SEARCH

SEARCH BY CITATION

References

  • Note: A list of the RFC documents cited follows this list of scholarly references.
  • Abbate, J. (1999). Inventing the Internet. Cambridge, MA: MIT Press. Academic Press.
  • Benoliel, D. (2004). Technological standards, inc.: Rethinking cyberspace regulatory epistemology, California Law Review, 92, 10691116.
  • Berkowitz, B. D. & Goodman, A. E. (2000). Best truth: Intelligence in the information age. New Haven, CT: Yale University Press.
  • Biegel, S. (2001). Beyond our control? Confronting the limits of our legal system in the age of cyberspace. Cambridge, MA: MIT Press.
  • Bijker, W. E. (1995). Of bicycles, bakelites, and bulbs: Toward a theory of sociotechnical change. Cambridge, MA: MIT Press.
  • Bijker, W. & Law, J. (Eds.). (1992). Shaping technology/Building society: Studies in sociotechnical change. Cambridge, MA: MIT Press.
  • Bowker, G. C. (1994). Science on the run: Information management and industrial geophysics at Schlumberger, 1920-1940. Cambridge, MA: MIT Press.
  • Bruce, R. R., Cunard, J. P., & Director, M. D. (1986). From telecommunications to electronic services: A global spectrum of definitions, boundary lines, and structures. London: Butterworths.
  • Bullard, C. W. (1988). Management and control of modern technologies, Technology in Society, 10, 205232.
  • Burk, D. L. (2005). Legal and technical standards in digital rights management technology, Fordham Law Review, 74, 537573.
  • Cowhey, P. F. (1990). The international telecommunications regime: The political roots of regimes for high technology, International Organization, 45(2), 169199.
  • Davidson, A., Morris, J., & Courtney, R. (2002). Strangers in a strange land: Public interest advocacy and Internet standards. Presented to the Telecommunications Policy Research Conference, Arlington, VA, September.
  • Davis, L. J. (1983). Factual fictions. New York: Columbia University Press.
  • De Landa, M. (1991). War in the age of intelligent machines. New York: Zone.
  • Demchak, C. C. (1991). Military organizations, complex machines: Modernization in the US armed services. Ithaca, NY: Cornell University Press.
  • Dutton, W. (1990). The political implications of communications technology: Challenge to power? In J.Berleur, A.Clement, R.Sizer, & D.Whitehouse (Eds.), The information society: Evolving landscapes, pp. 173195. New York: Springer Verlag.
  • Dyson, G. (1997). Darwin among the machines: The evolution of global intelligence. New York: Basic Books.
  • Ewers, L., Kubbilun, W., Lia, L. J., & Schwenk, J. (2005). Secure XMail or how to get rid of legacy code in secure e-mail applications, Communications and Multimedia Security, 3677, 291300.
  • Ferguson, M. (Ed.). (1986). New communication technologies and the public interest: Comparative perspectives on policy and research. Beverly Hills, CA: Sage.
  • Fortunati, L. (2006). User design and the democratization of the mobile phone, First Monday, 11(9), http://firstmonday.org/issues/special11_9/fortunati/index.html.
  • Friedman, B., (Ed.). (2004). Human values and the design of computer technology. Oxford, UK: Cambridge University Press.
  • Froomkin, M. (2000). Wrong turn in cyberspace: Using ICANN to route around the APA and the Constitution, Duke Law Journal, 50, 17184.
  • Galloway, A. (2004). Protocol: How control exists after decentralization. Cambridge, MA: MIT Press.
  • Giddens, A. (1984). The constitution of society: Outline of the theory of structuration. Berkeley, CA: University of California Press.
  • Gorman, S. P. & Malecki, E. J. (2000). The networks of the Internet: An analysis of provider networks in the USA, Telecommunications Policy, 24, 113134.
  • Haigh, T. (2004). The history of computing: An introduction for the computer scientist. In A.Akera & W.Aspray (Eds.), Using history to teach computer science and related disciplines, pp. 526. Computing Research Association.
  • Hampton, G. (2004). Enhancing public participation through narrative analysis, Policy Sciences, 37(3-4), 261276.
  • Hanseth, O., Monteiro, E., & Hatling, M. (1996). Developing information infrastructure: The tension between standardization and flexibility, Science, Technology, & Human Values, 21(4), 407426.
  • Horwitz, R. (1989). The irony of regulatory reform. Oxford: Oxford University Press.
  • Kahin, B. (1994). Networks, standards, and intellectual property: The fabric of information infrastructure. In 20/20 vision: The development of a national information infrastructure. Washington, DC: U.S. Department of Commerce.
  • Kahin, B., & Keller, J. (Eds.). (1997). Public access to the Internet. Cambridge, MA: MIT Press.
  • Kaye, H. S. (2000/2006). Computer and Internet use among people with disabilities. National Institute on Disability and Rehabilitation Research, U.S. Department of Education. Updated on website at http://rtc.ruralinstitute.umt.edu/TelCom/computer.htm.
  • Kling, R. (1980). Social analyses of computing: Theoretical perspectives in recent empirical research, Computing Surveys, 12(1), 61110.
  • Kling, R. (Ed.) (1996). Computerization and controversy: Value conflicts and social choices, 2d ed. San Diego, CA: Academic Press.
  • Langlois, G. M. (2005). Networks and layers: Technocultural encodings of the World Wide Web, Canadian Journal of Communication, 30(4), available online at http://www.cjc-online.ca/viewarticle.php?id=1586.
  • Latour, B. (2005). Reassembling the social: An introduction to actor-network-theory. Oxford: Oxford University Press.
  • Latzer, M. (1989). Austrian telecom policy: Current issues, Transnational Data Report, 12(3), 1214.
  • Law, J. & Hassard, J. (Eds.). (1999). Actor network theory and after. Oxford, UK: Blackwell.
  • Layton, E. T. Jr. (1974). Technology as knowledge, Technology and Culture, 15(1), 3141.
  • Lessig, L. (1999). Code and other laws of cyberspace. New York: Basic Books.
  • Lipartito, K. (1989). The Bell system and regional business: The telephone in the South, 1877-1920. Baltimore, MD: The Johns Hopkins University Press.
  • Loshin, P. (2000). Big book of lightweight directory access protocol (LDAP) RFCs. San Diego: Academic Press.
  • Mansell, R. (1993). The new telecommunications: A political economy of network evolution. London: Sage Publications.
  • Mansell, R. & Silverstone, R. (Eds.). (1996). Communication by design: The politics of information and communication technologies. Oxford: Oxford University Press.
  • March, J. G. & Simon, H. A. (1963). Organizations. New York/London: John Wiley & Sons.
  • Morris, J. & Davidson, A. (2003). Policy impact assessments: Considering the public interest in Internet standards development. Presented to the Telecommunications Policy Research Conference, Alexandria, VA, September.
  • Mueller, M. L. (2002). Ruling the root: Internet governance and the taming of cyberspace. Cambridge, MA: MIT Press.
  • Mueller, M. L. & Chango, M. (2007). The DNS as a tool for global identity policy: WHOIS, ICANN, and global internet governance. Presented to the Telecommunications Policy Research Conference, Arlington, VA, September.
  • Mumford, L. (1964). Authoritarian and democratic technics, Technology and Culture, 5(1), 18.
  • Noam, E. M. (1994). Beyond liberalization: From the network of networks to the system of systems, Telecommunications Policy, 18(4), 286294.
  • Nora, S. & Minc, A. (1980). The computerization of society. Cambridge, MA: MIT Press.
  • Orlikowski, W. & Barley, S. R. (2001). Technology and institutions: What can research on information technology and research on organizations learn from each other? MIS Quarterly, 25(2), 145166.
  • Ouyang, C. & Billington, J. (2004). Formal analysis of the Internet Open Trading Protocol, Applying formal methods: Testing, performance, and m/e-commerce, Proceedings, 3236, 115.
  • Pau, L.-F. (2002). A business evaluation of the next generation Ipv6 protocol in fixed and mobile communication services: An analytical study and calculation. Rotterdam, The Netherlands: Rotterdam School of Management, Erasmus Research Institute of Management Report Series ERS-2002-78-LIS.
  • Pearton, M. (1984). Diplomacy, war and technology since 1870. Lawrence, KS: University Press of Kansas.
  • Pircher, W. (1987). Tours through the back-country of imperfectly informed society. In Slack & Fejes, pp. 6377.
  • Pool, I. de S. (1983). Technologies of freedom. Cambridge, MA: Belknap Press.
  • Qvortrup, L. (1988). The challenges of telematics: Social experiments, social informatics, and orgware architecture. In G.Muskens & J.Gruppelaar, Global telecommunications networks: Strategic considerations, pp. 159170. Dordrecht, The Netherlands: Kluwer Academic Publishers.
  • Ramachandran, A., Feamster, N., & Vempala, S. (2007). Filtering spam with behavioral blacklisting. Presented to the 14th ACM Conference on Computer and Communications Security, Alexandria, pp. 342351.
  • Reidenberg, J. R. (1998). Lex informatica: The formulation of information policy through technology, Texas Law Review, 76, 553593.
  • Rosenzweig, R. (1998). Wizards, bureaucrats, warriors, and hackers: Writing the history of the Internet, The American Historical Review, 103(5), December, 15301552.
  • Rutkowski, A. (1983). The Integrated Services Digital Network: Issues and options for the future, Jurimetrics Journal, 24(1), 1942.
  • Saklikar, S. & Saha, S. (2007). Identity federation for VoIP-based services. Presented to DIM '07, Fairfax, VA, November.
  • Salus, P. H. (1995). Casting the Net: From ARPANET to INTERNET and beyond. New York: Addison-Wesley.
  • Schacham, R., Schulzrinne, H., Thakolsri, S., & Kellerer, W. (2007). Ubiquitous device personalization and use: The next generation of IP multimedia communications, ACM Transactions on Multimedia Computing, Communications and Applications, 3(2), article 12, doi.acm.org/10.1145/1230812.1230818.
  • Schlesinger, E. (2004). Theories of cyber-sociology: Communicating culture through codes, Cardozo Journal of International and Comparative Law, 12, 547559.
  • Schneiderman, B. & Rose, A. (1995). Social impact statements: Engaging public participation in information technology design. In Proceedings, Symposium on Computers and the Quality of Life, pp. 9096. Philadelphia, PA: Association of Computing Machinery.
  • Shah, R. C. & Kesan, J. P. (2004). Recipes for cookies: The role of institutions in shaping the development of communication technologies. Illinois Public Law Research Paper No. 04-14.
  • Solum, L. B. & Chung, M. (2004). The layers principle: Internet architecture and the law, Notre Dame Law Review, 79, 815948.
  • Star, S. L. (1989). The ethnography of infrastructure, American Behavioral Scientist, 43(3), 377391.
  • Star, S. L. & Ruhleder, K. (1996). Steps toward an ecology of infrastructure: Design and access for large information spaces, Information Systems Research, 7(1), 111134.
  • Starr, J. (2005). Design considerations for multilingual web sites, Information Technology and Libraries, 24(3), 107116.
  • Suchman, L. (2006). Human and machine reconfigurations: Plans and situated actions, 2d ed. Cambridge: Cambridge University Press.
  • Taylor, R. (2006, April 7). China wrestles with online gamers, BBC News, news.bbc.co.uk/go/pr/fr/-/2/hi/programmes/click_online/4887236.stm.
  • Taylor, T. L. (2006). Beyond management: Considering participatory design and governance in player culture, First Monday, 11(9), http://firstmonday.org/issues/special11_9/taylor/index.html.
  • Tengelin, V. (1981). The vulnerability of the computerised society (the Tengelin Report). In H. P.Gassmann (Ed.), Information, computer and communications policies for the 80s, pp. 205213. Amsterdam: North-Holland Publishing Co.
  • Tennenhouse, D. (2000). Proactive computing, Communications of the ACM, 43(5), 4350.
  • Trubow, G. (1989). Watching the watchers: The coordination of federal privacy policy. Washington, DC: Benton Foundation.
  • Tuomi, I. (2004). Economic productivity in the knowledge society: A critical review of productivity theory and the impacts of ICT, First Monday.
  • Warschauer, M. (2000). Language, identity, and the Internet. In L.Nakamura & G.Rodman (Eds.), Race in cyberspace, pp. 151170. New York: Routledge.
  • Wasik, M. J. (1991). Crime and the computer. Oxford: Clarendon Press.
  • Whitley, E. A. & Hosein, I. (2005). Policy discourse and data retention: The technology politics of surveillance in the United Kingdom, Telecommunications Policy, 29(11), 857874.
  • Winner, L. (1986). Do artifacts have politics? In L.Winner, The whale and the reactor (pp. 1939). Chicago: The University of Chicago Press
  • Winter, J. S. (2006). Public involvement in technology policy, Computers and Society, 36(3), 4958.
  • Yu, P. K. (2004). The origins of ccTLD policymaking, Cardozo Journal of International and Comparative Law, 12, 387408.