The Imaginary of Internet Patrice Flichy
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Bibliography of Erik Wilde
dretbiblio dretbiblio Erik Wilde's Bibliography References [1] AFIPS Fall Joint Computer Conference, San Francisco, California, December 1968. [2] Seventeenth IEEE Conference on Computer Communication Networks, Washington, D.C., 1978. [3] ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Los Angeles, Cal- ifornia, March 1982. ACM Press. [4] First Conference on Computer-Supported Cooperative Work, 1986. [5] 1987 ACM Conference on Hypertext, Chapel Hill, North Carolina, November 1987. ACM Press. [6] 18th IEEE International Symposium on Fault-Tolerant Computing, Tokyo, Japan, 1988. IEEE Computer Society Press. [7] Conference on Computer-Supported Cooperative Work, Portland, Oregon, 1988. ACM Press. [8] Conference on Office Information Systems, Palo Alto, California, March 1988. [9] 1989 ACM Conference on Hypertext, Pittsburgh, Pennsylvania, November 1989. ACM Press. [10] UNIX | The Legend Evolves. Summer 1990 UKUUG Conference, Buntingford, UK, 1990. UKUUG. [11] Fourth ACM Symposium on User Interface Software and Technology, Hilton Head, South Carolina, November 1991. [12] GLOBECOM'91 Conference, Phoenix, Arizona, 1991. IEEE Computer Society Press. [13] IEEE INFOCOM '91 Conference on Computer Communications, Bal Harbour, Florida, 1991. IEEE Computer Society Press. [14] IEEE International Conference on Communications, Denver, Colorado, June 1991. [15] International Workshop on CSCW, Berlin, Germany, April 1991. [16] Third ACM Conference on Hypertext, San Antonio, Texas, December 1991. ACM Press. [17] 11th Symposium on Reliable Distributed Systems, Houston, Texas, 1992. IEEE Computer Society Press. [18] 3rd Joint European Networking Conference, Innsbruck, Austria, May 1992. [19] Fourth ACM Conference on Hypertext, Milano, Italy, November 1992. ACM Press. [20] GLOBECOM'92 Conference, Orlando, Florida, December 1992. IEEE Computer Society Press. http://github.com/dret/biblio (August 29, 2018) 1 dretbiblio [21] IEEE INFOCOM '92 Conference on Computer Communications, Florence, Italy, 1992. -
Computer-Supported Cooperative Work: History and Focus
Computer-Supported Cooperative Work: Historv and Focus d Jonathan Grudin, University of California, Irvine en years ago, hen Greif of MIT and Paul Cashman of Digital Equipment Corporation organized a workshop that had far-reaching effects. Twenty people from different fields -but with a shared interest in how people work -gathered to explore technology’s role in the work environment and coined the term “computer-supported cooperative work” to describe it. Since then, thousands of researchers and developers have responded to this ini- tiative. Although the first CSCW conferences were held in the United States, the topic was picked up immediately in Europe and Asia, where related work and seri- ous interest already existed. This article describes the people and the work found under the CSCW umbrella. Why i984? An earlier approach to group support, called “office automation,” had run out of steam by 1984. OA’s primary problem was not technical, although technical chal- lenges certainly existed; it was in understanding system requirements. In the mid- CSCW and groupware 1960s, tasks such as filling seats on airplane flights or printing payroll checks had emerged in the 1980s been translated into requirements that resulted (with some trial and error) in suc- cessful mainframe systems. In the mid-l970s, minicomputers promised to support from shared interests groups and organizations in more sophisticated, interactive ways, and OA was born. OA tried to extend and integrate single-user applications, such as word processors and among product spreadsheets, to support groups and departments. But what were the precise re- developers and quirements for such systems? Building technology was not enough. -
Social Computing-Driven Activism in Youth Empowerment Organizations: Challenges and Opportunities Farnaz Irannejad Bisafar1, Lina Itzel Martinez2, Andrea G
Social Computing-Driven Activism in Youth Empowerment Organizations: Challenges and Opportunities Farnaz Irannejad Bisafar1, Lina Itzel Martinez2, Andrea G. Parker1,2 1College of Computer and Information Science 2Bouvé College of Health Sciences Northeastern University 360 Huntington Ave. Boston, MA 02115 Boston, United States [email protected], [email protected], [email protected] ABSTRACT significantly higher rates of health problems (e.g., diabetes) Throughout the world, organizations empower youth to than more affluent communities [17,29,44]. Previous work participate in civic engagement to impact social change, has examined how youth-led activism can be effective in and adult-youth collaborations are instrumental to the addressing these challenges and affecting social change success of such initiatives. However, little is known about [9,47]. In fact, throughout the world, many organizations how technology supports this activism work, despite the have created youth-led programs with the goals of solving fact that tools such as Social Networking Applications community problems and empowering youth to educate (SNAs) are increasingly being leveraged in such contexts. their peers about issues of concern [33]. These We report results from a qualitative study of SNA use organizations provide youth with resources needed to run within a youth empowerment organization. Using the social action initiatives (e.g., support for collective analytical lens of object-oriented publics, our findings organizing). As adult staff work together with youth, they reveal opportunities and challenges that youth and staff face create an environment that nurtures youth’s confidence that when they use SNAs. We describe the illegibility of youth they can take on social problems. -
More Than Writing Text: Multiplicity in Collaborative Academic Writing
More Than Writing Text: Multiplicity in Collaborative Academic Writing Ida Larsen-Ledet Ph.D. Thesis Department of Computer Science Aarhus University Denmark More Than Writing Text: Multiplicity in Collaborative Academic Writing A Thesis Presented to the Faculty of Natural Sciences of Aarhus University in Partial Fulfillment of the Requirements for the Ph.D. Degree. by Ida Larsen-Ledet November 2, 2020 Abstract This thesis explores collaborative academic writing with a focus on how it is medi- ated by multiple technologies. The thesis presents findings from two empirical stud- ies with university students and researchers: The first combined semi-structured interviews with visualizations of document editing activity to explore transitions through co-writers’ artifact ecologies along with co-writers’ motivations for per- forming these transitions. The second study was a three-stage co-design workshop series that progressed from dialog through ideation to exploration of a prototype for a shared editor that was based on the participants’ proposed features and designs. The contribution from the second study to this thesis is the analysis of participants’ viewpoints and ideas. The analyses of these findings contribute a characterization of co-writers’ practical and social motivations for using multiple tools in their collaborations, and the chal- lenges this poses for sharing and adressing the work. Multiplicity is also addressed in terms of co-writers bringing multiple and diverse needs and preferences into the writing, and how these may be approached in efforts to design and improve support for collaborative writing. Additionally, the notion of text function is introduced to describe the text’s role as a mediator of the writing. -
Sample Pages
TitlePgsInternetRev 3/5/05 8:13 AM Page 3 Defining Moments the internet revolution Kevin Hillstrom 615 Griswold, Detroit MI 48226 DM - Internet FM 3/7/05 4:46 PM Page v Table of Contents Preface . .vii How to Use This Book . .xi Important People, Places, and Terms . .xiii Chronology . .xxi NARRATIVE OVERVIEW Prologue . .3 Chapter One: Early Origins of the Internet . .5 Chapter Two: Invention of the World Wide Web . .23 Chapter Three: How the Internet Works . .33 Chapter Four: Opening the Internet for Commerce . .45 Chapter Five: The “Dot.Com Boom” Goes Bust . .57 Chapter Six: The Societal Impact of the Internet . .67 Chapter Seven: The Future of the Internet . .89 BIOGRAPHIES Marc Andreessen . .103 Creator of the Netscape Navigator Web Browser Tim Berners-Lee . .107 Inventor of the World Wide Web Sergey Brin and Larry Page . .112 Co-Founders of Google v DM - Internet FM 3/7/05 4:46 PM Page vi Defining Moments: The Internet Revolution Steve Case . .115 Co-Founder of America Online (AOL) Vinton Cerf . .120 Developer of Early Internet Architecture David Filo and Jerry Yang . .124 Co-Founders of the Yahoo! Search Engine Robert Taylor . .129 Leading Scientist in the Development of the ARPANET PRIMARY SOURCES Vinton Cerf Recalls the Early Development of the Internet . .135 Steve Crocker Launches the “Request for Comments” Series . .144 A Computer Scientist Describes the Internet Worm of 1988 . .152 The First World Wide Web Page with Hypertext Links . .164 Tim Berners-Lee Remembers Inventing the World Wide Web . .166 A Librarian Shares the Joy of “Surfing” the Internet . -
The Law of the Horse: What Cyberlaw Might Teach
FINALHLS.DOC 12/03/99 – 10:19 AM COMMENTARIES THE LAW OF THE HORSE: WHAT CYBERLAW MIGHT TEACH Lawrence Lessig* INTRODUCTION A few years ago, at a conference on the “Law of Cyberspace” held at the University of Chicago, Judge Frank Easterbrook told the assembled listeners, a room packed with “cyberlaw” devotees (and worse), that there was no more a “law of cyberspace” than there was a “Law of the Horse”;1 that the effort to speak as if there were such a law would just muddle rather than clarify; and that legal academics (“dilettantes”) should just stand aside as judges and lawyers and technologists worked through the quotidian problems that this souped-up telephone would present. “Go home,” in effect, was Judge Easterbrook’s welcome. As is often the case when my then-colleague speaks, the intervention, though brilliant, produced an awkward silence, some polite applause, and then quick passage to the next speaker. It was an interesting thought — that this conference was as significant as a conference on the law of the horse. (An anxious student sitting behind me whispered that he had never heard of the “law of the horse.”) But it did not seem a very helpful thought, two hours into this day-long conference. So marked as unhelp- ful, it was quickly put away. Talk shifted in the balance of the day, and in the balance of the contributions, to the idea that either the law of the horse was significant after all, or the law of cyberspace was something more. ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– * Jack N. and Lillian R. -
A Bibliography of O'reilly & Associates and O
A Bibliography of O'Reilly & Associates and O'Reilly Media. Inc. Publishers Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 08 February 2021 Version 3.67 Title word cross-reference #70 [1263, 1264]. #70-059 [1263]. #70-068 [1264]. 2 [949]. 2 + 2 = 5986 [1456]. 3 [1149, 1570]. *# [1221]. .Mac [1940]. .NET [1860, 22, 186, 342, 441, 503, 591, 714, 716, 721, 730, 753, 786, 998, 1034, 1037, 1038, 1043, 1049, 1089, 1090, 1091, 1119, 1256, 1468, 1858, 1859, 1863, 1899, 1900, 1901, 1917, 1997, 2029]. '05 [461, 1532]. 08 [1541]. 1 [1414]. 1.0 [1009]. 1.1 [59]. 1.2 [1582]. 1000 [1511]. 1000D [1073]. 10g [711, 710]. 10th [2109]. 11 [1385]. 1 2 2 [53, 209, 269, 581, 2134, 919, 940, 1515, 1521, 1530, 2023, 2045]. 2.0 [2, 55, 203, 394, 666, 941, 1000, 1044, 1239, 1276, 1504, 1744, 1801, 2073]. 2.1 [501]. 2.2 [201]. 2000 [38, 202, 604, 610, 669, 927, 986, 1087, 1266, 1358, 1359, 1656, 1751, 1781, 1874, 1959, 2069]. 2001 [96]. 2003 [70, 71, 72, 73, 74, 279, 353, 364, 365, 789, 790, 856, 987, 1146, 1960, 2026]. 2003-2013 [1746]. 2004 [1195]. 2005 [84, 151, 755, 756, 1001, 1041, 1042, 1119, 1122, 1467, 2120, 2018, 2056]. 2006 [152, 153]. 2007 [618, 726, 727, 728, 1123, 1125, 1126, 1127, 2122, 1973, 1974, 2030]. -
An Infrastructure to Support Extensible Context-Enhanced Collaborative Applications
Putting Computing in Context: An Infrastructure to Support Extensible Context-Enhanced Collaborative Applications W. KEITH EDWARDS Georgia Institute of Technology Context-aware computing exposes a unique tension in how information about human context is modeled and used. On the one hand, approaches that use loosely structured information have been shown to be useful in situations where humans are the final consumers of contextual information; these approaches have found favor in many CSCW applications. On the other hand, more rigidly structured information supports machine interpretation and exchange; these approaches have been explored in the ubiquitous computing community. The system presented here, dubbed Intermezzo, represents an exploration of a space between these two extremes. Intermezzo combines a loose data structuring with a number of unique features designed to allow applications to embed special- ized semantic interpretations of data into the infrastructure, allowing them to be reused by other applications. This approach can enable the construction of applications that can take advantage of rich, layered interpretations of context without requiring that they understand all aspects of that context. This approach is explored through the creation of two higher-level services that provide context-enhanced session management and context-enhanced access control. Categories and Subject Descriptors: D.2.11 [Software Engineering]: Software Architectures— Domain-specific architectures; H.5.3 [Information Interfaces and Presentation]: Group and Organization Interfaces—Collaborative computing; H.3.4 [Information Storage and Retrieval]: Systems and Software—Distributed systems, current awareness systems General Terms: Design, Human Factors Additional Key Words and Phrases: Collaboration, context-aware computing, data representations, coordination 1. INTRODUCTION All work—like everything else in our lives—occurs in some setting. -
Divining a Digital Future
Divining a Digital Future Mess and Mythology in Ubiquitous Computing Paul Dourish and Genevieve Bell 2011 The MIT Press Cambridge, Massachusetts London, England Contents Preface vii Acknowledgments ix 1 Introduction : The Myth and Mess of Ubiquitous Computing 1 I 7 2 Contextualizing Ubiquitous Computing 9 3 Making Room for the Social and Cultural 45 4 A Role for Ethnography : Methodology and Theory 61 II 91 5 What Lies Beneath 95 6 Mobility and Urbanism 117 7 Rethinking Privacy 137 8 Domesticity and Its Discontents 161 III 185 9 Reimagining Ubiquitous Computing : A Conclusion 187 References 211 Index 245 Preface We wrote the proposal for this book in a stark modernist hotel room in Geneva, while attending a new media conference there. In between con- ference sessions, extravagant French-infl uenced desserts, and a memorable trip to the International Museum of the Reformation, we sketched out a plan for how it might take shape. We knew from the outset that we wanted to critically interrogate the idea of “ ubiquitous computing ” (or “ ubicomp ” ). It was a project that we had been circling around in various publications and talks for several years, and the time seemed ripe to take a more comprehensive look. Much of this project ’ s distinctiveness and whatever success it achieves relies on the interdisciplinary nature of our collaboration. Dourish is a com- puter scientist whose work lies at the intersection of computer science and social science; Bell is a cultural anthropologist with a primary concern in information technology as a site of cultural production along with the con- sequences for technology innovation and diffusion. -
UC Irvine Electronic Theses and Dissertations
UC Irvine UC Irvine Electronic Theses and Dissertations Title Improving Efficacy of Support Groups in Online Environments Permalink https://escholarship.org/uc/item/12q608h5 Author Esmaeeli, Ali Publication Date 2020 License https://creativecommons.org/licenses/by/4.0/ 4.0 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, IRVINE Improving Efficacy of Support Groups in Online Environments DISSERTATION submitted in partial satisfaction of the requirements for the degree of DOCTOR OF PHILOSOPHY in Management by Ali Esmaeeli Dissertation Committee: Professor L. Robin Keller, Co-chair Professor Cornelia (Connie) Pechmann, Co-chair Associate Professor John Turner 2020 © 2020 Ali Esmaeeli DEDICATION To My supportive family who value diligence and wisdom ii TABLE OF CONTENTS Page LIST OF FIGURES v LIST OF TABLES vi ACKNOWLEDGMENTS vii VITA viii ABSTRACT OF THE DISSERTATION ix INTRODUCTION 1 CHAPTER 1: The Effects of Buddy Systems in Online Support Groups on Members’ Goal Attainment and Interactions 4 Theoretical Framework and Hypotheses 7 Buddy Systems and Hypotheses Development 7 Measuring Tie Strength 13 Research Methods 16 Setting 16 Dependent and Independent Variables 18 Analyses Approach 21 Empirical Results 23 Descriptive Statistics 23 Test of H1 25 Test of H2 26 Test of H3 29 Test of H4 30 Test of H5 (Mediation Test) 34 Discussion 36 Summary and Conclusion 36 Limitations 37 CHAPTER 2: Adding a Chatbot to Online Support Groups: The Natural Language -
Supporting Early-Stage Ubicomp Experimentation
Supporting early-stage ubicomp experimentation Scott Alan Carter Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2007-58 http://www.eecs.berkeley.edu/Pubs/TechRpts/2007/EECS-2007-58.html May 16, 2007 Copyright © 2007, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. Supporting early-stage ubicomp experimentation by Scott Alan Carter B.S. (University of New Mexico) 2000 M.S. (University of California, Berkeley) 2004 A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the GRADUATE DIVISION of the UNIVERSITY OF CALIFORNIA, BERKELEY Committee in charge: Professor John Canny, Chair Assistant Professor Jennifer Mankoff Professor Peter Lyman Assistant Professor Maneesh Agrawala Spring 2007 The dissertation of Scott Alan Carter is approved. Chair Date Date Date Date University of California, Berkeley Spring 2007 Supporting early-stage ubicomp experimentation Copyright c 2007 by Scott Alan Carter Abstract Supporting early-stage ubicomp experimentation by Scott Alan Carter Doctor of Philosophy in Computer Science University of California, Berkeley Professor John Canny, Chair The thesis of this dissertation is that tools and techniques that leverage pre-existing infrastructures, human operators, and the increasing power of mobile devices can im- prove innovation, development, and evaluation of ubicomp applications. -
Self-Colonizing Eeurope
Self‐Colonizing eEurope: The Information Society Merges onto the Information Superhighway STEPHANIE R. SCHULTE The 2002 German film Halbe Miete (Half the Rent) follows a computer hacker in his thirties named Peter as he “unplugs,” that is, as he makes the conscious decision to live his life off‐line.1 The gaunt hacker emerges from his darkened computer room to discover that his girlfriend has died in their apartment under ambiguous circumstances. Distraught, he puffs a cigarette in a daze until his cellular telephone rings and frightens him; instead of answering, Peter flips the phone over, removes the data chip from the back, and burns the chip with his cigarette. In this moment, Peter literally and symbolically destroys his means of digital communication and deliberately disconnects from telecommunications networks; in Peter’s words, “I am no longer reachable.” In few American films about the internet in the 1990s or early 2000s does a main character decide to unplug, or completely disengage.2 Instead, the main characters in films like The Matrix and The Net almost always battle with evil forces over control of the internet, ultimately using the technology as a weapon with which to defeat their foe. In short, in American film, “winning” means mastery of the internet, not avoidance or rejection. Although American films far outsell German films in Germany, even domestic German‐language films like Halbe Miete, this alternative representation suggests that the internet was “thinkable” in different terms in Germany and that a certain anti‐internet sentiment made sense. As German cultural studies has shown, this skepticism toward technology stemmed in part from Germany’s legacy of anticapitalism, meaning that technology became equated with the capitalist domination critiqued by German thinkers.3 This comparative article is about the varying national imaginings of the internet in Europe and the United States, how they intersected with and were promoted by different policies regulating the technology.