Poe,et al. A History of Communications: Media and Society from the Evolution of Speech to the Internet , 2010 .
[39] E. Hall. The Silent Language , 1959 .
[40] Babak Akhgar,et al. Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities , 2016 .
[41] A. J. Meadows. Communication in science , 1974 .
[42] James R. Beniger. The Control Revolution: Technological and Economic Origins of the Information Society , 1986 .
[43] Michael Erbschloe. Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code , 2004 .
[44] Chris Stringer,et al. Modern human origins: progress and prospects. , 2002, Philosophical transactions of the Royal Society of London. Series B, Biological sciences.
[45] Peter J. Huber,et al. Ancient astronomy and celestial divination , 2001 .
[46] Joseph Weizenbaum. On-line user languages , 1966 .
[47] Eva Jablonka,et al. Transformations of Lamarckism: From Subtle Fluids to Molecular Biology , 2011 .
[48] Amy Nicole Langville,et al. Google's PageRank and beyond - the science of search engine rankings , 2006 .
[49] B. Vickery. Scientific Communication in History , 2000 .
[50] Graeme Donald Snooks,et al. THE DYNAMIC SOCIETY: Exploring the sources of global change , 1996 .
[51] Brian R. Gaines,et al. A Conceptual Framework for Person-Computer Interaction in Distributed Systems , 1988 .
[52] O. Williamson,et al. The mechanisms of governance , 1996 .
[53] Sumit Ghosh,et al. Cybercrimes: A Multidisciplinary Analysis , 2011 .
[54] Jan A.G.M. van Dijk,et al. The network society , 1997 .
[55] J. McCarthy,et al. A time-sharing debugging system for a small computer , 1899, AFIPS Spring Joint Computing Conference.
[56] Brian Shackel,et al. Usability - Context, framework, definition, design and evaluation , 1991, Interact. Comput..
[57] Peter Damerow,et al. Archaic Bookkeeping: Early Writing and Techniques of Economic Administration in the Ancient Near East , 1994 .
[58] J. Searle. Mind, Language, And Society: Philosophy In The Real World , 1998 .
[59] Brian R. Gaines,et al. A learning model for forecasting the future of information technology , 1986 .
[60] A. Korotayev. A Compact Macromodel of World System Evolution , 2005 .
[61] Michael N. Huhns,et al. Robust Software , 2002, IEEE Internet Comput..
[62] Brian R. Gaines,et al. Stochastic computing , 1967, AFIPS '67 (Spring).
[63] Evgeny V. Morozov,et al. Liberation Technology: Whither Internet Control? , 2011 .
[64] Malcolm McCullough. Book Review: Ambient Commons: Attention in the Age of Embodied Information , 2013 .
[65] Diane Coyle,et al. The weightless world: strategies for managing the digital economy , 1999 .
[66] E. Eisenstein. The printing press as an agent of change : communications and cultural transformations in early-modern Europe : volumes I and II , 1980 .
[67] Tim Owen,et al. New Perspectives on Cybercrime , 2017 .
[68] R. Kurzweil,et al. The Singularity Is Near: When Humans Transcend Biology , 2006 .
[69] M. Vanhaeren,et al. Archaeological Evidence for the Emergence of Language, Symbolism, and Music–An Alternative Multidisciplinary Perspective , 2003 .
[70] D. L. Bitzer,et al. The plasma display panel: a digitally addressable display with inherent memory , 1899, AFIPS '66 (Fall).
[71] Chiungjung Huang,et al. Social network site use and Big Five personality traits: A meta-analysis , 2019, Comput. Hum. Behav..
[72] Joseph M. Hatfield. Social engineering in cybersecurity: The evolution of a concept , 2018, Comput. Secur..
[73] E. C. Lallana,et al. The Information Age , 2014 .
[74] James Martin. After the Internet: Alien Intelligence , 2000 .
[75] Etienne Wenger,et al. Communities of Practice: Learning, Meaning, and Identity , 1998 .
[76] Xiaotian Yang,et al. An investigation of non-use and abandonment of microblogging , 2012, Seventh International Conference on Digital Information Management (ICDIM 2012).
[77] A. Maslow. Motivation and Personality , 1954 .
[78] R. Boyd,et al. Culture and the evolution of human cooperation , 2009, Philosophical Transactions of the Royal Society B: Biological Sciences.
[79] Michael Friedewald,et al. Safeguards in a world of ambient intelligence , 2008 .
[80] T. P. Hughes,et al. The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology , 1989 .
[81] Heiner Ganβmann,et al. Money — a symbolically generalized medium of communication? On the concept of money in recent sociology ∗ , 1988 .
[82] Andrea Manica,et al. A geographically explicit genetic model of worldwide human-settlement history. , 2006, American journal of human genetics.
[83] Samuel C. McQuade. Encyclopedia of Cybercrime , 2008 .
[84] J. Henrich,et al. The weirdest people in the world? , 2010, Behavioral and Brain Sciences.
[85] J. Lewis-Williams. The mind in the cave : consciousness and the origins of art , 2002 .
[86] Jeremy Freese,et al. The evolution of human sociality : a Darwinian conflict perspective , 2002 .
[87] John Leubsdorf,et al. Privacy and Freedom , 1968 .
[88] Tatiana Tropina,et al. Self- and Co-regulation in Cybercrime, Cybersecurity and National Security , 2015, SpringerBriefs in Cybersecurity.
[89] Jeffrey M. Bradshaw. From knowledge science to symbiosis science , 2013, Int. J. Hum. Comput. Stud..
[90] W. B. Wriston. Bits, Bytes, and Diplomacy , 1997 .
[91] Haralambos Mouratidis,et al. Safety and Security in Multiagent Systems , 2009 .
[92] I. Pool,et al. The Social Impact of the Telephone , 1978 .
[93] Kenneth C. Laudon,et al. E-commerce: Business, Technology, Society , 2002 .
[94] P. Stoneman,et al. The Economic Analysis of Technological Change , 1983 .
[95] Edgar R. Weippl,et al. Advanced social engineering attacks , 2015, J. Inf. Secur. Appl..
[96] A. Thornton,et al. Identifying teaching in wild animals , 2010, Learning & behavior.
[97] J. Abbate,et al. Inventing the Internet , 1999 .
[98] K Rupp,et al. The Economic Limit to Moore's Law , 2011, IEEE Transactions on Semiconductor Manufacturing.
[99] Daniel M. Laby. Apple II , 2000, Science.
[100] C. Marchetti,et al. Society as a Learning System : Discovery, Invention, and Innovation Cycles Revisited : Technological Forecasting and Social Change , 1980 .
[101] Aboul Ella Hassanien,et al. Brain-Computer Interfaces - Current Trends and Applications , 2014, rain-Computer Interfaces.
[102] U. Fischbacher,et al. Social norms and human cooperation , 2004, Trends in Cognitive Sciences.
[103] David D. Clark. Designing an Internet , 2018 .
[104] Kim Sterelny,et al. From hominins to humans: how sapiens became behaviourally modern , 2011, Philosophical Transactions of the Royal Society B: Biological Sciences.
[105] Loy A. Singleton. Global Impact: The New Telecommunication Technologies , 1989 .
[106] Cristina Elena Turcu,et al. The 2 nd International Conference on Integrated Information Internet of Things as Key Enabler for Sustainable Healthcare Delivery , 2013 .
[107] L. Winner. Autonomous Technology: Technics-out-of-Control as a Theme in Political Thought , 1977 .
[108] Geoffrey Hindley. A history of roads , 1971 .
[109] Eleanor Robson,et al. Mathematics in Ancient Iraq: A Social History , 2008 .
[110] Finn Brunton. Spam: A Shadow History of the Internet , 2013 .
[111] Burton Grad,et al. The Creation and the Demise of VisiCalc , 2007, IEEE Annals of the History of Computing.
[112] J. Tainter. The Collapse of Complex Societies , 1988 .
[113] Zeynep Tufekci. GROOMING, GOSSIP, FACEBOOK AND MYSPACE , 2008 .
[114] L. Floridi. The Onlife Manifesto: Being Human in a Hyperconnected Era , 2014 .
[115] Jeff Howe,et al. Crowdsourcing: Why the Power of the Crowd Is Driving the Future of Business , 2008, Human Resource Management International Digest.
[116] Herman H. Goldstine. The Computer from Pascal to von Neumann , 1972 .
[117] John Joseph Fahie,et al. A history of electric telegraphy to the year 1837 , 1884 .
[118] Ethan Mollick,et al. Establishing Moore's Law , 2006, IEEE Annals of the History of Computing.
[119] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[120] Mari Carmen Domingo,et al. An overview of the Internet of Things for people with disabilities , 2012, J. Netw. Comput. Appl..
[121] Shoshana Zuboff. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power , 2019 .
[122] Florian Michahelles,et al. Architecting the Internet of Things , 2011 .
[123] Brian R. Gaines,et al. Modeling and forecasting the information sciences , 1991, Inf. Sci..
[124] Bernard Peters,et al. Security considerations in a multi-programmed computer system , 1967, AFIPS '67 (Spring).
[125] A. Brooks,et al. The revolution that wasn't: a new interpretation of the origin of modern human behavior. , 2000, Journal of human evolution.
[126] Lionel Casson,et al. Travel in the Ancient World , 1974 .
[127] A. Zaheer,et al. Handbook of Trust Research , 2006 .
[128] Douglas F. Parkhill,et al. The Challenge of the Computer Utility , 1966 .
[129] E. Tenner. Why things bite back : technology and the revenge of unintended consequences , 1996 .
[130] Marianne Junger,et al. Priming and warnings are not effective to prevent social engineering attacks , 2017, Comput. Hum. Behav..
[131] James Martin,et al. The Wired Society , 1978 .
[132] Jennifer Chu-Carroll,et al. Building Watson: An Overview of the DeepQA Project , 2010, AI Mag..
[133] Michael Swaine,et al. Fire in the Valley: The Making of the Personal Computer , 1984 .
[134] Braden Allenby. Designer warriors: Altering conflict—and humanity itself? , 2018, Bulletin of the Atomic Scientists.
[135] Revital Marom,et al. The Promise and Peril of Hyperconnectivity for Organizations and Societies , 2012 .
[136] Graeme Donald Snooks,et al. The laws of history , 1998 .
[137] Walter J. Karplus. On-line computing : time-shared man-computer systems , 1967 .
[138] Susan Oyama. The Ontogeny of Information: Developmental Systems and Evolution , 2000 .
[139] Dominique Carré,et al. Hyperconnectivity: Economical, Social and Environmental Challenges , 2018 .
[140] Robert U. Ayres,et al. Information, Entropy, and Progress: A New Evolutionary Paradigm , 1997 .
[141] Brian R. Gaines,et al. The collective stance in modeling expertise in individuals and organizations , 1994 .
[142] Brian R. Gaines,et al. Organizational Knowledge Acquisition , 2004 .
[143] E. Wilson,et al. The Social Conquest of Earth , 2013 .
[144] Alex Csiszar,et al. The Scientific Journal: Authorship and the Politics of Knowledge in the Nineteenth Century , 2018 .
[145] R. Coase,et al. The Firm, the Market, and the Law , 1990 .
[146] J. Burrell. Invisible Users: Youth in the Internet Cafés of Urban Ghana , 2012 .
[147] H. Peyton Young,et al. The Evolution of Social Norms , 2015 .
[148] H. Farrell. The Consequences of the Internet for Politics , 2012 .
[149] Jorge Luis Borges. Ficciones (1935-1944) , 1944 .
[150] Paul van Schaik,et al. The design and evaluation of a theory-based intervention to promote security behaviour against phishing , 2019, Int. J. Hum. Comput. Stud..
[151] Jack Kelly. Gunpowder: Alchemy, Bombards, And Pyrotechnics: The History Of The Explosive That Changed The World , 2004 .
[152] Lillian Hoddeson,et al. Crystal Fire: The Birth of the Information Age , 1998 .
[153] Geert Hofstede,et al. National Cultures in Four Dimensions: A Research-Based Theory of Cultural Differences among Nations , 1983 .
[154] Jennifer Daryl Slack,et al. The Ideology of the Information Age , 1987 .
[155] Don Tapscott,et al. Grown Up Digital: How the Net Generation is Changing Your World , 2008 .
[156] M. Heithaus,et al. Individuals as information sources: Could followers benefit from leaders’ knowledge? , 2013 .
[157] M. D. Mey. The Cognitive Paradigm , 1992 .
[158] Chris Stringer,et al. Using genetic evidence to evaluate four palaeoanthropological hypotheses for the timing of Neanderthal and modern human origins. , 2010, Journal of human evolution.
[159] R. C. O. Matthews,et al. The Long Wave in Economic Life. , 1982 .
[160] Karine E Silva,et al. Vigilantism and cooperative criminal justice:: Is there a place for cybersecurity vigilantes in cybercrime fighting , 2018 .
[161] Brian R. Gaines,et al. Sixth generation computing: a conspectus of the Japanese proposals , 1986, SGAR.
[162] Alessandro Vespignani,et al. Evolution and Structure of the Internet: A Statistical Physics Approach , 2004 .
[163] Albert Y. Zomaya,et al. Grid Computing for Bioinformatics and Computational Biology , 2007, Wiley series on bioinformatics.
[164] Hein S. Venter,et al. Social engineering attack examples, templates and scenarios , 2016, Comput. Secur..
[165] Marshall McLuhan,et al. The Global Village: Transformations in World Life and Media in the 21st Century , 1989 .
[166] Chihiro Suematsu. Transaction Cost Management: Strategies and Practices for a Global Open Economy , 2014 .
[167] Joseph Weizenbaum,et al. and Machine , 1977 .
[168] B.R. Gaines,et al. Some experience in interactive system development and application , 1975, Proceedings of the IEEE.
[169] D. Morris,et al. A General Translation Program for Phrase Structure Languages , 1962, JACM.
[170] Wei Xu,et al. Study and Application of Typical Disaster Monitoring and Early Warning System in Metal Mine , 2012 .
[171] Brian Merchant,et al. The One Device: The Secret History of the iPhone , 2017 .
[172] Joseph N. Pelton,et al. Smart Cities of Today and Tomorrow , 2018 .
[173] George Basalla,et al. The Evolution of Technology: Selection (2): Social and Cultural Factors , 1989 .
[174] E. Jablonka,et al. Evolution in Four Dimensions: Genetic, Epigenetic, Behavioral, and Symbolic Variation in the History of Life , 2005 .
[175] J. B. Strother,et al. Information Overload: An International Challenge for Professional Engineers and Technical Communicators , 2012 .
[176] Tonio Adam Andrade,et al. The Gunpowder Age: China, Military Innovation, and the Rise of the West in World History , 2016 .
[177] J. C. R. Licklider,et al. Man-Computer Symbiosis , 1960 .
[178] Kai Riemer,et al. Social Transactions on Social Network Sites: Can Transaction Cost Theory Contribute to a Better Understanding of Internet Social Networking? , 2010, Bled eConference.
[179] Christian Damsgaard Jensen,et al. The Role of Identity in Pervasive Computational Trust , 2005 .
[180] Johan Galtung,et al. Human needs: A contribution to the current debate , 1980 .
[181] William H. Dutton,et al. Cultural divides and digital inequalities: attitudes shaping Internet and social media divides* , 2017 .
[182] Paulina Wu,et al. Impossible to Regulate: Social Media, Terrorists, and the Role for the U.N. , 2015 .
[183] Pamela Briggs,et al. Using protection motivation theory in the design of nudges to improve online security behavior , 2019, Int. J. Hum. Comput. Stud..
[184] J. Ganascia. Views and Examples on Hyper-Connectivity , 2015 .
[185] Woodrow Hartzog,et al. Privacy’s Blueprint: The Battle to Control the Design of New Technologies , 2018 .
[186] J. Vernant,et al. Ancestor of the West: Writing, Reasoning and Religion in Mesopotamia, Elam and Greece. , 2001 .
[187] H. Paul Shuch,et al. Searching for Extraterrestrial Intelligence: SETI Past, Present, and Future , 2013 .
[188] William H. McNeill,et al. The Human Web: A Bird's-Eye View of World History , 2003 .
[189] Pierre Lévy,et al. Collective Intelligence: Mankind's Emerging World in Cyberspace , 1997 .
[190] T. Nam,et al. Understanding the gap between perceived threats to and preparedness for cybersecurity , 2019, Technology in Society.
[191] Gina Masullo Chen,et al. Why do women write personal blogs? Satisfying needs for self-disclosure and affiliation tell part of the story , 2012, Comput. Hum. Behav..
[192] N. Kshetri. The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives , 2010 .
[193] Christos N. Pitelis,et al. Transaction Costs, Markets and Hierarchies , 1994 .
[194] D. Flaherty. Protecting privacy in surveillance societies: the federal republic of germany , 1989 .
[195] Dimitra I. Kaklamani,et al. Improving Quality of Life with the Internet of Everything , 2017 .
[196] Diana Crane,et al. Invisible colleges. Diffusion of knowledge in scientific communities , 1972, Medical History.
[197] Thomas R. Gruber. Nature, nurture, and knowledge acquisition , 2013, Int. J. Hum. Comput. Stud..
[198] Adil Al-Yasiri,et al. Privacy, Trust and Identity in Pervasive Computing: A Review of Technical Challenges and Future Research Directions , 2012, ArXiv.
[199] Nadine Schuurman,et al. Tweet Me Your Talk: Geographical Learning and Knowledge Production 2.0 , 2013 .
[200] H. Gintis,et al. A Cooperative Species: Human Reciprocity and Its Evolution , 2011 .
[201] K. Montgomery. Generation Digital: Politics, Commerce, and Childhood in the Age of the Internet , 2007 .
[202] P. Ehrlich,et al. Can a collapse of global civilization be avoided? , 2013, Proceedings of the Royal Society B: Biological Sciences.
[203] M. Hobart,et al. Information Ages: Literacy, Numeracy, and the Computer Revolution , 1998 .
[204] Tim Bergin,et al. The Origins of Word Processing Software for Personal Computers: 1976-1985 , 2006, IEEE Annals of the History of Computing.
[205] J. Shotter. Agentive spaces, the "background", and other not well articulated influences in shaping our lives , 2013 .
[206] Norman F. Cantor,et al. In the Wake of the Plague , 2001 .
[207] Lee David Schur. Time-shared computer languages: An introduction to conversational computing , 1973 .
[208] James W. Cortada,et al. Before the Computer: IBM, NCR, Burroughs, and Remington Rand and the Industry They Created, 1865-1956 , 1994 .
[209] Bradley L. Kirkman,et al. A quarter century of Culture's Consequences: a review of empirical research incorporating Hofstede's cultural values framework , 2006 .
[210] Tommaso Bertolotti,et al. Facebook Has It: The Irresistible Violence of Social Cognition in the Age of Social Networking , 2011, Int. J. Technoethics.
[211] Tal Z. Zarsky,et al. Social Justice, Social Norms and the Governance of Social Media , 2015 .
[212] John Gallaugher,et al. Social Media and Customer Dialog Management at Starbucks , 2010, MIS Q. Executive.
[213] W. Dizard. The coming information age : an overview of technology, economics, and politics , 1982 .
[214] Jerzy A. Wojciechowski. Ecology of Knowledge , 2001 .
[215] Akbar Zaheer,et al. Handbook of Advances in Trust Research , 2013 .
[216] M. Pigliucci,et al. Evolution, the Extended Synthesis , 2010 .
[217] Glyn Lawson,et al. Exploring Interpretations of Data from the Internet of Things in the Home , 2013, Interacting with computers.
[218] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[219] Brian R. Gaines,et al. Knowledge acquisition: Past, present and future , 2013, Int. J. Hum. Comput. Stud..
[220] Guglielmo Lanzani,et al. A hybrid bioorganic interface for neuronal photoactivation. , 2011, Nature communications.
[221] Biz Stone,et al. Who Let the Blogs Out?: A Hyperconnected Peek at the World of Weblogs , 2004 .
[222] Richard Ling,et al. Taken for Grantedness: The Embedding of Mobile Communication into Society , 2012 .
[223] R. Coase. The Nature of the Firm , 1937 .
[224] Adam N. Joinson,et al. Exploring susceptibility to phishing in the workplace , 2018, International Journal of Human-Computer Studies.
[225] Peggy Aldrich Kidwell,et al. Landmarks in digital computing : a Smithsonian pictorial history , 1995 .
[226] Selin Kesebir,et al. The Superorganism Account of Human Sociality , 2012, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.
[227] Daniel R. Headrick,et al. When Information Came of Age: Technologies of Knowledge in the Age of Reason and Revolution, 1700-1850 , 2000 .
[228] W. Mcneill. Plagues and Peoples , 1977, The Review of Politics.
[229] Y. Gingras. Mapping the structure of the intellectual field using citation and co-citation analysis of correspondences , 2010 .
[230] Douglas C. Engelbart,et al. A conceptual framework for the augmentation of man's intellect , 1988 .
[231] M. Castells. The rise of the network society , 1996 .
[232] S. Hsi,et al. Crowdsourcing and Curating Online Education Resources , 2013, Science.
[233] Richard Joyce,et al. Cooperation and its Evolution , 2013 .
[234] Robert C. Daley,et al. An experimental time-sharing system , 1962, AIEE-IRE '62 (Spring).
[235] D. Bickerton. Language and Species , 1990 .
[236] L. Harper,et al. Epigenetic inheritance and the intergenerational transfer of experience. , 2005, Psychological bulletin.
[237] Olga M. Khessina,et al. It’s time to sober up: The direct costs, side effects and long-term consequences of creativity and innovation , 2018 .
[238] D. Trottier. Digital Vigilantism as Weaponisation of Visibility , 2017 .
[239] Antoinette Rouvroy,et al. Privacy, Data Protection, and the Unprecedented Challenges of Ambient Intelligence , 2007 .
[240] Brian R. Gaines,et al. HCI in the Next Millennium: Supporting the World Mind , 1999, INTERACT.
[241] Kimball Fisher,et al. The Distributed Mind: Achieving High Performance Through the Collective Intelligence of Knowledge Work Teams , 1997 .
[242] Colin Potts,et al. Design of Everyday Things , 1988 .
[243] Yujia Peng,et al. Brain-Computer Interface for Cyberpsychology , 2019, Analyzing Human Behavior in Cyberspace.
[244] W. Noble,et al. Human Evolution, Language and Mind: A Psychological and Archaeological Inquiry , 1996 .
[245] Efrem Sigel,et al. Videotext : the coming revolution in home/office information retrieval , 1980 .
[246] Lewis Carroll,et al. Alice Through the Looking-Glass and What Alice Found There , 1871 .
[247] A. Gardner,et al. Sixteen common misconceptions about the evolution of cooperation in humans , 2011 .
[248] Barney Warf,et al. Geographies of global Internet censorship , 2011 .
[249] Sharad Malik,et al. Morpheus: A Vulnerability-Tolerant Secure Architecture Based on Ensembles of Moving Target Defenses with Churn , 2019, ASPLOS.
[250] Geoff Emberling,et al. Visible language : inventions of writing in the ancient Middle East and beyond , 2010 .