The Three Ages of Internet Studies: Ten, Five and Zero Years Ago
نویسنده
چکیده
PRE-HISTORY, 10 YEARS AGO Permit me as a tribal elder to exceed my bounds and think back to the state of scholarship in our field 10 years ago. Although Murray Turoff and Roxanne Hiltz had published their prophetic The Network Nation in 1978, it was pre-internet history then. As one of the first social scientists to be involved in internet research, I went to biannual gatherings of the then-tribe: CSCW (computer-supported cooperative work), conferences that were dominated by computer scientists writing ‘groupware’ applications. Lotus Notes derivations were in vogue. Lab studies were the predominant research method of choice, summarized in Lee Sproull and Sara Kiesler’s Connections (1991). I remember standing lonely and forlorn at the microphone during a comments period at the CSCW 1992 conference. Feeling extremely frustrated, I exclaimed:
منابع مشابه
A Comparative Study of the Current Status of Iranian Universities Intramural Sport Programs with ten year ago
The purpose of this study was comparing the current status of intramural program Iranian universities with ten years ago. In this study, the status of Intramural Program of Iranian Universities in three fields (educational, recreational, championship sport) regarding the number of implemented programs and participants in intramural program and active sports were compared. For investigation of s...
متن کاملبررسی روایی و پایایی ویرایش فارسی پرسشنامه استفاده آسیبزا از اینترنت
Background and Objectives: This study assessed the validity and reliability of the Persian version of the standard "Problematic Internet Use" questionnaire to be used in epidemiological studies. Methods: This cross-sectional study was performed in 2016. This questionnaire comprises five domains, including preference for online social interaction, mood regulation, cognitive preoccupation, compu...
متن کاملTowards Better Definitions and Measures of Internet Security
The conventional wisdom is that “the Internet is very insecure.” The subtitle of this workshop, namely “deployment obstacles,” implies that network owners, operators, and users could have solved pervasive security problems if they had deployed existing security technology. Is there solid evidence that either of these statements is true? Clearly, there have been some well publicized Internet sec...
متن کاملنگاهی به تجربیات کشورهای دیگر در زمینه کنترل کیست هیداتید
Background and Aim:There are a number of successful examples of hydatid cyst control, achieved on a national or regional scale in different countries. The earliest successful program was that in Iceland initiated nearly 143 years ago when cystic hydatid disease was recognized as affecting approximately one of every six Icelanders. With a continuous campaign, by the 1950s hydatidosis was consid...
متن کاملAnalyze the Effect of the Maintenance Activities on the Internet Sustainability by Using 2k Factorial Experiment Design
Nowadays, the internet and social networks become more popular than ever. People in all ages use the internet and communicate by that. One of the most terrible events in our daily life is to disconnect from the internet and lose the connections. It may also influence on the economics; so the sustainability in this area is necessary. Internet service provider companies are the executors of selli...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- New Media & Society
دوره 6 شماره
صفحات -
تاریخ انتشار 2004