default search action
First Monday, Volume 8, 2003
Volume 8, Number 1, January 2003
- David M. Nichols, Michael B. Twidale:
The Usability of Open Source Software. - Charles M. Schweik, Andrei Semenov:
The Institutional Design of Open Source Programming: Implications for Addressing Complex Public Policy and Management Problems. - Ruth Garner, Mark Gillingham, Yong Zhao:
Digitizing Old Photographs for the Web. - Noppadol Prammanee:
A Critical Analysis of the Adoption and Utilization of the Internet in Thailand for Educational Purposes. - John S. Quarterman, Ken Harker, Peter H. Salus:
Combat Power and Enterprise Competitiveness. - Indhu Rajagopal, Nis Bojin:
A Gendered World: Students and Instructional Technologies. - Shanthi Kalathil, Taylor C. Boas:
Open Networks, Closed Regimes: The Impact of the Internet on Authoritarian Rule.
Volume 8, Number 2, February 2003
- James Charlton:
Reconciling interiors: The screen as installation. - Steve Mann:
Cyborg logs and collective stream of (de)consciousness capture for producing attribution-free informatic content such as cyborglogs. - Derek Keats:
Collaborative development of open content: A process model to unlock the potential for African universities. - Liza Tsaliki:
Electronic citizenship and global social movements. - K. O. Jagboro:
A study of Internet usage in Nigerian universities: A case study of Obafemi Awolowo University, Ile-Ife, Nigeria. - Robin van Koert:
E-media in development: Combining multiple e-media types. - Hellen Megens, Brian Martin:
Cybermethods: An assessment.
Volume 8, Number 3, March 2003
- Brian Kahin:
Information process patents in the U.S. and Europe: Policy avoidance and policy divergence. - Jonathan Sallet:
Just how open must an open network be for an open network to be labeled "open"? - Joseph J. Esposito:
The processed book. - Elizabeth Davison, Shelia R. Cotten:
Connection discrepancies: Unmasking further layers of the digital divide. - Simson L. Garfinkel:
Leaderless resistance today.
Volume 8, Number 4, April 2003
- Rishab Aiyer Ghosh:
Clustering and dependencies in free/open source software development: Methodology and tools. - Nina Koiso-Kanttila:
Consumers on the Web: Identification of usage patterns. - Samuel Gitta, J. R. Ikoja-Odongo:
The impact of cybercafés on information services in Uganda. - Mark A. Fox, Larry Phillips, Ganesh Vaidyanathan:
Managing Internet gambling in the workplace. - Loong Wong:
Belonging and diaspora: The Chinese and the Internet. - Kate Williams:
Research note: Across the United States, 85, 000 to 144, 000 public computing sites. - Book reviews.
Volume 8, Number 5, May 2003
- Robert Coonrod:
Creating the Digital Future. - Allison Druin, Benjamin B. Bederson, Ann Weeks, Allison Farber, Jesse Grosjean, Mona Leigh Guha, Juan Pablo Hourcade, Juhyun Lee, Sabrina Liao, Kara Reuter, Anne Rose, Yoshifumi Takayama, Lingling Zhang:
The International Children's Digital Library: Description and analysis of first use. - Jeffrey C. Hall:
The Lowell Observatory Public Astronomical Research Center. - P. Bryan Heidorn, Lesley Deem:
OpenKey: Illinois-North Carolina Collaborative Environment for Botanical Resources. - Michael A. Keller, Victoria A. Reich, Andrew C. Herkovic:
What is a library anymore, anyway? - William A. Penn, Martha J. Hanson:
The Syracuse University Library Radius Project: Development of a non-destructive playback system for cylinder recordings. - Abby Smith:
Issues in sustainability: Creating value for online users. - Gerry Wall:
Business model issues in the development of digital cultural content.
Volume 8, Number 6, June 2003
- Lada A. Adamic, Orkut Buyukkokten, Eytan Adar:
A social network caught in the Web. - Chiou-Pirng Wang, KwaiChow Chan:
Analyzing the taxonomy of Internet business models using graphs. - Matthew Rimmer:
The dead poets society: The copyright term and the public domain. - Terrence A. Maxwell:
Toward a model of information policy analysis: Speech as an illustrative example. - Frederick Schiff:
Business models of news Web sites: A survey of empirical trends and expert opinion. - Book reviews.
Volume 8, Number 7, July 2003
- Yashmeet Khopkar, Amanda Spink, C. Lee Giles, Prital Shah, Sandip Debnath:
Search engine personalization: An exploratory study. - John Logie:
A copyright cold war? The polarized rhetoric of the peer-to-peer debates. - Joan Starr:
Information politics: The story of an emerging metadata standard. - Peter Millward:
The 'grey digital divide': Perception, exclusion and barriers of access to the Internet for older people. - Sebnem Cilesiz, Richard E. Ferdig:
Expressiveness and conformity in Internet-based polls. - Begoña Gros:
The impact of digital games in education.
Volume 8, Number 8, August 2003
- Ken Jordan, Jan Hauser, Steven Foster:
The Augmented Social Network: Building identity and trust into the next-generation Internet. - Critical Friends of Technology: A social ecology of wireless technology.
- Frank Rennie, Robin Mason:
The ecology the connecticon. - Magnus Cedergren:
Open content and value creation.
Volume 8, Number 9, September 2003
- Andrew M. Odlyzko:
The many paradoxes of broadband. - Paul T. Jaeger, Gary Burnett:
Curtailing online education in the name of homeland security: The USA PATRIOT Act, SEVIS, and international students in the United States. - Trevor Tompkins, Dan Handley:
Giving e-mail back to the users: Using digital signatures to solve the spam problem. - An Nguyen:
The current status and potential development of online news consumption: A structural approach. - Leroy McFarlane, Paul Bocij:
An exploration of predatory behaviour in cyberspace: Towards a typology of cyberstalkers. - Larry Press:
Wireless Internet connectivity for developing nations. - Ruth Garner, Mark Gillingham, Yong Zhao:
Writing photo captions for the Web. - Book reviews.
Volume 8, Number 10, October 2003
- Marc Bogdanowicz, Jean Claude Burgelman, Clara Centeno, Elissaveta Gourova, Gerard Carat:
Factors of regional/national success in information society developments: Information society strategies for candidate countries. - John Ewing:
Copyright and authors. - Brent K. Jesiek:
Democratizing software: Open source, the hacker ethic, and beyond. - Linda Leung:
Where am I and who are 'we'?: Self-representation and the intersection of gender and ethnicity on the Web. - Derek Keats, Maria Beebe, Gunnar Kullenberg:
Using the Internet to enable developing country universities to meet the challenges of globalization through collaborative virtual programmes. - Lorraine Normore:
Studying special collections and the Web: An analysis of practice. - Paul Bocij:
Victims of cyberstalking: An exploratory study of harassment perpetrated via the Internet.
Volume 8, Number 11, November 2003
- Claudia Herbst:
Coding the classroom: Technology and the practice of language. - Michael Blakemore, Roderic Dutton:
e-Government, e-Society and Jordan: Strategy, theory, practice, and assessment. - W. Sean McLaughlin:
The use of the Internet for political action by non-state dissident actors in the Middle East. - Christopher May:
Digital rights management and the breakdown of social norms. - Lori N. K. Leonard:
Acquiring goods and services via the Internet: Consumer shopping perceptions. - Jordi Carrasco-Munoz:
The open code market. - Book reviews.
Volume 8, Number 12, December 2003
- Kylie J. Veale:
Internet gift economies: Voluntary payment schemes as tangible reciprocity. - William J. McIver Jr., William F. Birdsall, Merrilee Rasmussen:
The Internet and the right to communicate. - Rishab Aiyer Ghosh:
Licence fees and GDP per capita: The case for open source in developing countries. - Noriko Hara, Zilia Estrada:
Hate and peace in a connected world: Comparing MoveOn and Stormfront. - Federico Iannacci:
The Linux managing model. - Barbara J. Crump, Andrea McIlroy:
The digital divide: Why the "don't-wants-tos" won't compute: Lessons from a New Zealand ICT project. - Michael Gurstein:
Effective use: A community informatics strategy beyond the Digital Divide. - Andrea Ciffolilli:
Phantom authority, self-selective recruitment and retention of members in virtual communities: The case of Wikipedia.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.