Concealing Communities Within the Crowd
暂无分享,去创建一个
[1] Michael S. Bernstein,et al. The future of crowd work , 2013, CSCW.
[2] A. Scherer,et al. Clandestine Organizations, al Qaeda, and the Paradox of (In)Visibility: A Response to Stohl and Stohl , 2012 .
[3] C. Stohl. Crowds, Clouds, and Community , 2014 .
[4] Keri K. Stephens,et al. It Depends on Who You're Talking To…: Predictors and Outcomes of Situated Measures of Organizational Identification , 2009 .
[5] P. Biernacki,et al. Snowball Sampling: Problems and Techniques of Chain Referral Sampling , 1981 .
[6] Sanmay Das,et al. Manipulation among the Arbiters of Collective Intelligence , 2016, ACM Trans. Web.
[7] Linda L. Putnam,et al. Organizations as Discursive Constructions , 2004 .
[8] Landon P. Cox. Truth in Crowdsourcing , 2011, IEEE Security & Privacy.
[9] Craig R. Scott,et al. Anonymous Agencies, Backstreet Businesses, and Covert Collectives: Rethinking Organizations in the 21st Century , 2013 .
[10] Roger V. Gould,et al. A Dilemma of State Power: Brokerage and Influence in the National Health Policy Domain , 1994, American Journal of Sociology.
[11] W. Bennett,et al. Response to Sidney Tarrow’s review of The Logic of Connective Action: Digital Media and the Personalization of Contentious Politics , 2013, Perspectives on Politics.
[12] E. Brink,et al. Constructing grounded theory : A practical guide through qualitative analysis , 2006 .
[13] Jock Given,et al. The wealth of networks: How social production transforms markets and freedom , 2007, Inf. Econ. Policy.
[14] Andrew J. Flanagin,et al. Collective Action in Organizations: Interaction and Engagement in an Era of Technological Change , 2012 .
[15] Michael W. Kramer,et al. Volunteering and Communication , 2013 .
[16] C. Stohl,et al. Secret Agencies: The Communicative Constitution of a Clandestine Organization , 2011 .
[17] C. Caroll,et al. The Expressive Organization: Linking Identity, Reputation and the Corporate Brand , 2000 .
[18] K. Ashcraft,et al. Special Issue Introduction , 2004 .
[19] A. Strauss,et al. Grounded theory , 2017 .
[20] M. Patton,et al. Qualitative evaluation and research methods , 1992 .
[21] M. Savage,et al. Elites: Remembered in Capitalism and Forgotten by Social Sciences , 2008 .
[22] Mark Snyder,et al. The Motivations to Volunteer , 1999 .
[23] Steven R. Corman,et al. Development of a Structurational Model of Identification in the Organization , 1998 .
[24] Qian Xu,et al. Should I trust him? The effects of reviewer profile characteristics on eWOM credibility , 2014, Comput. Hum. Behav..
[25] James Caverlee,et al. Exploitation in Human Computation Systems , 2013, Handbook of Human Computation.
[26] Thomas R. Lindlof. Qualitative Communication Research Methods , 1994 .
[27] Miriam J. Metzger. Making sense of credibility on the Web: Models for evaluating online information and recommendations for future research , 2007, J. Assoc. Inf. Sci. Technol..
[28] Shari R. Veil,et al. Hoaxes and the Paradoxical Challenges of Restoring Legitimacy , 2012 .
[29] Michael Luca. Reviews, Reputation, and Revenue: The Case of Yelp.Com , 2016 .
[30] Aaron D. Shaw,et al. Laboratories of Oligarchy? How the Iron Law Extends to Peer Production , 2014, ArXiv.