Antisocial Behaviour Orders: Unanticipated Directions in Social Network Site Development
暂无分享,去创建一个
[1] Ryan Bigge,et al. The cost of (anti-)social networks: Identity, agency and neo-luddites , 2006, First Monday.
[2] Edgar A. Whitley,et al. Configuring peer-to-peer software: an empirical study of how users react to the regulatory features of software , 2004, Eur. J. Inf. Syst..
[3] William H. Dutton,et al. Reconfiguring Friendships: Social relationships and the Internet , 2007 .
[4] J. Fleck. Learning by trying: the implementation of configurational technology☆ , 1994 .
[5] Anna Livia,et al. Public and Clandestine: Gay Men's Pseudonyms on the French Minitel , 2002 .
[6] Robin Williams,et al. The Wrong Trousers? Beyond the Design Fallacy: Social Learning and the User , 2005 .
[7] M. Lynne Markus,et al. Power, politics, and MIS implementation , 1987, CACM.
[8] David Spitz,et al. Contested Codes: The Social Construction of Napster , 2005, Inf. Soc..
[9] Gustavo S. Mesch,et al. Editorial Comment: e-Relationships – the blurring and reconfiguration of offline and online social boundaries , 2007 .
[10] Malene Charlotte Larsen. Understanding Social Networking: On Young People's Construction and Co-construction of Identity Online , 2008 .
[11] Niels Bjørn-Andersen,et al. International Conference on Information Systems ( ICIS ) 1986 POWER OVER USERS : ITS EXERCISE BY SYSTEM PROFESSIONALS , 2017 .
[12] Sara Baase,et al. Gender, ethics and information technology , 2005 .
[13] Leslie Haddon,et al. Roger Silverstone’s legacies: domestication , 2007, New Media Soc..
[14] Keith N. Hampton. Networked sociability online, off-line , 2004 .
[15] Ashley W. Goldsworthy. Technology and People , 1985, Comput. Networks.
[16] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[17] Briony J. Oates,et al. New frontiers for information systems research: computer art as an information system , 2006, Eur. J. Inf. Syst..
[18] Denise Carter,et al. Living in virtual communities: an ethnography of human relationships in cyberspace , 2005 .
[19] G. B. Devey,et al. 3 – TECHNOLOGY AND PEOPLE , 1977 .
[20] Leslie Haddon,et al. The Contribution of Domestication Research to In-Home Computing and Media Consumption , 2006, Inf. Soc..
[21] Cliff Lampe,et al. The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..
[22] Nava Pliskin,et al. The office tyrant - social control through e-mail , 1999, Inf. Technol. People.
[23] Mark Wallace,et al. Second Life: The Official Guide , 2006 .
[24] Deborah G. Johnson. Ethics online , 1997 .
[25] Ben Light,et al. Introducing Masculinity Studies to Information Systems Research: the case of Gaydar , 2007, Eur. J. Inf. Syst..
[26] Anna K. Turnage,et al. Email Flaming Behaviors and Organizational Conflict , 2007, J. Comput. Mediat. Commun..
[27] Lisa Nakamura. Cybertypes: Race, Ethnicity, and Identity on the Internet , 2002 .
[28] RobeyDaniel,et al. An investigation of user-led system design: rational and political perspectives , 1984 .