Social Identification and Interpersonal Communication in Computer-Mediated Communication: What You Do Versus Who You Are in Virtual Groups |
Wang, Z.; Walther, J. B.; Hancock, J. T. |
2009 |
view article
|
The more you play, the more aggressive you become: A long-term experimental study of cumulative violent video game effects on hostile expectations and aggressive behavior |
Hasan, Y., Begue, L., Scharkow, M. and Bushman, B. J. |
2013 |
view article
|
Adults' Media Use and Attitudes |
Ofcom, |
2016 |
view article
|
The sociomateriality of organisational life: considering technology in management research |
Orlikowski, W. J. |
2010 |
view article
|
Leaky Geopolitics: The Ruptures and Transgressions of WikiLeaks |
Springer, S., Chi, H., Crampton, J., McConnell, F., Cupples, J., Glynn, K., Warf, B. and Attewell, W. |
2012 |
view article
|
RFID Technologies: Emerging Issues and Challenges |
Van Lieshout, M. and Kool, L. |
2007 |
view article
|
Social Mobilization and the Networked Public Sphere: Mapping the SOPA-PIPA Debate |
Benkler, Y., Roberts, H., Faris, R., Solow-Niederman, A. and Etling, B. |
2015 |
view article
|
Computer anxiety: Comparison of research from the 1990s and 2000s |
Powell, A. L. |
2013 |
view article
|
Smart Energy Technologies in Everyday Life: Smart Utopia? |
Strengers, Y. |
2013 |
view article
|
Hackers and the battle for cyberspace |
Nissenbaum, H. |
2002 |
view article
|