Identification and the practices of identity and privacy in everyday digital communication |
Wessels, B. |
2012 |
view article
|
EXPLORING HUMAN AGENCY AND DIGITAL SYSTEMS Services, personalization, and participation |
Wessels, B. |
2013 |
view article
|
A framework for the ethical impact assessment of information technology |
Wright, D. |
2011 |
view article
|
Free as the air to common use: First amendment constraints on enclosure of the public domain |
Benkler, Y. |
1999 |
view article
|
Serious social media: On the use of social media for improving students' adjustment to college |
DeAndrea, D. C., Ellison, N. B., LaRose, R., Steinfield, C. and Fiore, A. |
2012 |
view article
|
Connection strategies: Social capital implications of Facebook-enabled communication practices |
Ellison, N. B., Steinfield, C. and Lampe, C. |
2011 |
view article
|
The self-organization of cyberprotest |
Fuchs, C. |
2006 |
view article
|
Generational differences in content generation in social media: The roles of the gratifications sought and of narcissism |
Leung, L. |
2013 |
view article
|
POWER AND INTERESTS IN INFORMATION AND COMMUNICATION AND DEVELOPMENT: EXOGENOUS AND ENDOGENOUS DISCOURSES IN CONTENTION |
Mansell, R. |
2014 |
view article
|
Computer anxiety: Comparison of research from the 1990s and 2000s |
Powell, A. L. |
2013 |
view article
|