Infrastructures and Their Invisible Carnivalesque

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Invisible Social Infrastructures to Facilitate Time-pressed Distributed Organizing

How do complex societal demands and time constraints posed by distributed temporary organizing affect organizational communication? Extending Bowker and Star’s (2002) work on infrastructures, we introduce two context-specific ‘invisible’, social infrastructures: organizational and relational. We empirically assess their role in an international, multi-site ERP-software implementation. We invest...

متن کامل

Infrastructures and Their Discontents: Implications for Ubicomp

Infrastructures (persistent socio-technical systems over which services are delivered) are normally taken for granted by their users, but are powerful forces of constraint and enablement with implications for the design, use, and adoption of ubiquitous computing. To approach the study of infrastructure from an ethnographic perspective, we conducted an exploratory field study of people for whom ...

متن کامل

The Carnivalesque and the Grotesque in Elizabeth Bishop's Poetry

Elizabeth Bishop (1911-1979) was a Pulitzer-prize winning American poet who did not produce much published work in her career. This was partly due to her low confidence, depression, alcoholism, and difficult personal life, but it was also due to her meticulousness as a poet. Colleagues and critics praised her strong description and mastery of technique, but criticized her early work as lacking ...

متن کامل

A Brief Introduction to Certificateless Encryption Schemes and Their Infrastructures

Certificateless encryption is a form of public-key encryption that is designed to eliminate the disadvantages of both traditional PKIbased public-key encryption scheme and identity-based encryption. Unlike public-key encryption, there is no requirement for digital certificates or a public-key infrastructure. Unlike identity-based encryption, the trusted third party need not be given the ability...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SSRN Electronic Journal

سال: 2017

ISSN: 1556-5068

DOI: 10.2139/ssrn.3003525