default search action
Computerization and Controversy, 2nd Ed., 1996
- Rob Kling:
Computerization and Controversy, 2nd Ed. Morgan Kaufmann / Elsevier 1996, ISBN 978-0-12-415040-9 - Preface to the Second Edition. xiii-xv
- Rob Kling:
Heads-Up versus Heads-In Views of Computer Systems. 2-3 - Rob Kling:
A Reader's Guide to Computerization and Controversy. 4-9 - Rob Kling:
Social Controversies about Computerization. 10-15 - Rob Kling:
Computers as Tools and Social Systems: The Car-Computer Analogy. 16-21 - Rob Kling:
The Seductive Equation of Technological Progress with Social Progress. 22-25 - Rob Kling:
Learning about the Possible Futures of Computerization from the Present and the Past. 26-31 - Rob Kling:
Information and Computer Scientists as Moral Philosophers and Social Analysts. 32-38 - Rob Kling:
Hopes and Horrors: Technological Utopianism and Anti-Utopianism in Narratives of Computerization. 40-58 - Ross Weiland:
2001: A Meetings Odyssey. 59-66 - Thomas A. Stewart:
Boom Time on the New Frontier. 67-74 - Kevin Kelly:
The Electronic Hive: Embrace It. 75-78 - Sven Birkerts:
The Electronic Hive: Refuse It. 79-82 - Langdon Winner:
Electronic Office: Playpen or Prison. 83-84 - Suzanne Iacono, Rob Kling:
Computerization Movements and Tales of Technological Utopianism. 85-105 - Rob Kling:
The Centrality of Organizations in the Computerization of Society. 108-132 - Gad Ariav, Seymour E. Goodman:
Israel: Of Swords and Software Plowshares. 133-140 - Barnaby J. Feder:
Getting the Electronics Just Right: Wells Fargo Is a Case Study in How a Company Can Exploit the Information Revolution. 141-147 - Michael Scott Morton:
How Information Technologies Can Transform Organizations. 148-160 - Douglas Frantz:
B of A's Plans for Computer Don't Add Up. 161-169 - David Kirkpatrick:
Groupware Goes Boom. 170-172 - Wanda J. Orlikowski:
Learning from Notes: Organizational Issues in Groupware Implementation. 173-189 - Henry Jay Becker:
How Much Will a Truly Empowering Technology-Rich Education Cost? 190-196 - Steven Hodas:
Technology Refusal and the Organizational Culture of Schools. 197-218 - Martin Neil Baily:
Great Expectations: PCs and Productivity. 219-226 - Paul Attewell:
Information Technology and the Productivity Challenge. 227-238 - John Leslie King:
Where Are the Payoffs from Computerization? Technology, Learning, and Organizational Change. 239-260 - Rob Kling, Jonathan P. Allen:
Can Computer Science Solve Organizational Problems? The Case for Organizational Informatics. 261-276 - Rob Kling:
Computerization at Work. 278-308 - Suzanne Iacono, Rob Kling:
Computerization, Office Routines, and Changes in Clerical Work. 309-315 - Gary T. Marx:
The Case of the Omniscient Organization. 316-321 - Tony Horowitz:
Mr. Edens Profits from Watching His Workers' Every Move. 322-325 - Steven E. Poltrock, Jonathan Grudin:
Interface Development in a Large Organization: An Observational Study. 326-347 - Christine V. Bullen, John L. Bennett:
Groupware in Practice: An Interpretation of Work Experiences. 348-382 - Andrew Clement:
Computing at Work: Empowering Action by Low-Level Users. 383-406 - Lucy A. Suchman:
Supporting Articulation Work. 407-423 - Rob Kling:
Social Relationships in Electronic Forums: Hangouts, Salons, Workplaces, and Communities. 426-454 - Lee Sproull, Sara B. Kiesler:
Increasing Personal Connections. 455-475 - Susan C. Herring:
Gender and Democracy in Computer-Mediated Communication. 476-489 - M. Lynne Markus:
Finding a Happy Medium: Explaining the Negative Effects of Electronic Communication on Social Life at Work. 490-524 - Margo Kaufman:
They Call It Cyberlove. 525-532 - Lindsy Van Gelder:
The Strange Case of the Electronic Lover. 533-546 - Joan Van Tassel:
Yakety-Yak, Do Talk Back!: PEN, the Nation's First Publicly Funded Electronic Network, Makes a Difference in Santa Monica. 547-551 - Julian Dibbell:
Taboo, Consensus, and the Challenge of Democracy in an Electronic Forum. 552-568 - Carl M. Kadie:
Applying Library Intellectual Freedom Principles to Public and Academic Computers. 569-579 - Ann Okerson:
The Electronic Journal: What, Whence, and When? 580-593 - Walt Crawford:
I Heard It through the Internet. 594-596 - Vartan Gregorian:
Technology, Scholarship, and the Humanities: The Implications of Electronic Information. 597-605 - Richard Sclove, Jeffrey Scheuer:
On the Road Again? If Information Highways Are Anything like Interstate Highways - Watch Out! 606-612 - Rob Kling:
Information Technologies and the Shifting Balance between Privacy and Social Control. 614-636 - David F. Linowes:
Your Personal Information Has Gone Public. 637-642 - Gerald Murphy:
The Bill of Rights of the Constitution of the United States. 643-644 - John Shattuck:
Computer Matching Is a Serious Threat to Individual Rights. 645-651 - Richard P. Kusserow:
The Government Needs Computer Matching to Root Out Waste and Fraud. 652-658 - Dorothy E. Denning:
Clipper Chip Will Reinforce Privacy. 659-663 - Marc Rotenberg:
Wiretapping Bill: Costly and Intrusive. 664-668 - Denison Hatch:
Privacy: How Much Data Do Direct Marketers Really Need? 669-678 - Robert Posch:
Direct Marketing Is Not a Significant Privacy Threat. 679-685 - Chris Hibbert:
What to Do When They Ask for Your Social Security Number. 686-696 - Kenneth Laudon:
Markets and Privacy. 697-726 - Rob Kling, Mark S. Ackerman, Jonathan P. Allen:
Information Entrepreneurialism, Information Technologies, and the Continuing Vulnerability of Privacy. 727-743 - Rob Kling:
Systems Safety, Normal Accidents, and Social Vulnerability. 746-763 - R. Aminzade, Michael Slavitch:
RISKS-FORUM Digest Contributions. 764-766 - Jonathan Jacky:
Safety-Critical Computing: Hazards, Practices, Standards, and Regulation. 767-792 - Gary Stix:
Aging Airways. 793-809 - Brian Cantwell Smith:
Limits of Correctness in Computers. 810-825 - Evan Williamson:
Caught in the Grip of RSI: A Firsthand Account. 826-829 - E. M. Omar Khalil, Jessie E. Melcher:
Office Automation's Threat to Health and Productivity: A New Management Concern. 830-837 - Computer Emergency Response Team: Ongoing Network Monitoring Attacks: CERT Advisory, February 3, 1994. 838-843
- Peter G. Neumann:
Risks of Technology. 844-846 - Rob Kling:
Beyond Outlaws, Hackers, and Pirates: Ethical Issues in the Work of Information and Computer Science Professionals. 848-869 - Donn B. Parker, Susan Swope, Bruce N. Baker, Eric A. Weiss:
All in a Day's Work: Nine Provocative Examples in the Practice of Computing Professionals. 870-875 - Ronald E. Anderson, Deborah G. Johnson, Donald Gotterbarn, Judith A. Perrolle:
Codes of Professional Ethics. 876-877 - Ina Wagner:
Confronting Ethical Issues of Systems Design in a Web of Social Relationships. 889-902 - Bo Dahlbom, Lars Mathiassen:
Power in Systems Design. 903-906 - Andrew Clement:
Considering Privacy in the Development of Multimedia Communications. 907-931 - Edward Wenk:
New Principles for Engineering Ethics. 932-944
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.