Bibliography

    tags: diss
    December 16th, 2022

    Abbate, J. (2012).Recoding gender: Women’s changing participation in computing (history of computing). The MIT Press. https://mitpress.mit.edu/9780262304535/ [abbate2012recoding]

    Ames, M. (2019).The charisma machine : The life, death, and legacy of one laptop per child. The MIT Press. [ames2019charisma]

    Ananny, M., & Crawford, K. (2018). Seeing without knowing: Limitations of the transparency ideal and its application to algorithmic accountability.New Media & Society,20 (3), 973–989. https://doi.org/10.1177/1461444816676645 [ananny2016seeing]

    Andalibi, N., & Bowen, K. (2022). Internet-based information behavior after pregnancy loss: Interview study.JMIR Form Res,6 (3), e32640. https://doi.org/10.2196/32640 [andalibi2022internet]

    Andalibi, N., & Garcia, P. (2021). Sensemaking and coping after pregnancy loss.Proc. ACM Hum.-Comput. Interact.,5 (CSCW1), 1–32. https://doi.org/10.1145/3449201 [andalabi2021sensemaking]

    Antin, J., & Cheshire, C. (2010). Readers are not free-riders: Reading as a form of participation on wikipedia.Proceedings of the 2010 Acm Conference on Computer Supported Cooperative Work, 127–130. https://doi.org/10.1145/1718918.1718942 [antin2010readers]

    Aranda, J. (2010).A theory of shared understanding for software organizations [PhD thesis, University of Toronto]. https://tspace.library.utoronto.ca/bitstream/1807/26150/6/ArandaGarcia_Jorge_201011_PhD_thesis.pdf [aranda2010theory]

    Avgustinov, P. (2021).Improving github code search | the github blog. https://github.blog/2021-12-08-improving-github-code-search/ . [avgustinov2021improving]

    Avnoon, N. (2021). Data scientists’ identity work: Omnivorous symbolic boundaries in skills acquisition.Work, Employment and Society,0 (0), 0950017020977306. https://doi.org/10.1177/0950017020977306 [avnoon2021data]

    Badaracco, J. (1991).The knowledge link: How firms compete through strategic alliances. Harvard Business Press. https://archive.org/details/knowledgelinkhow0000bada [badaracco1991knowledge]

    Bailey, D. E., & Leonardi, P. M. (2015).Technology choices: Why occupations differ in their embrace of new technology. MIT Press. http://www.jstor.org/stable/j.ctt17kk9d4 [bailey2015technology]

    Bailey, D. E., Leonardi, P. M., & Chong, J. (2010). Minding the gaps: Understanding technology interdependence and coordination in knowledge work.Organization Science,21 (3), 713–730. https://doi.org/10.1287/orsc.1090.0473 [bailey2010minding]

    Bansal, C., Zimmermann, T., Awadallah, A. H., & Nagappan, N. (2019). The usage of web search for software engineering.arXiv Preprint arXiv:1912.09519. [bansal2019usage]

    Barad, K. (2003). Posthumanist performativity: Toward an understanding of how matter comes to matter.Signs: Journal of Women in Culture and Society,28 (3), 801–831. [barad2003posthumanist]

    Barley, S. R. (1986). Technology as an occasion for structuring: Evidence from observations of ct scanners and the social order of radiology departments.Administrative Science Quarterly,31 (1), 78–108. http://www.jstor.org/stable/2392767 [barley1986technology]

    Beane, M. (2017).Operating in the shadows: The productive deviance needed to make robotic surgery work [PhD thesis]. MIT. [beane2017operating]

    Beane, M. (2019). Shadow learning: Building robotic surgical skill when approved means fail.Administrative Science Quarterly,64 (1), 87–123. https://doi.org/10.1177/0001839217751692 [beane2019shadow]

    Bechky, B. A. (2003). Object lessons: Workplace artifacts as representations of occupational jurisdiction.American Journal of Sociology,109 (3), 720–752. [bechky2003object]

    Bechky, B. A. (2006a). Gaffers, gofers, and grips: Role-based coordination in temporary organizations.Organization Science,17 (1), 3–21. [bechky2006gaffers]

    Bechky, B. A. (2006b). Talking about machines, thick description, and knowledge work.Organization Studies,27 (12), 1757–1768. https://doi.org/10.1177/0170840606071894 [bechky2006talking]

    Bell, G., Blythe, M., & Sengers, P. (2005). Making by making strange: Defamiliarization and the design of domestic technologies.ACM Transactions on Computer-Human Interaction (TOCHI),12 (2), 149–173. https://doi.org/10.1145/1067860.1067862 [bell2005making]

    Beniger, J. (1986).The control revolution: Technological and economic origins of the information society. Harvard university press. [beniger1986control]

    Bernstein, E. S. (2012). The transparency paradox: A role for privacy in organizational learning and operational control.Administrative Science Quarterly,57 (2), 181–216. https://doi.org/10.1177/0001839212453028 [bernstein2012transparency]

    Beunza, D., & Stark, D. (2012). From dissonance to resonance: Cognitive interdependence in quantitative finance.Economy and Society,41 (3), 383–417. https://doi.org/10.1080/03085147.2011.638155 [beunza2012dissonance]

    Bhatt, I., & MacKenzie, A. (2019). Just google it! Digital literacy and the epistemology of ignorance.Teaching in Higher Education,24 (3), 302–317. https://doi.org/10.1080/13562517.2018.1547276 [bhatt2019just]

    Biden, J. (2022).I know covid testing remains frustrating, but we are making improvements. https://twitter.com/POTUS/status/1478761964327297026 . [biden2022know_tweet]

    Bijker, W. E., Hughes, T. P., & Pinch, T. (1993). Introduction. InThe social construction of technological systems (pp. 9–50). MIT Press. [bijker1993social_introduction]

    Bilić, P. (2016). Search algorithms, hidden labour and information control.Big Data & Society,3 (1), 205395171665215. https://doi.org/10.1177/2053951716652159 [bilić2016search]

    Birt, L., Scott, S., Cavers, D., Campbell, C., & Walter, F. (2016). Member checking: A tool to enhance trustworthiness or merely a nod to validation?Qualitative Health Research,26 (13), 1802–1811. https://doi.org/10.1177/1049732316654870 [birt2016member]

    Blackler, F. (1995). Knowledge, knowledge work and organizations: An overview and interpretation.Organization Studies,16 (6), 1021–1046. https://doi.org/10.1177/017084069501600605 [blackler1995knowledge]

    Bowker, G. C. (1994).Science on the run: Information management and industrial geophysics at schlumberger, 1920-1940 (inside technology) (Hardcover, p. 199). The MIT Press. https://sicm.mitpress.mit.edu/books/science-run [bowker1994science]

    Bowker, G. C., Baker, K., Millerand, F., & Ribes, D. (2010). Toward information infrastructure studies: Ways of knowing in a networked environment. In J. Hunsinger, L. Klastrup, & M. Allen (Eds.),International handbook of internet research (pp. 97–117). Springer Netherlands. https://doi.org/10.1007/978-1-4020-9789-8_5 [bowker2010infrastructure]

    Bowker, G. C., & Star, S. L. (2000).Sorting things out: Classification and its consequences. MIT press. https://mitpress.mit.edu/books/sorting-things-out [bowker2000sorting]

    boyd, danah. (2018). You think you want media literacy… do you? InMedium. https://points.datasociety.net/you-think-you-want-media-literacy-do-you-7cad6af18ec2 [boyd2018you]

    Brandt, J., Guo, P. J., Lewenstein, J., Dontcheva, M., & Klemmer, S. R. (2009). Two studies of opportunistic programming: Interleaving web foraging, learning, and writing code.Proceedings of the Sigchi Conference on Human Factors in Computing Systems, 1589–1598. https://doi.org/10.1145/1518701.1518944 [brandt2009two]

    Brown, J., & Duguid, P. (2001). Knowledge and organization: A social-practice perspective.Organization Science,12, 198–213. [brown2001knowledge]

    Brown, J. S., & Duguid, P. (1991). Organizational learning and communities-of-practice: Toward a unified view of working, learning, and innovation.Organization Science,2 (1), 40–57. http://www.jstor.org/stable/2634938 [brown1991organizational]

    Brown, J. S., & Duguid, P. (1996).Situated learning perspectives (H. McLellen, Ed.). Educational Technology Publications. https://www.johnseelybrown.com/StolenKnowledge.pdf [brown1996stolen]

    Brown, J. S., & Duguid, P. (1998). Organizing knowledge.California Management Review,40 (3), 90–111. [brown1998organizing]

    Bucciarelli, L. L. L. (1996).Designing engineers (Paperback, p. 230). MIT Press. https://mitpress.mit.edu/books/designing-engineers [bucciarelli1996designing]

    Bucher, T. (2017). The algorithmic imaginary: Exploring the ordinary affects of facebook algorithms.Information, Communication & Society,20 (1), 30–44. https://doi.org/10.1080/1369118X.2016.1154086 [bucher2017algorithmic]

    Burrell, J. (2009). The field site as a network: A strategy for locating ethnographic research.Field Methods,21 (2), 181–199. https://doi.org/10.1177/1525822X08329699 [burrell2009field]

    Burrell, J. (2012).Invisible users: Youth in the internet cafés of urban ghana (acting with technology). The MIT Press. [burrell2012invisible]

    Burrell, J. (2016). How the machine “thinks”: Understanding opacity in machine learning algorithms.Big Data & Society,3 (1), 2053951715622512. https://doi.org/10.1177/2053951715622512 [burrell2016machine]

    Burrell, J. (2018). Thinking relationally about digital inequality in rural regions of the u.s.First Monday,23 (6). https://doi.org/10.5210/fm.v23i6.8376 [burrell2018thinking]

    Burrell, J. (2010). Evaluating Shared Access: Social equality and the circulation of mobile phones in rural Uganda.Journal of Computer-Mediated Communication,15 (2), 230–250. https://doi.org/10.1111/j.1083-6101.2010.01518.x [burrell2010social]

    Burrell, J., & Fourcade, M. (2021). The society of algorithms.Annual Review of Sociology,47 (1), null. https://doi.org/10.1146/annurev-soc-090820-020800 [burrell2021society]

    Burrell, J., Kahn, Z., Jonas, A., & Griffin, D. (2019). When users control the algorithms: Values expressed in practices on twitter.Proc. ACM Hum.-Comput. Interact.,3 (CSCW). https://doi.org/10.1145/3359240 [burrell2019control]

    Cadwalladr, C. (2016a). Google, democracy and the truth about internet search.The Guardian,4 (12). https://www.theguardian.com/technology/2016/dec/04/google-democracy-truth-internet-search-facebook [cadwalladr2016google]

    Cadwalladr, C. (2016b). Google is not “just” a platform. It frames, shapes and distorts how we see the world.The Guardian,11 (12). https://www.theguardian.com/commentisfree/2016/dec/11/google-frames-shapes-and-distorts-how-we-see-world [cadwalladr2016googleb]

    Cambrosio, A., & Keating, P. (1995).Exquisite specificity: The monoclonal antibody revolution. Oxford University Press. [cambrosio1995exquisite]

    Cambrosio, A., Limoges, C., & Hoffman, E. (2013). Expertise as a network: A case study of the controversies over the environmental release of genetically engineered organisms. In N. Stehr & R. V. Ericson (Eds.),The culture and power of knowledge (pp. 341–362). De Gruyter. https://doi.org/doi:10.1515/9783110847765.341 [cambrosio1992expertise]

    Caplan, R., & Bauer, A. J. (2022).How would one write/call the period immediately after everyone-started-caring-all-at-once-about-disinfo era? [Conversation]. https://twitter.com/robyncaplan/status/1522643551527579648 . [caplan2022period_tweet]

    Carlo, J. L., Lyytinen, K., & Rose, G. M. (2012). A knowledge-based model of radical innovation in small software firms.MIS Quarterly,36 (3), 865–895. http://www.jstor.org/stable/41703484 [carlo2012knowledge]

    Caulfield, M. (2019a).Data voids and the google this ploy: Kalergi plan. https://hapgood.us/2019/04/12/data-voids-and-the-google-this-ploy-kalergi-plan/ . [caulfield2019data]

    Caulfield, M. (2019b).SIFT (the four moves) | hapgood. https://hapgood.us/2019/06/19/sift-the-four-moves/ . [caulfield2019sift]

    Chen, M., Fischer, F., Meng, N., Wang, X., & Grossklags, J. (2019). How reliable is the crowdsourced knowledge of security implementation?2019 Ieee/Acm 41st International Conference on Software Engineering (Icse), 536–547. https://doi.org/10.1109/ICSE.2019.00065 [chen2019reliable]

    Chen, X., Ye, Z., Xie, X., Liu, Y., Gao, X., Su, W., Zhu, S., Sun, Y., Zhang, M., & Ma, S. (2022). Web search via an efficient and effective brain-machine interface.Proceedings of the Fifteenth Acm International Conference on Web Search and Data Mining, 1569–1572. https://doi.org/10.1145/3488560.3502185 [chen2022bmsi]

    Christin, A. (2017). Algorithms in practice: Comparing web journalism and criminal justice.Big Data & Society,4 (2), 1–12. https://doi.org/10.1177/2053951717718855 [christin2017algorithms]

    Christin, A. (2018). Counting clicks: Quantification and variation in web journalism in the united states and france.American Journal of Sociology,123 (5), 1382–1415. [christin2018counting]

    Christin, A. (2020a).Metrics at work: Journalism and the contested meaning of algorithms. Princeton University Press. [christin2020metrics]

    Christin, A. (2020b). The ethnographer and the algorithm: Beyond the black box.Theory and Society. https://doi.org/10.1007/s11186-020-09411-3 [christin2020ethnographer]

    Cohen, J. E. (2012).Configuring the networked self. Yale University Press. https://doi.org/10.12987/9780300177930 [cohen2012configuring]

    Cohen, W. M., & Levinthal, D. A. (1990). Absorptive capacity: A new perspective on learning and innovation.Administrative Science Quarterly,35 (1), 128–152. http://www.jstor.org/stable/2393553 [cohen1990absorptive]

    Coleman, E. G. (2012).Coding freedom: The ethics and aesthetics of hacking. Princeton University Press. https://gabriellacoleman.org/Coleman-Coding-Freedom.pdf [coleman2012coding]

    Collins, H. M., & Evans, R. (2007).Rethinking expertise. University of Chicago Press. https://press.uchicago.edu/ucp/books/book/chicago/R/bo5485769.html [collins2007rethinking]

    Constant, D., Sproull, L., & Kiesler, S. (1996). The kindness of strangers: The usefulness of electronic weak ties for technical advice.Organization Science,7 (2), 119–135. [constant1996kindness]

    Contu, A., & Willmott, H. (2003). Re-embedding situatedness: The importance of power relations in learning theory.Organization Science,14 (3), 283–296. [contu2003re]

    Cotter, K. (2021). “Shadowbanning is not a thing”: Black box gaslighting and the power to independently know and credibly critique algorithms.Information, Communication & Society,0 (0), 1–18. https://doi.org/10.1080/1369118X.2021.1994624 [cotter2021shadowbanning]

    Cotter, K. (2022). Practical knowledge of algorithms: The case of BreadTube.New Media & Society, 1–20. https://doi.org/10.1177/14614448221081802 [cotter2022practical]

    Daly, A., & Scardamaglia, A. (2017). Profiling the australian google consumer: Implications of search engine practices for consumer law and policy.J Consum Policy,40 (3), 299–320. https://doi.org/10.1007/s10603-017-9349-9 [daly2017profiling]

    Dear, P. (2001). Science studies as epistemography.The One Culture, 128–141. [dear2001science]

    de Laet, M., & Mol, A. (2000). The zimbabwe bush pump: Mechanics of a fluid technology.Social Studies of Science,30 (2), 225–263. https://doi.org/10.1177/030631200030002002 [delaet2000zimbabwe]

    Deterding, N. M., & Waters, M. C. (2018). Flexible coding of in-depth interviews: A twenty-first-century approach.Sociological Methods & Research, 0049124118799377. https://doi.org/10.1177/0049124118799377 [deterding2018flexible]

    Dijck, J. van. (2010). Search engines and the production of academic knowledge.International Journal of Cultural Studies,13 (6), 574–592. https://doi.org/10.1177/1367877910376582 [vandijck2010search]

    DiMaggio, P. J., & Powell, W. W. (1983). The iron cage revisited: Institutional isomorphism and collective rationality in organizational fields.American Sociological Review, 147–160. [dimaggio1983iron]

    DiResta, R. (2018).The complexity of simply searching for medical advice. https://www.wired.com/story/the-complexity-of-simply-searching-for-medical-advice/ [diresta2018complexity]

    Doty, N. (2020).Enacting Privacy in Internet Standards [Ph.D. dissertation, University of California, Berkeley]. https://npdoty.name/enacting-privacy/ [doty2020enacting]

    Dreyfus, H. L., & Dreyfus, S. E. (2005). Peripheral vision: Expertise in real world contexts.Organization Studies,26 (5), 779–792. [dreyfus2005peripheral]

    Duguid, P. (2008).Community, economic creativity, and organization (A. Amin & J. Roberts, Eds.). Oxford University Press. https://oxford.universitypressscholarship.com/view/10.1093/acprof:oso/9780199545490.001.0001/acprof-9780199545490-chapter-1 [duguid2008community]

    Dunbar-Hester, C. (2020).Hacking diversity: The politics of inclusion in open technology cultures (1st Edition). Princeton University Press. https://press.princeton.edu/books/hardcover/9780691182070/hacking-diversity [dunbar2020hacking]

    Dzonsons, K. (2011).History of unix manpages. https://manpages.bsd.lv/history.html . [dzonsons2011history]

    Ekbia, H., & Nardi, B. (2014). Heteromation and its (dis) contents: The invisible division of labor between humans and machines.First Monday. https://doi.org/https://doi.org/10.5210/FM.V19I6.5331 [ekbia2014heteromation]

    Ekbia, H. R., & Nardi, B. A. (2017).Heteromation, and other stories of computing and capitalism. MIT Press. [ekbia2017heteromation]

    Elish, M. C., & Watkins, E. A. (2019).Algorithms on the shop floor: Data-driven technologies in organizational context. https://datasociety.net/library/algorithms-on-the-shop-floor/ [elish2019algorithms_workshop]

    Ensmenger, N. (2010).The computer boys take over: Computers, programmers, and the politics of technical expertise. The MIT Press. [ensmenger2010computer]

    Ensmenger, N. (2015). “Beards, sandals, and other signs of rugged individualism”: Masculine culture within the computing professions.Osiris,30 (1), 38–65. http://www.jstor.org/stable/10.1086/682955 [ensmenger2015beards]

    Eyal, G. (2019).The crisis of expertise. Polity Press. https://www.wiley.com/en-us/The+Crisis+of+Expertise-p-9780745665771 [eyal2019crisis]

    Feldman, M. S., & March, J. G. (1981). Information in organizations as signal and symbol.Administrative Science Quarterly,26 (2), 171–186. http://www.jstor.org/stable/2392467 [feldman1981information]

    Ferguson, A. M., McLean, D., & Risko, E. F. (2015). Answers at your fingertips: Access to the internet influences willingness to answer questions.Consciousness and Cognition,37, 91–102. https://doi.org/10.1016/j.concog.2015.08.008 [ferguson2015answers]

    Fine, M. (2006). Bearing witness: Methods for researching oppression and resistance—a textbook for critical research.Social Justice Research,19, 83–108. [fine2006bearing]

    Firouzi, E., Sami, A., Khomh, F., & Uddin, G. (2020). On the use of c# unsafe code context: An empirical study of stack overflow.Proceedings of the 14th Acm / Ieee International Symposium on Empirical Software Engineering and Measurement (Esem). https://doi.org/10.1145/3382494.3422165 [firouzi2020unsafe]

    Fischer, F., Böttinger, K., Xiao, H., Stransky, C., Acar, Y., Backes, M., & Fahl, S. (2017). Stack overflow considered harmful? The impact of copy&paste on android application security.2017 Ieee Symposium on Security and Privacy (Sp), 121–136. [fischer2017stack]

    Flick, U. (2009).An introduction to qualitative research. SAGE Publications Ltd. [flick2009introduction4]

    Fourcade, M. (2010).Economists and societies. Princeton. [fourcade2010economists]

    Fourcade, M., & Healy, K. (2017). Seeing like a market.Socio-Economic Review,15 (1), 9–29. https://doi.org/https://doi.org/10.1093/ser/mww033 [fourcade2017seeing]

    Freeman, J. (2013). The tyranny of structurelessness.WSQ,41 (3-4), 231–246. https://doi.org/10.1353/wsq.2013.0072 [freeman2013tyranny]

    Gasson, S., & Purcelle, M. (2018). A participation architecture to support user peripheral participation in a hybrid foss community.Trans. Soc. Comput.,1 (4). https://doi.org/10.1145/3290837 [gasson2018participation]

    Giddens, A. (1991).The consequences of modernity. Polity Press in association with Basil Blackwell, Oxford, UK. [giddens1991consequences]

    Gilbert, S. A. (2018).Motivations for participating in online initiatives: Exploring motivations across initiative types [PhD thesis, University of British Columbia]. https://doi.org/http://dx.doi.org/10.14288/1.0372890 [gilbert2018motivations]

    Gillespie, T. (2014).The relevance of algorithms (T. Gillespie, P. J. Boczkowski, & K. A. Foot, Eds.; pp. 167–193). The MIT Press. https://doi.org/10.7551/mitpress%2F9780262525374.003.0009 [gillespie2014relevance]

    Gillespie, T. (2017). Algorithmically recognizable: Santorum’s google problem, and google’s santorum problem.Information, Communication & Society,20 (1), 63–80. https://doi.org/10.1080/1369118X.2016.1199721 [gillespie2017algorithmically]

    Girard, M., & Stark, D. (2002). Distributing intelligence and organizing diversity in new-media projects.Environment and Planning A,34 (11), 1927–1949. [girard2002distributing]

    Gitelman, L. (2006).Always already new: Media, history, and the data of culture. MIT Press. https://direct.mit.edu/books/book/4377/Always-Already-NewMedia-History-and-the-Data-of [gitelman2006always]

    GitHub. (2022).Introducing an all-new code search and code browsing experience | github changelog. https://github.blog/changelog/2022-11-09-introducing-an-all-new-code-search-and-code-browsing-experience/ . [github2022introducing]

    Goffman, E. (1956).The presentation of self in everyday life. University of Edinburgh. [goffman1956presentation]

    Goldenfein, J., & Griffin, D. (2022). Google scholar – platforming the scholarly economy.Internet Policy Review,11 (3), 117. https://doi.org/10.14763/2022.3.1671 [goldenfein2022platforming]

    Goldenfein, J., Mulligan, D. K., Nissenbaum, H., & Ju, W. (2020). Through the handoff lens: Competing visions of autonomous futures.Berkeley Tech. L.J.. Berkeley Technology Law Journal,35 (IR), 835. https://doi.org/10.15779/Z38CR5ND0J [goldenfein2020through]

    Goldenfein, J., Mulligan, D., & Nissenbaum, H. (2019).Through the handoff lens: Are autonomous vehicles no-win for users. https://pdfs.semanticscholar.org/341d/a18649eb9627fe29d4baf28fb4ee7d3eafa3.pdf [goldenfein2019through_draft]

    Golebiewski, M., & boyd, danah. (2018). Data voids: Where missing data can easily be exploited.Data & Society. https://datasociety.net/library/data-voids-where-missing-data-can-easily-be-exploited/ [golebiewski2018data]

    Griffin, D. (2019).When searching we sometimes use keywords that direct us… https://twitter.com/danielsgriffin/status/1183785841732120576 . [griffin2019when_tweet]

    Griffin, D., & Lurie, E. (2022). Search quality complaints and imaginary repair: Control in articulations of google search.New Media & Society,0 (0), 14614448221136505. https://doi.org/10.1177/14614448221136505 [griffin2022search]

    Gross, M., & McGoey, L. (2015).Routledge international handbook of ignorance studies. Routledge. https://doi.org/10.4324/9781315867762 [gross2015routledge]

    Gross, M., & McGoey, L. (2022).Routledge international handbook of ignorance studies. Routledge. https://doi.org/10.4324/9781003100607 [gross2023routledge]

    Guendelman, S., Pleasants, E., Cheshire, C., & Kong, A. (2022). Exploring google searches for out-of-clinic medication abortion in the united states during 2020: Infodemiology approach using multiple samples.JMIR Infodemiology,2 (1), e33184. https://doi.org/10.2196/33184 [guendelman2022exploring]

    Gunn, H. K., & Lynch, M. P. (2018). Googling. InThe routledge handbook of applied epistemology (pp. 41–53). Routledge. https://doi.org/10.4324/9781315679099-4 [gunn2018googling]

    Haider, J. (2016). The structuring of information through search: Sorting waste with google.Aslib Journal of Information Management,68 (4), 390–406. https://doi.org/10.1108/AJIM-12-2015-0189 [haider2016structuring]

    Haider, J. (2017).Controlling the urge to search. Studying the informational texture of practices by exploring the missing element.10 (1). https://doi.org/http://dx.doi.org/10.14288/1.0372890 [haider2017controlling]

    Haider, J., Rödl, M., & Joosse, S. (2022). Algorithmically embodied emissions: The environmental harm of everyday life information in digital culture.IR,27. https://doi.org/10.47989/colis2224 [haider2022algorithmically]

    Haider, J., & Sundin, O. (2019).Invisible search and online search engines: The ubiquity of search in everyday life. Routledge. https://doi.org/https://doi.org/10.4324/9780429448546 [haider2019invisible]

    Hanselman, S. (2013).Am i really a developer or just a good googler? https://www.hanselman.com/blog/am-i-really-a-developer-or-just-a-good-googler . [hanselman2013really]

    Hanselman, S. (2020).Me: 30 years writing software for money. https://twitter.com/shanselman/status/1289804628310110209 . [hanselman2020me_tweet]

    Haraway, D. J. (1988). Situated knowledges: The science question in feminism and the privilege of partial perspective.Feminist Studies,14, 205–224. [haraway1988situated]

    Hearst, M. A. (2009).Search user interfaces. Cambridge University Press. [hearst2009search]

    Hicks, M. (2017).Programmed inequality: How britain discarded women technologists and lost its edge in computing. MIT Press. [hicks2017programmed]

    Hill Collins, P. (2002).Black feminist thought: Knowledge, consciousness, and the politics of empowerment (Rev. 10th anniversary ed). Routledge. [collins2002black]

    Hippel, E. (1988).The sources of innovation. Oxford University Press. [vonhippel1988sources]

    Hirschhorn, L. (1997).Reworking authority: Leading and following in the post-modem organization. MIT Press. [hirschhorn1997reworking]

    Hodgson, G. M. (2001).How economics forgot history: The problem of historical specificity in social science. Routledge. [hodgson2001economics]

    Hoffmann, A. L. (2019). Where fairness fails: Data, algorithms, and the limits of antidiscrimination discourse.Information, Communication & Society,22 (7), 900–915. https://doi.org/10.1080/1369118X.2019.1573912 [hoffmann2019fairness]

    Hoffmann, A. L. (2021). Terms of inclusion: Data, discourse, violence.New Media & Society,23 (12), 3539–3556. https://doi.org/10.1177/1461444820958725 [hoffmann2020terms]

    House of Lords, Select Committee on Democracy and Digital Technologies. (2020).Corrected oral evidence: Democracy and digital technologies. https://committees.parliament.uk/oralevidence/360/html/ . [house2020democracy]

    Höchstötter, N., & Lewandowski, D. (2009). What users see – structures in search engine results pages.Information Sciences,179 (12), 1796–1812. https://doi.org/10.1016/j.ins.2009.01.028 [höchstötter2009users]

    Hunt, A., & Thomas, D. (1999).The pragmatic programmer: From journeyman to master. Addison-Wesley Professional. [hunt1999pragmatic]

    Hutchins, E. (1995).Cognition in the wild. MIT Press. [hutchins1995cognition]

    Introna, L. D. (2016). Algorithms, governance, and governmentality.Science, Technology, & Human Values,41 (1), 17–49. https://doi.org/10.1177/0162243915587360 [introna2016algorithms]

    Introna, L. D., & Nissenbaum, H. (2000). Shaping the web: Why the politics of search engines matters.The Information Society,16 (3), 169–185. https://doi.org/10.1080/01972240050133634 [introna2000shaping]

    Iskander, N. (2021).Does skill make us human?: Migrant workers in 21st-century qatar and beyond. Princeton University Press. [iskander2021skill]

    Jack, C. (2017). Lexicon of lies: Terms for problematic information.Data & Society,3, 22. https://datasociety.net/output/lexicon-of-lies/ [jack2017lexicon]

    Jackson, S. J. (2014).Rethinking repair (T. Gillespie, P. J. Boczkowski, & K. A. Foot, Eds.; pp. 221–240). The MIT Press. https://doi.org/10.7551/mitpress/9780262525374.003.0011 [jackson2014rethinking]

    Kalliamvakou, E. (2022).Research: Quantifying github copilot’s impact on developer productivity and happiness | the github blog. https://github.blog/2022-09-07-research-quantifying-github-copilots-impact-on-developer-productivity-and-happiness/ . [kalliamvakou2022research]

    Karapapa, S., & Borghi, M. (2015). Search engine liability for autocomplete suggestions: Personality, privacy and the power of the algorithm.Int J Law Info Tech,23 (3), 261–289. https://doi.org/10.1093/ijlit/eav009 [karapapa2015search]

    Katznelson, I. (2005).When affirmative action was white: An untold history of racial inequality in twentieth-century america. W.W. Norton & Company. [katznelson2005affirmative]

    Khlaaf, H., Mishkin, P., Achiam, J., Krueger, G., & Brundage, M. (2022).A hazard analysis framework for code synthesis large language models. arXiv. https://doi.org/10.48550/ARXIV.2207.14157 [khlaaf2022hazard]

    Kleppmann, M. (2017).Designing data-intensive applications : The big ideas behind reliable, scalable, and maintainable systems. O’Reilly Media. [kleppmann2017designing]

    Kluttz, D. N., & Mulligan, D. K. (2019).Automated decision support technologies and the legal profession. https://doi.org/10.15779/Z38154DP7K [kluttz2019automated]

    Koonin, S. (2019).Everything i googled in a week as a professional software engineer - localghost. https://localghost.dev/2019/09/everything-i-googled-in-a-week-as-a-professional-software-engineer/ . [sfpm_koonin2019everything]

    Kotamraju, N. P. (2002). Keeping up: Web design skill and the reinvented worker.Information, Communication & Society,5 (1), 1–26. https://doi.org/10.1080/13691180110117631 [kotamraju2002keeping]

    Kraschnewski, J. L., Chuang, C. H., Poole, E. S., Peyton, T., Blubaugh, I., Pauli, J., Feher, A., & Reddy, M. (2014). Paging “dr. Google”: Does technology fill the gap created by the prenatal care visit structure? Qualitative focus group study with pregnant women.J Med Internet Res,16 (6), e147. https://doi.org/10.2196/jmir.3385 [kraschnewski2014paging]

    Kruschwitz, U., Hull, C., & others. (2017).Searching the enterprise (Vol. 11). Now Publishers. [kruschwitz2017searching]

    Kutz, J. (2022).Our search liaison on 25 years of keeping up with search. https://blog.google/products/search/danny-25-years-of-search/ ; Google. [kutz2022search]

    Latour, B. (1986). Visualization and cognition.Knowledge and Society,6 (6), 1–40. [latour1986visualization]

    Latour, B. (1990). Drawing things together. In M. Lynch & S. Woolgar (Eds.),Representation in scientific practice. MIT Press. [latour1990drawing]

    Latour, B. (1992). Where are the missing masses? The sociology of a few mundane artifacts. In W. E. Bijker & J. Law (Eds.),Shaping technology/building society: Studies in sociotechnical change (pp. 225–228). MIT Press. [latour1992missing]

    Lave, J., & Wenger, E. (1991).Situated learning: Legitimate peripheral participation. Cambridge university press. https://www.cambridge.org/highereducation/books/situated-learning/6915ABD21C8E4619F750A4D4ACA616CD#overview [lave1991situated]

    Leonard-Barton, D. (1995).Wellsprings of knowledge: Building and sustaining the sources of innovation. Harvard Business School Press. [leonard1995wellsprings]

    Leonardi, P. M. (2007). Activating the informational capabilities of information technology for organizational change.Organization Science,18 (5), 813–831. https://doi.org/10.1287/orsc.1070.0284 [leonardi2007activating]

    Leonardi, P. M. (2011). When flexible routines meet flexible technologies: Affordance, constraint, and the imbrication of human and material agencies.MIS Quarterly,35 (1), 147–167. http://www.jstor.org/stable/23043493 [leonardi2011flexible]

    Lianos, M. (2010). Periopticon: Control beyond freedom and coercion and two possible advancements in the social sciences. In K. D. Haggerty & M. Samatas (Eds.),Surveillance and democracy (pp. 69–88). https://www.taylorfrancis.com/chapters/edit/10.4324/9780203852156-11/periopticon-control-beyond-freedom-coercion-two-possible-advancements-social-sciences-michalis-lianos [lianos2010periopticon]

    Liboiron, M. (2021).Pollution is colonialism. Duke University Press. https://www.dukeupress.edu/pollution-is-colonialism [liboiron2021pollution]

    Lofland, J., & Lofland, L. H. (1995).Analyzing social settings. Wadsworth Publishing Company. [lofland1995analyzing]

    Lurie, E., & Mulligan, D. K. (2021).Searching for representation: A sociotechnical audit of googling for members of U.S. Congress (Working Paper). https://emmalurie.github.io/docs/preprint-searching.pdf [lurie2021searching_draft]

    Mager, A. (2009). Mediated health: Sociotechnical practices of providing and using online health information.New Media & Society,11 (7), 1123–1142. https://doi.org/10.1177/1461444809341700 [mager2009mediated]

    Mager, A. (2012). ALGORITHMIC ideology.Information, Communication & Society,15 (5), 769–787. https://doi.org/10.1080/1369118X.2012.676056 [mager2012algorithmic]

    Marcus, G. E. (1995). Ethnography in/of the world system: The emergence of multi-sited ethnography.Annual Review of Anthropology,24, 95–117. http://www.jstor.org/stable/2155931 [marcus1995ethnography]

    Mart, S. N. (2017). The algorithm as a human artifact: Implications for legal [re] search.Law Libr. J.,109, 387. https://scholar.law.colorado.edu/articles/755/ [mart2017algorithm]

    Mathew, A. J., & Cheshire, C. (2018). A fragmented whole: Cooperation and learning in the practice of information security.Center for Long-Term Cybersecurity, UC Berkeley. [mathew2018fragmented]

    McChesney, R. W. (1997).Corporate media and the threat to democracy. Seven Stories Press. [mcchesney1997corporate]

    McDermott, R., & Lave, J. (2006). Estranged labor learning. In P. Sawchuk, N. Duarte, & M. Elhammoumi (Eds.),Critical perspectives on activity: Explorations across education, work, and everyday life (pp. 89–122). Cambridge University Press. https://doi.org/10.1017/CBO9780511509568.007 [mcdermott2006estranged]

    Meisner, C., Duffy, B. E., & Ziewitz, M. (2022). The labor of search engine evaluation: Making algorithms more human or humans more algorithmic?New Media & Society,0 (0), 14614448211063860. https://doi.org/10.1177/14614448211063860 [meisner2022labor]

    Mejova, Y., Gracyk, T., & Robertson, R. (2022). Googling for abortion: Search engine mediation of abortion accessibility in the united states.JQD,2. https://doi.org/10.51685/jqd.2022.007 [mejova2022googling]

    Metaphor. (2021).Today we’re releasing wanderer 2Metaphor. https://twitter.com/metaphorsystems/status/1428793313663111170 . [metaphor2021today_tweet]

    Metaxa-Kakavouli, D., & Torres-Echeverry. (2017).Google’s role in spreading fake news and misinformation. Stanford University Law & Policy Lab. https://www-cdn.law.stanford.edu/wp-content/uploads/2017/10/Fake-News-Misinformation-FINAL-PDF.pdf [metaxa2017google]

    Meyer, J. W., & Rowan, B. (1977). Institutionalized organizations: Formal structure as myth and ceremony.American Journal of Sociology,83 (2), 340–363. [meyer1977institutionalized]

    Meyer, J. W., & Rowan, B. (1978). The structure of educational organizations. In M. W. Meyer & Associates (Eds.),Organizations and environments (pp. 78–109). Jossey Bass. [meyer1978structure]

    Miller, B., & Record, I. (2013). JUSTIFIED belief in a digital age: ON the epistemic implications of secret internet technologies.Episteme,10 (2), 117–134. https://doi.org/10.1017/epi.2013.11 [miller2013justified]

    Mills, C. (2008). White ignorance. In L. S. Robert Proctor (Ed.),Agnotology: The making and unmaking of ignorance. Stanford University Press. [mills2008white]

    Misa, editor, Thomas J. (2010).Gender codes: Why women are leaving computing (1st ed.). Wiley-IEEE Computer Society Press. libgen.li/file.php?md5=e4a6849b080f4a078c79777d347726c2 [misa2010gender]

    Mokros, H. B., & Aakhus, M. (2002). From information-seeking behavior to meaning engagement practice..Human Comm Res,28 (2), 298–312. https://doi.org/10.1111/j.1468-2958.2002.tb00810.x [mokros2002engagement]

    Morris, M. R. (2013). Collaborative search revisited.Proceedings of Cscw 2013. https://doi.org/10.1145/2441776.2441910 [morris2013collaborative]

    Morris, M. R., & Horvitz, E. (2007). SearchTogether: An interface for collaborative web search.Proceedings of the 20th Annual Acm Symposium on User Interface Software and Technology, 3–12. [morris2007searchtogether]

    Morris, M. R., & Teevan, J. (2009). Collaborative web search: Who, what, where, when, and why.Synthesis Lectures on Information Concepts, Retrieval, and Services,1 (1), 1–99. https://doi.org/10.2200/S00230ED1V01Y200912ICR014 [morris2010collaborative]

    Mulligan, D. K., & Griffin, D. (2018). Rescripting search to respect the right to truth.The Georgetown Law Technology Review,2 (2), 557–584. https://georgetownlawtechreview.org/rescripting-search-to-respect-the-right-to-truth/GLTR-07-2018/ [mulligan2018rescripting]

    Mulligan, D. K., Koopman, C., & Doty, N. (2016). Privacy is an essentially contested concept: A multi-dimensional analytic for mapping privacy.Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences,374 (2083), 20160118. [mulligan2016privacy]

    Mulligan, D. K., & Nissenbaum, H. (2020).The concept of handoff as a model for ethical analysis and design. Oxford University Press. https://doi.org/10.1093/oxfordhb/9780190067397.013.15 [mulligan2020concept]

    Mustafaraj, E., Lurie, E., & Devine, C. (2020). The case for voter-centered audits of search engines during political elections.FAT* ’20. [mustafaraj2020case]

    Nagaraj, A. (2021). Information seeding and knowledge production in online communities: Evidence from openstreetmap.Management Science,67 (8), 4908–4934. https://doi.org/10.1287/mnsc.2020.3764 [nagaraj2021seeding]

    Narayanan, D., & De Cremer, D. (2022). “Google told me so!” On the bent testimony of search engine algorithms.Philos. Technol.,35 (2), E4512. https://doi.org/10.1007/s13347-022-00521-7 [narayanan2022google]

    Natarajan, M. (2016).The making of ignorance: Epistemic design in self-tracking health [PhD thesis, University of California, Berkeley]. https://escholarship.org/uc/item/5pn009mw [natarajan2016making]

    Neff, G. (2012).Venture labor: Work and the burden of risk in innovative industries. MIT press. https://mitpress.mit.edu/books/venture-labor [neff2012venture]

    Nissenbaum, H. (2011a). A contextual approach to privacy online.Daedalus,140 (4), 32–48. [nissenbaum2011contextual]

    Nissenbaum, H. (2011b). From preemption to circumvention: If technology regulates, why do we need regulation (and vice versa).Berkeley Tech. LJ,26, 1367. [nissenbaum2011preemption]

    Noble, S. U. (2018).Algorithms of oppression how search engines reinforce racism. New York University Press. https://nyupress.org/9781479837243/algorithms-of-oppression/ [noble2018algorithms]

    Ochigame, R. (2020). Informatics of the oppressed. InLogic. https://logicmag.io/care/informatics-of-the-oppressed/ [ochigame2020informatics]

    Oeldorf-Hirsch, A., Hecht, B., Morris, M. R., Teevan, J., & Gergle, D. (2014, February). To search or to ask.Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing. https://doi.org/10.1145/2531602.2531706 [oeldorfhirsch2014search]

    Ohm, P., & Frankle, J. (2018). Desirable inefficiency.Florida Law Review,70 (4), 777. https://scholarship.law.ufl.edu/flr/vol70/iss4/2 [ohm2018desirable]

    Orlikowski, W. J. (2007). Sociomaterial practices: Exploring technology at work.Organization Studies,28 (9), 1435–1448. https://doi.org/10.1177/0170840607081138 [orlikowski2007sociomaterial]

    Orlikowski, W. J. (1993). CASE tools as organizational change: Investigating incremental and radical changes in systems development.MIS Q.,17 (3), 309–340. https://doi.org/10.2307/249774 [orlikowski1993case]

    Orr, J. E. (1996).Talking about machines: An ethnography of a modern job. ILR Press. [orr1996talking]

    Pan, B., Hembrooke, H., Joachims, T., Lorigo, L., Gay, G., & Granka, L. (2007). In google we trust: Users’ decisions on rank, position, and relevance.Journal of Computer-Mediated Communication,12 (3), 801–823. https://doi.org/10.1111/j.1083-6101.2007.00351.x [pan2007google]

    Pasquale, F. (2015).The black box society. Harvard University Press. [pasquale2015black]

    Passi, S., & Barocas, S. (2019). Problem formulation and fairness.Proceedings of the Conference on Fairness, Accountability, and Transparency, 39–48. [passi2019problem]

    Passi, S., & Jackson, S. J. (2018). Trust in data science: Collaboration, translation, and accountability in corporate data science projects.Proceedings of the ACM on Human-Computer Interaction,2 (CSCW), 1–28. [passi2018trust]

    Passi, S., & Sengers, P. (2020). Making data science systems work.Big Data & Society,7 (2), 2053951720939605. [passi2020making]

    Pearce, H. A., Ahmad, B., Tan, B., Dolan-Gavitt, B., & Karri, R. (2021). An empirical cybersecurity evaluation of github copilot’s code contributions.ArXiv,abs/2108.09293. [pearce2021asleep]

    Peels, R., & Pritchard, D. (2021). Educating for ignorance.Synthese,198 (8), 7949–7963. https://doi.org/10.1007/s11229-020-02544-z [peels2021educating]

    Perlow, L., & Weeks, J. (2002). Who’s helping whom? Layers of culture and workplace behavior.Journal of Organizational Behavior,23 (4), 345–361. https://doi.org/https://doi.org/10.1002/job.150 [perlow2002helping]

    Perrow, C. (1984).Normal accidents: Living with high-risk technologies. Basic Books. [perrow1984normal]

    Plato. (2002).Plato: Five dialogues: Euthyphro, Apology, Crito, Meno, Phaedo (J. M. Cooper, Ed.; G. M. A. Grube, Trans.; 2nd ed.). Hackett. [plato2002five]

    Polanyi, M. (1967).The tacit dimension. Doubleday & Co. [polanyi1967tacit]

    Prior, L. (2003).Using documents in social research. SAGE Publications Ltd. https://doi.org/10.4135/9780857020222 [prior2003using]

    Proctor, R., & Schiebinger, L. (Eds.). (2008).Agnotology: The making and unmaking of ignorance. Stanford University Press. https://archive.org/details/agnotologymaking0000unse [proctor2008agnotology]

    Pugh, A. J. (2013). What good are interviews for thinking about culture? Demystifying interpretive analysis.Am J Cult Sociol,1 (1), 42–68. https://doi.org/10.1057/ajcs.2012.4 [pugh2013good]

    Raboy, M. (1998). Global communication policy and human rights. InA communications cornucopia: Markle foundation essays on information policy (pp. 218–242). Brookings Institution Press. [raboy1998global]

    Rahman, M. M., Barson, J., Paul, S., Kayani, J., Lois, F. A., Quezada, S. F., Parnin, C., Stolee, K. T., & Ray, B. (2018). Evaluating how developers use general-purpose web-search for code retrieval.Proceedings of the 15th International Conference on Mining Software Repositories, 465–475. https://doi.org/10.1145/3196398.3196425 [rahman2018evaluating]

    Reagle, J. (2016). The obligation to know: From faq to feminism 101.New Media &Amp; Society,18 (5), 691–707. https://doi.org/10.1177/1461444814545840 [reagle2014obligation]

    Rieder, B., & Hofmann, J. (2020). Towards platform observability.Internet Policy Review,9 (4), 1–28. https://doi.org/https://doi.org/10.14763/2020.4.1535 [rieder2020towards]

    Roberts, N., Galluch, P. S., Dinger, M., & Grover, V. (2012). Absorptive capacity and information systems research: Review, synthesis, and directions for future research.MIS Quarterly,36 (2), 625–648. http://www.jstor.org/stable/41703470 [roberts2012absorptive]

    Robinson, L. (2009). A taste for the necessary.Information, Communication & Society,12 (4), 488–507. https://doi.org/10.1080/13691180902857678 [robinson2009taste]

    Russell, D. M. (2019).The joy of search: A google insider’s guide to going beyond the basics. The MIT Press. [russell2019joy]

    Sabel, C. F. (1984).Work and politics: The division of labor in industry. [sabel1984work]

    Salva, R. J. (2022).Preview: Referencing public code in github copilot | the github blog. https://github.blog/2022-11-01-preview-referencing-public-code-in-github-copilot/ . [salva2022preview]

    Schultheiß, S., Sünkler, S., & Lewandowski, D. (2018). We still trust google, but less than 10 years ago: An eye-tracking study.Information Research,23 (3). http://informationr.net/ir/23-3/paper799.html [schultheiß2018still]

    Seaver, N. (2017). Algorithms as culture: Some tactics for the ethnography of algorithmic systems.Big Data & Society,4 (2), 1–12. https://doi.org/10.1177/2053951717738104 [seaver2017algorithms]

    Seaver, N. (2019). Knowing algorithms.Digital STS, 412–422. [seaver2019knowing]

    Seibel, P. (2009).Coders at work: Reflections on the craft of programming. Apress. [seibel2009coders]

    Shah, C. (2017).Social information seeking. Springer International Publishing. https://doi.org/10.1007/978-3-319-56756-3 [shah2017social]

    Shah, C., & Bender, E. M. (2022, March). Situating search.ACM SIGIR Conference on Human Information Interaction and Retrieval. https://doi.org/10.1145/3498366.3505816 [shah2022situating]

    Shestakofsky, B. (2017). Working algorithms: Software automation and the future of work.Work and Occupations,44 (4), 376–423. https://doi.org/10.1177/0730888417726119 [shestakofsky2017working]

    Shorey, S., Hill, B. M., & Woolley, S. (2021). From hanging out to figuring it out: Socializing online as a pathway to computational thinking.New Media & Society,23 (8), 2327–2344. https://doi.org/10.1177/1461444820923674 [shorey2020hanging]

    Skitka, L. J., Mosier, K. L., Burdick, M., & Rosenblatt, B. (2000). Automation bias and errors: Are crews better than individuals?The International Journal of Aviation Psychology,10, 85–97. [skitka2000automation]

    Smith, C. L., & Rieh, S. Y. (2019, March). Knowledge-context in search systems.Proceedings of the 2019 Conference on Human Information Interaction and Retrieval. https://doi.org/10.1145/3295750.3298940 [smith2019knowledge]

    Smithson, M. (1985). Toward a social theory of ignorance.Journal for the Theory of Social Behaviour,15 (2), 151–172. https://doi.org/https://doi.org/10.1111/j.1468-5914.1985.tb00049.x [smithson1985toward]

    Star, S. L. (1999). The ethnography of infrastructure.American Behavioral Scientist,43 (3), 377–391. [star1999ethnography]

    Star, S. L., & Ruhleder, K. (1996). Steps toward an ecology of infrastructure: Design and access for large information spaces.Information Systems Research,7 (1), 111–134. https://doi.org/10.1287/isre.7.1.111 [star1996steps]

    Star, S. L., & Strauss, A. (2004). Layers of silence, arenas of voice: The ecology of visible and invisible work.Computer Supported Cooperative Work (CSCW),8, 9–30. [star1999layers]

    Stark, D. (2009).The sense of dissonance: Accounts of worth in economic life. Princeton University Press. [stark2009sense]

    Stark, L., & Levy, K. (2018). The surveillant consumer.Media, Culture & Society,40 (8), 1202–1220. https://doi.org/10.1177/0163443718781985 [stark2018surveillant]

    Suchman, L. A. (1987).Plans and situated actions: The problem of human-machine communication. Cambridge university press. [suchman1987plans]

    Sundin, O. (2020). Where is search in information literacy? A theoretical note on infrastructure and community of practice. InSustainable digital communities (pp. 373–379). Springer International Publishing. https://doi.org/10.1007/978-3-030-43687-2_29 [sundin2020where]

    Sundin, O., Haider, J., Andersson, C., Carlsson, H., & Kjellberg, S. (2017). The search-ification of everyday life and the mundane-ification of search.Journal of Documentation. https://doi.org/10.1108/JD-06-2016-0081 [sundin2017search]

    Sundin, O., Lewandowski, D., & Haider, J. (2021). Whose relevance? Web search engines as multisided relevance machines.Journal of the Association for Information Science and Technology. https://doi.org/10.1002/asi.24570 [sundin2021relevance]

    Surden, H. (2007). Structural rights in privacy.SMU Law Review,60 (4), 1605. https://scholar.law.colorado.edu/articles/346/ [surden2007structural]

    Takhteyev, Y. (2007). Jeeks: Developers at the periphery of the software world.Annual Meeting of the American Sociological Association, New York, Ny. https://pdfs.semanticscholar.org/1a98/c87ffd0b07344c5e0aae6e7e498a5c69da00.pdf [takhteyev2007jeeks]

    Takhteyev, Y. (2012).Coding places: Software practice in a south american city. The MIT Press. [takhteyev2012coding]

    Tattersall Wallin, E. (2021). Audiobook routines: Identifying everyday reading by listening practices amongst young adults.JD,78 (7), 266–281. https://doi.org/10.1108/JD-06-2021-0116 [tattersallwallin2021audiobook]

    Teevan, J., Alvarado, C., Ackerman, M. S., & Karger, D. R. (2004). The perfect search engine is not enough: A study of orienteering behavior in directed search.Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 415–422. [teevan2004perfect]

    The MIT Press. (2020).Author talk: The Joy of Search by Daniel M. Russell. https://mitpress.mit.edu/blog/author-talk-the-joy-of-search-by-daniel-m-russell/ . [mit2020author]

    The social construction of technological systems. (1993). MIT Press. [bijker1993social]

    Thompson, J. D. (1967).Organizations in action: Social science bases of administrative theory (1st ed.). McGraw-Hill. [thompson1967organizations]

    Toff, B., & Nielsen, R. K. (2018). “I Just Google It”: Folk Theories of Distributed Discovery.Journal of Communication,68 (3), 636–657. https://doi.org/10.1093/joc/jqy009 [toff2018just]

    Tripodi, F. (2018). Searching for alternative facts: Analyzing scriptural inference in conservative news practices.Data & Society. https://datasociety.net/output/searching-for-alternative-facts/ [tripodi2018searching]

    Tripodi, F. (2019a). Devin nunes and the power of keyword signaling. InWired. https://www.wired.com/story/devin-nunes-and-the-dark-power-of-keyword-signaling/ . [tripodi2019devin]

    Tripodi, F. (2019b).SenateHearing + written testimony. https://www.judiciary.senate.gov/imo/media/doc/Tripodi%20Testimony.pdf ; Senate Judiciary Committee Subcommittee On The Constitution. [tripodi2019testimony]

    Tripodi, F. (2022a).Step five: Set the traps - misinformation that fails to conform to dominant search engine rules is functionally invisible. https://twitter.com/ftripodi/status/1520078674417967105 . [tripodi2022five_tweet]

    Tripodi, F. (2022b).The propagandists’ playbook: How conservative elites manipulate search and threaten democracy (Hardcover, p. 288). Yale University Press. https://yalebooks.yale.edu/book/9780300248944/the-propagandists-playbook/ [tripodi2022propagandists]

    Tsing, A. (2005).Friction : An ethnography of global connection. Princeton University Press. https://press.princeton.edu/books/paperback/9780691120652/friction [tsing2005friction]

    Turco, C. J. (2016).The conversational firm: Rethinking bureaucracy in the age of social media. Columbia University Press. [turco2016conversational]

    Urman, A., & Makhortykh, M. (2022). “Foreign beauties want to meet you”: The sexualization of women in google’s organic and sponsored text search results.New Media & Society,0 (0), 14614448221099536. https://doi.org/10.1177/14614448221099536 [urman2022foreign]

    Vaidhyanathan, S. (2011).The googlization of everything:(And why we should worry). Univ of California Press. https://doi.org/10.1525/9780520948693 [vaidhyanathan2011googlization]

    Van Couvering, E. J. (2007). Is relevance relevant? Market, science, and war: Discourses of search engine quality.Journal of Computer-Mediated Communication,12 (3), 866–887. http://doi.org/10.1111/j.1083-6101.2007.00354.x [couvering2007relevance]

    Vertesi, J. (2019). From affordances to accomplishments: PowerPoint and excel at NASA. IndigitalSTS (pp. 369–392). Princeton University Press. https://doi.org/10.1515/9780691190600-026 [vertesi2019affordances]

    Warshaw, J., Taft, N., & Woodruff, A. (2016). Intuitions, analytics, and killing ants: Inference literacy of high school-educated adults in the US.Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 271–285. https://www.usenix.org/conference/soups2016/technical-sessions/presentation/warshaw [warshaw2016intuitions]

    Weber, S. (2004).The success of open source. Harvard University Press. https://www.hup.harvard.edu/catalog.php?isbn=9780674018587 [weber2004success]

    Weber, S. (2019).Bloc by bloc: How to build a global enterprise for the new regional order. Harvard University Press. [weber2019bloc]

    What is the xy problem? - meta stack exchange. (2010). https://meta.stackexchange.com/questions/66377/what-is-the-xy-problem . [stackexchange2010xy]

    White, R. W. (2016).Interactions with search systems. Cambridge University Press. https://doi.org/10.1017/CBO9781139525305 [white2016interactions]

    Widder, D. G., Nafus, D., Dabbish, L., & Herbsleb, J. D. (2022, June). Limits and possibilities for “ethical AI” in open source: A study of deepfakes.Proceedings of the 2022 ACM Conference on Fairness, Accountability, and Transparency. https://davidwidder.me/files/widder-ossdeepfakes-facct22.pdf [widder2022limits]

    Wineburg, S. (2021).“Problem 2: Typing “the claim into a search engine” will". https://twitter.com/samwineburg/status/1465542166764081157 . [wineburg2021problem_tweet]

    Wong, R. (2020).Values by design imaginaries: Exploring values work in ux practice [Ph.D. dissertation, University of California, Berkeley]. https://escholarship.org/uc/item/3vt3b1xf [wong2020values]

    Woods, D. D. (2018). The theory of graceful extensibility: Basic rules that govern adaptive systems.Environ Syst Decis,38 (4), 433–457. https://doi.org/10.1007/s10669-018-9708-3 [woods2018graceful]

    Yates, J., & Orlikowski, W. J. (1992). Genres of organizational communication: A structurational approach to studying communication and media.The Academy of Management Review,17 (2), 299–326. http://www.jstor.org/stable/258774 [yates1992genres]

    Zade, H., Wack, M., Zhang, Y., Starbird, K., Calo, R., Young, J., & West, J. D. (2022). Auditing google’s search headlines as a potential gateway to misleading content.Jots,1 (4). https://doi.org/10.54501/jots.v1i4.72 [zade2022auditing]

    Ziegler, A. (2022).Research: How github copilot helps improve developer productivity | the github blog. https://github.blog/2022-07-14-research-how-github-copilot-helps-improve-developer-productivity/ . [ziegler2022research]

    Zuboff, S. (1988).In the age of the smart machine. Basic books. [zuboff1988age]

    Zuboff, S. (2015). Big other: Surveillance capitalism and the prospects of an information civilization.Journal of Information Technology,30 (1), 75–89. https://doi.org/10.1057/jit.2015.5 [zuboff2015big]