Abstract
No abstract available.
Cited By
- Bernstein M On The Origins Of Hypertext In The Disasters Of The Short 20th Century Proceedings of the ACM Web Conference 2022, (3450-3457)
- Eglash R, Bennett A, Cooke L, Babbitt W and Lachney M (2021). Counter-hegemonic Computing: Toward Computer Science Education for Value Generation and Emancipation, ACM Transactions on Computing Education, 21:4, (1-30), Online publication date: 31-Dec-2022.
- Haigh T (2021). When hackers were heroes, Communications of the ACM, 64:4, (28-34), Online publication date: 1-Apr-2021.
- Stark L (2020). Here Come the ‘Computer People’: Anthropomorphosis, Command, and Control in Early Personal Computing, IEEE Annals of the History of Computing, 42:4, (53-70), Online publication date: 1-Oct-2020.
- Four computing mythologies Code Nation
- Haigh T (2018). Hey Google, what's a moonshot?, Communications of the ACM, 62:1, (24-30), Online publication date: 19-Dec-2018.
- Lindtner S, Bardzell S and Bardzell J (2018). Design and Intervention in the Age of "No Alternative", Proceedings of the ACM on Human-Computer Interaction, 2:CSCW, (1-21), Online publication date: 1-Nov-2018.
- Ames M (2018). Hackers, Computers, and Cooperation, Proceedings of the ACM on Human-Computer Interaction, 2:CSCW, (1-19), Online publication date: 1-Nov-2018.
- Fornés J, Herran N and Duque L (2017). Computing for Democracy: The Asociación de Técnicos de Informática and the Professionalization of Computing in Spain, IEEE Annals of the History of Computing, 39:2, (30-48), Online publication date: 1-Jan-2017.
- Spicer D (2016). Raymond Tomlinson: Email Pioneer, Part 2, IEEE Annals of the History of Computing, 38:3, (78-83), Online publication date: 1-Jul-2016.
- Russell A (2016). Reviews, IEEE Annals of the History of Computing, 38:3, (10-11), Online publication date: 1-Jul-2016.
- Lindtner S, Greenspan A and Li D Designed in Shenzhen Proceedings of The Fifth Decennial Aarhus Conference on Critical Alternatives, (85-96)
- Dourish P Not the internet, but this internet Proceedings of The Fifth Decennial Aarhus Conference on Critical Alternatives, (157-168)
- Ames M Charismatic technology Proceedings of The Fifth Decennial Aarhus Conference on Critical Alternatives, (109-120)
- Wakkary R, Schilling M, Dalton M, Hauser S, Desjardins A, Zhang X and Lin H Tutorial Authorship and Hybrid Designers Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, (609-618)
- Asad M and Le Dantec C Illegitimate Civic Participation Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, (1694-1703)
- Haigh T (2014). We have never been digital, Communications of the ACM, 57:9, (24-28), Online publication date: 1-Sep-2014.
- Lindtner S, Hertz G and Dourish P Emerging sites of HCI innovation Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (439-448)
- Lindtner S and Li D (2012). Created in China, Interactions, 19:6, (18-22), Online publication date: 1-Nov-2012.
- Le Dantec C Participation and publics Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (1351-1360)
- Jafarinaimi N Exploring the character of participation in social media Proceedings of the 2012 iConference, (72-79)
- Christiansen P Between a mod and a hard place Game Mods, (27-50)
- Lindtner S, Chen J, Hayes G and Dourish P (2011). Towards a framework of publics, ACM Transactions on Computer-Human Interaction, 18:2, (1-23), Online publication date: 1-Jun-2011.
- Magnani L, Bardone E and Bertolotti T (2011). Perverting Activism, International Journal of Technoethics, 2:2, (14-29), Online publication date: 1-Apr-2011.
- Haigh T (2011). The history of information technology, Annual Review of Information Science and Technology, 45:1, (431-487), Online publication date: 1-Jan-2011.
- Le Dantec C, Christensen J, Bailey M, Farrell R, Ellis J, Danis C, Kellogg W and Edwards W A tale of two publics Proceedings of the 8th ACM Conference on Designing Interactive Systems, (11-20)
- Le Dantec C, Poole E and Wyche S Values as lived experience Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (1141-1150)