[1] 韦伯斯特.信息社会理论(第三版)[M].曹晋,梁静,李哲,等译.北京: 北京大学出版社,2001.
[2] 吴正荆,靖继鹏,孙成江. 信息社会学理论范式研究[J].情报科学,2008,26(8):1135-1139.
[3] 吴正荆. 信息社会学研究内容、理论范式与学科体系研究[D].长春:吉林大学,2007:171-181.
[4] Frické M. Big data and its epistemology[J]. Journal of the Association for Information Science and Technology, 2015, 66(4): 651-661.
[5] Hilbert M. What is the content of the world's technologically mediated information and communication capacity: How much text, image, audio, and video?[J]. The Information Society, 2014, 30(2): 127-143.
[6] Constantinides P, Barrett M. Information infrastructure development and governance as collective action[J]. Information Systems Research, 2014, 26(1): 40-56.
[7] Frieden R. Identifying best practices in financing next generation networks[J]. The Information Society, 2013, 29(4): 234-247.
[8] Jayakar K, Liu Chun, Madden G, et al. Promoting broadband and ICT access for disabled persons: Comparative analysis of initiatives in asia-pacific region[J]. The Information Society, 2015, 31(4): 299-314.
[9] Fichman R G, Dos Santos B L, Zheng Zhiqiang. Digital innovation as a fundamental and powerful concept in the information systems curriculum[J]. MIS Quarterly, 2014, 38(2): 329-353.
[10] Yaraghi N, Du A Y, Sharman R, et al. Health information exchange as a multisided platform: Adoption,usage, and practice involvement in service co-production [J]. Information Systems Research, 2014, 26(1): 1-18.
[11] Kallinikos J, Tempini N. Patient data as medical facts: Social media practices as a foundation for medical knowledge creation[J]. Information Systems Research, 2014, 25(4): 817-833.
[12] Veinot T C. Regional HIV/AIDS information environments and information acquisition success[J]. The Information Society, 2013, 29(2): 88-112.
[13] Douglass K, Allard S, Tenopir C, et al. Managing scientific data as public assets: Data sharing practices and policies among full-time government employees[J]. Journal of the Association for Information Science and Technology, 2014, 65(2): 251-262.
[14] Dougherty M, Meyer E T. Community, tools, and practices in Web archiving: The state-of-the-art in relation to social science and humanities research needs[J]. Journal of the Association for Information Science and Technology, 2014, 65(11): 2195-2209.
[15] Zhang Yin, Kudva S. E-books versus print books: Readers' choices and preferences across contexts[J]. Journal of the Association for Information Science and Technology, 2014, 65(8): 1695-1706.
[16] Kuilema J. Social workers and broadband advocacy social justice and information communications technologies[J]. Social Science Computer Review, 2013, 31(3): 291-305.
[17] Baron N S. Shall we talk? Conversing with humans and robots[J]. The Information Society, 2015, 31(3): 257-264.
[18] Jarrahi M H, Sawyer S. Theorizing on the take-up of social technologies, organizational policies and norms, and consultants' knowledge-sharing practices[J]. Journal of the Association for Information Science and Technology, 2015, 66(1): 162-179.
[19] Jin Tao, Ju Boryung.The corporate information agency: Do competitive intelligence practitioners utilize it?[J]. Journal of the Association for Information Science and Technology, 2014, 65(3): 589-608.
[20] Yuan Y C, Zhao Xuan, Liao Qinying, et al. The use of different information and communication technologies to support knowledge sharing in organizations: From e-mail to micro-blogging[J]. Journal of the American Society for Information Science and Technology, 2013, 64(8): 1659-1670.
[21] Karunakaran A, Reddy M C, Spence P R. Toward a model of collaborative information behavior in organizations[J]. Journal of the American Society for Information Science and Technology, 2013, 64(12): 2437-2451.
[22] Shen Cuihua, Williams D. The evolution of social ties online: A longitudinal study in a massively multiplayer online game[J]. Journal of the Association for Information Science and Technology, 2014, 65(10): 2127-2137.
[23] Lang A. Dynamic human-centered communication systems theory[J]. The Information Society, 2014, 30(1): 60-70.
[24] Chen Wenhong. Internet use, online communication, and ties in Americans' networks[J]. Social Science Computer Review, 2013, 31(4): 404-423.
[25] Chan J, Ghose A. Internet's dirty secret: Assessing the impact of online intermediaries on HIV transmission[J]. MIS Quarterly, 2013, 38(4): 955-976.
[26] Oh O, Agrawal M, Rao H R. Community intelligence and social media services: A rumor theoretic analysis of tweets during social crises[J]. Mis Quarterly, 2013, 37(2): 407-426.
[27] Cole S H, Hooley J M. Clinical and personality correlates of MMO gaming: Anxiety and absorption in problematic Internet use[J]. Social Science Computer Review, 2013,31(4):424-436.
[28] George J F, Carlson J R, Valacich J S. Media selection as a strategic component of communication [J].MIS Quarterly, 2013, 37(4): 1233-1251.
[29] Capra R, Khanova J, Ramdeen S. Work and personal e-mail use by university employees: PIM practices across domain boundaries[J]. Journal of the American Society for Information Science and Technology, 2013, 64(5): 1029-1044.
[30] Potnis D D. Beyond access to information: Understanding the use of information by poor female mobile users in rural India[J]. The Information Society, 2015, 31(1): 83-93.
[31] McCaughey D, Baumgardner C, Gaudes A, et al. Best practices in social media utilizing a value matrix to assess social media's impact on health care[J]. Social Science Computer Review, 2014, 32(5): 575-589.
[32] Pick J, Nishida T, Zhang Xi. Determinants of China's technology availability and utilization 2006-2009: A spatial analysis[J]. The Information Society, 2013, 29(1): 26-48.
[33] Chen Wenhong. The Implications of social capital for the digital divides in America[J]. The Information Society,2013, 29(1): 13-25.
[34] Chen Wenhong, Lee K H, Straubhaar J D, et al. Getting a second opinion: Social capital, digital inequalities, and health information repertoires[J]. Journal of the Association for Information Science and Technology, 2014, 65(12): 2552-2563.
[35] Campos-Castillo C. Revisiting the first-level digital divide in the united states gender and race/ethnicity patterns, 2007-2012[J]. Social Science Computer Review,2015, 33(4): 423-439.
[36] Park Y J. Offline status,online status reproduction of social categories in personal information skill and knowledge[J]. Social Science Computer Review, 2013, 31(6): 680-702.
[37] Rui J R, Covert J M, Stefanone M A, et al. A communication multiplexity approach to social capital on-and offline communication and self-esteem[J]. Social Science Computer Review,2015, 33(4): 498-518..
[38] Napoli P M, Obar J A. The emerging mobile internet underclass: A critique of mobile Internet access[J]. The Information Society, 2014, 30(5): 323-334.
[39] Bouchillon B C. Social ties and generalized trust, online and in person: Contact or conflict-the mediating role of bonding social capital in America[J]. Social Science Computer Review,2014, 32(4): 506-523.
[40] Monforti J L, Marichal J. The role of digital skills in the formation of generalized trust among Latinos and African Americans in the United States[J]. Social Science Computer Review, 2014, 32(1): 3-17.
[41] Lingel J. Information practices of urban newcomers: An analysis of habits and wandering[J]. Journal of the Association for Information Science and Technology, 2015, 66(6): 1239-1251.
[42] Baron L F, Neils M, Gomez R. Crossing new borders:Computers, mobile phones, transportation, and English language among Hispanic day laborers in Seattle, Washington[J]. Journal of the Association for Information Science and Technology, 2014, 65(1): 98-108.
[43] Lingel J. "Keep it secret, keep it safe": Information poverty, information norms, and stigma[J]. Journal of the American Society for Information Science and Technology, 2013, 64(5): 981-991.
[44] Lindenthal T. Valuable words: The price dynamics of Internet domain names[J]. Journal of the Association for Information Science and Technology, 2014, 65(5): 869-881.
[45] Proffitt J M, Ekbia H R, McDowell S D. Introduction to the special forum on monetization of user-generated content-marx revisited[J]. The Information Society, 2015, 31(1): 1-4.
[46] Andrejevic M. Personal Data: Blind spot of the "Affective Law of Value"?[J]. The Information Society, 2015, 31(1): 5-12.
[47] Schulzke M. The virtual culture industry: Work and play in virtual worlds[J]. The Information Society, 2014, 30(1): 20-30.
[48] Holt T J. Examining the forces shaping cybercrime markets online[J]. Social Science Computer Review, 2013, 31(2): 165-177.
[49] Levy K E C. The contexts of control: Information, power, and truck-driving work[J]. The Information Society, 2015, 31(2): 160-174.
[50] Harvey M J, Harvey M G. Privacy and security issues for mobile health platforms[J]. Journal of the Association for Information Science and Technology, 2014, 65(7): 1305-1318.
[51] Rubel A, Biava R. A framework for analyzing and comparing privacy states[J]. Journal of the Association for Information Science and Technology, 2014, 65(12): 2422-2431.
[52] Popescu M, Baruh L. Captive but mobile: Privacy concerns and remedies for the mobile environment[J]. The Information Society, 2013, 29(5): 272-286.
[53] Brubaker J R, Hayes G R, Dourish P. Beyond the grave: Facebook as a site for the expansion of death and mourning[J]. The Information Society, 2013, 29(3): 152-163.
[54] Church S H. Digital gravescapes: Digital memorializing on Facebook[J]. The Information Society, 2013, 29(3): 184-189.
[55] Lingel J. The digital remains: Social media and practices of online grief[J]. The Information Society, 2013, 29(3): 190-195.
[56] PytlikZillig L M, Wang Shiyuan, Soh L K, et al. Exploring reactions to hacktivism among STEM college students: A preliminary model of hacktivism support and resistance[J]. Social Science Computer Review,2015, 33(4): 479-497.
[57] Filas M. My dinner with stelarc: A review of techno-flesh hybridity in art[J]. The Information Society, 2013, 29(5): 287-296.
[58] Wen Wen, Forman C, Graham S J H. The impact of intellectual property rights enforcement on open source software project success[J]. Information Systems Research, 2013, 24(4):1131-1146.
[59] Tunca T I, Wu Qiong. Fighting fire with fire: Commercial piracy and the role of file sharing on copyright protection policy for digital goods[J]. Information Systems Research, 2013, 24(2): 436-453.
[60] Houston R, Westbrook L. Information-based mitigation of intimate partner violence[J]. Journal of the American Society for Information Science and Technology, 2013, 64(8): 1694-1706.
[61] Fichman P, Sanfilippo M R. The bad boys and girls of cyberspace how gender and context impact perception of and reaction to trolling[J]. Social Science Computer Review, 2015, 33(2): 163-180.
[62] Bauer J M, Obar J A. Reconciling political and economic goals in the net neutrality debate[J]. The Information Society, 2014, 30(1): 1-19.
[63] Herman B D, Kim M. The Internet defends itself: The network neutrality debate on the Web[J]. The Information Society, 2014, 30(1): 31-44.
[64] Oltmann S M. Data, censorship, and politics: Analyzing the restricted flow of information in federal scientific policy development[J]. Journal of the Association for Information Science and Technology, 2015, 66(1): 144-161.
[65] Taneja H, Wu A X. Does the Great Firewall really isolate the Chinese? Integrating access blockage with cultural factors to explain Web user behavior[J]. The Information Society, 2014, 30(5): 297-309.
[66] Towner T L. All political participation is socially networked? New media and the 2012 election[J]. Social Science Computer Review, 2013, 31(5): 527-541.
[67] Gulati G J, Williams C B. Social media and campaign 2012 developments and trends for Facebook adoption[J]. Social Science Computer Review, 2013, 31(5): 577-588.
[68] Morris D S, Morris J S. Digital inequality and participation in the political process real or imagined?[J]. Social Science Computer Review, 2013, 31(5): 589-600.
[69] Hawthorne J, Houston J B, McKinney M S. Live-tweeting a presidential primary debate:Exploring new political conversations[J]. Social Science Computer Review,2013, 31(5): 552-562.
[70] Srinivasan R. Bridges between cultural and digital worlds in revolutionary Egypt[J]. The Information Society, 2013, 29(1): 49-60.
[71] Srinivasan R. What Tahrir square has done for social media: A 2012 snapshot in the struggle for political power in Egypt[J]. The Information Society, 2014, 30(1): 71-80.
[72] Hu Guangwei, Pan Wenwen, Lin Hui, et al. Study on the Framework of e-Government services capability: An empirical investigation[J]. Social Science Computer Review,2014, 32(1): 56-73.
[73] Gable M. Efficiency, participation, and quality: Three dimensions of e-government?[J]. Social Science Computer Review, 2015, 33(4): 519-532.
[74] Pang Min-Seok, Tafti A R, Krishnan M S. Information technology and administrative efficiency in US state governments-A stochastic frontier approach[EB/OL].[2015-09-10].http://ssrn.com/abstract=1612820.
[75] Crooks A, Masad D, Croitoru A, et al. International relations state-driven and citizen-driven networks[J]. Social Science Computer Review, 2014, 32(2): 205-220.
[76] 贝尔. 后工业社会的来临——对社会预测的一项探索[M]. 高铦, 王宏周, 魏章玲,译. 北京:商务印书馆, 1986. |