ebook img

Social Science Computer Review 2005: Vol 23 Index PDF

2005·1 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Social Science Computer Review 2005: Vol 23 Index

INDEX to SOCIAL SCIENCE COMPUTER REVIEW Volume 23 Number 1 (Spring 2005), pp. 1-140 Number 2 (Summer 2005), pp. 141-264 Number 3 (Fall 2005), pp. 265-392 Number 4 (Winter 2005), pp. 393-516 Authors: ALTMAN, MICAH, and GARY M. KLASS, “Symposium on Current Research in Voting, Elections, and Information Technology Current Research in Voting, Elections, and Technology,” 269. ALTMAN, MICAH, KARIN MACDONALD, and MICHAEL MCDONALD, “From Crayons to Com- puters: The Evolution of Computer Use in Redistricting,” 334. BARAK, AZY, “Sexual Harassment on the Internet,” 77. BEAHM, DONALD L., “Democracy and New Media, edited by Henry Jenkins and David Thorburn” [Book Review], 259. BEDERSON, BENJAMIN B., see Herrnson, P. S. BERSON, ILENE R., and MICHAELJ . BERSON, “Challenging Online Behaviors of Youth: Findings From a Comparative Analysis of Young People in the United States and New Zealand,” 29. BERSON, MICHAEL J., see Berson, I. R. BIRCHMEIER, ZACHARY, ADAM N. JOINSON, and BETH DIETZ-UHLER, “Storming and Forming a Normative Response to a Deception Revealed Online,” 108. BLIUC, ANA-MARIA, see Douglas, K. M. BOUCKAERT, GEERT, see Kampen, J. K. BRASCH, WALTER M., “Fool’s Gold in the Nation’s Data-Mining Programs,” 401. BURTON, ORVILLE VERNON, “American Digital History,” 206 CONRAD, FREDERICK G., see Herrnson, P. S. CORBEIL, PIERRE, “History and the Computer in Canadian Institutions: An Overview,” 181. COUPER, MICK P., “Technology Trends in Survey Data Collection,” 486. CRAWFORD, SCOTT, see Peytchev, A. DAVIS, CHARLES N., “Expanding Privacy Rationales under the Federal Freedom of Information Act: Stigmatization as Talisman,” 453. DENEGRI-KNOTT, JANICE, and JACQUI TAYLOR, “The Labeling Game: A Conceptual Explora- tion of Deviance on the Internet,” 93. DIETZ-UHLER, BETH, see Birchmeier, Z. DOUGLAS, KAREN M., CRAIG MCGARTY, ANA-MARIA BLIUC, and GIRISH LALA, “Under- standing Cyberhate: Social Competition and Social Creativity in Online White Supremacist Groups,” 68. FAAS, THORSTEN, see Schoen, H. Social Science Computer Review, Vol. 23 No. 4, Winter 2005 510-513 © 2005 Sage Publications INDEX to SOCIAL SCIENCE COMPUTER REVIEW Volume 23 Number 1 (Spring 2005), pp. 1-140 Number 2 (Summer 2005), pp. 141-264 Number 3 (Fall 2005), pp. 265-392 Number 4 (Winter 2005), pp. 393-516 Authors: ALTMAN, MICAH, and GARY M. KLASS, “Symposium on Current Research in Voting, Elections, and Information Technology Current Research in Voting, Elections, and Technology,” 269. ALTMAN, MICAH, KARIN MACDONALD, and MICHAEL MCDONALD, “From Crayons to Com- puters: The Evolution of Computer Use in Redistricting,” 334. BARAK, AZY, “Sexual Harassment on the Internet,” 77. BEAHM, DONALD L., “Democracy and New Media, edited by Henry Jenkins and David Thorburn” [Book Review], 259. BEDERSON, BENJAMIN B., see Herrnson, P. S. BERSON, ILENE R., and MICHAELJ . BERSON, “Challenging Online Behaviors of Youth: Findings From a Comparative Analysis of Young People in the United States and New Zealand,” 29. BERSON, MICHAEL J., see Berson, I. R. BIRCHMEIER, ZACHARY, ADAM N. JOINSON, and BETH DIETZ-UHLER, “Storming and Forming a Normative Response to a Deception Revealed Online,” 108. BLIUC, ANA-MARIA, see Douglas, K. M. BOUCKAERT, GEERT, see Kampen, J. K. BRASCH, WALTER M., “Fool’s Gold in the Nation’s Data-Mining Programs,” 401. BURTON, ORVILLE VERNON, “American Digital History,” 206 CONRAD, FREDERICK G., see Herrnson, P. S. CORBEIL, PIERRE, “History and the Computer in Canadian Institutions: An Overview,” 181. COUPER, MICK P., “Technology Trends in Survey Data Collection,” 486. CRAWFORD, SCOTT, see Peytchev, A. DAVIS, CHARLES N., “Expanding Privacy Rationales under the Federal Freedom of Information Act: Stigmatization as Talisman,” 453. DENEGRI-KNOTT, JANICE, and JACQUI TAYLOR, “The Labeling Game: A Conceptual Explora- tion of Deviance on the Internet,” 93. DIETZ-UHLER, BETH, see Birchmeier, Z. DOUGLAS, KAREN M., CRAIG MCGARTY, ANA-MARIA BLIUC, and GIRISH LALA, “Under- standing Cyberhate: Social Competition and Social Creativity in Online White Supremacist Groups,” 68. FAAS, THORSTEN, see Schoen, H. Social Science Computer Review, Vol. 23 No. 4, Winter 2005 510-513 © 2005 Sage Publications INDEX 511 FRANCIA, PETER L., see Herrnson, P. S. FUJII, YUSAKU, NORIAKI YOSHIURA, and NAOYA OHTA, “Creating a Worldwide Community Security Structure Using Individually Maintained Home Computers: The e-JIKEI Network Pro- ject” [Reports and Communications], 250. GARSON, G. DAVID, “Patriotic Information Systems: Evaluating Bush Administration Information Policy,” 395. GOLDMAN, ERIC, “The Challenges of Regulating Warez Trading,” 24. GORDON, IAN, “Academic Computing in Asia: An Overview and a Case Study,” 167. HAMMITT, HARRY, “Less Safe—the Dismantling of Public Information Systems After 9/11,” 429. HAQUE, AKHLAQUE, “Information Technology and Surveillance: Implications for Public Adminis- tration in a New World Order,” 480. HARGITTAI, ESZTER, “Survey Measures of Web-Oriented Digital Literacy,” 371. HAYWOOD, E. KALE, see Slatta, R. W. HERRNSON, PAUL S., BENJAMIN B. BEDERSON, BONGSHIN LEE, PETER L. FRANCIA, ROBERT M. SHERMAN, FREDERICK G. CONRAD, MICHAEL TRAUGOTT, and RICHARD G. NIEMI, “Early Appraisals of Electronic Voting,” 274. HILLIS, PETER, and BOB MUNRO, “ICT in History Education—Scotland and Europe,” 190. JOINSON, ADAM N., “Deviance and the Internet: New Challenges for Social Science,” 5. JOINSON, ADAM N., see Birchmeier, Z. KAMPEN, JARL K., KRIS SNIJKERS, and GEERT BOUCKAERT, “Public Priorities Concerning the Development of E-Government in Flanders” [Reports and Communications], 136. KENSKI, KATE, “To I-Vote or Not to I- Vote? Opinions About Internet Voting from Arizona Voters,” 293. KLASS, GARY M., see Altman, M. KRUEGER, BRIAN S., “Government Surveillance and Political Participation on the Internet,’ 439 LALA, GIRISH, see Douglas, K. M. LEE, BONGSHIN, see Herrnson, P. S. MACDONALD, KARIN, see Altman, M. MACINTOSH, ANN, see Xenakis, A. McDONALD, MICHAEL, see Altman, M. McGARTY, CRAIG, see Douglas, K. M. McLACHLAN, ROBIN C. D., “Information Technology and Historians: The Australian Experience,” 174. MARTIN, CHRISTIAN W., and THOMAS PLUMPER, “Number of Parties, Endogenous Partisan Preferences, and Electoral Turnout Rates: A Stochastic Equilibrium Analysis,” 347. MINCHEVA, DILYANA, “Digitizing the News: Innovation in Online Newspapers, by Pablo J. Boczkowski” [Book Review], 507. MORAHAN-MARTIN, JANET, “Internet Abuse: Addiction? Disorder? Symptom? Alternative Explanations?” 39. MUNRO, BOB, see Hillis, P. MURPHY, JOHN W., “Social, Ethical, and Political Implications of Information Technology, edited by Linda L. Brennan and Victoria E. Johnson” [Book Review}, 388. NIEMI, RICHARD G., see Herrnson, P. S. OHTA, NAOYA, see Fujii, Y. OOSTVEEN, ANNE-MARIEa,n d PETER VAN DEN BESSELAAR, “Trust, Identity, and the Effects of Voting Technologies on Voting Behavior,” 304. PANAGOPOULOS, COSTAS, “Reports and Communications Follow the Money: Assessing the Allo- cation of e-Rate Funds,” 502. PEYTCHEV, ANDY, and SCOTT CRAWFORD, “A Typology of Real-Time Validations in Web- Based Surveys,” 235. PLUMPER, THOMAS, see Martin, C. W. PORTER, STEPHEN R., and MICHAEL E. WHITCOMB, “E-mail Subject Lines and Their Effect on Web Survey Viewing and Response,” 380. 512. SOCIAL SCIENCE COMPUTER REVIEW ROY, JEFFREY, “Security, Sovereignty and Continental Interoperability: Canada’s Elusive Balance,” 463. ROYAL, CINDY, see Tankard, JR., J. W. SCHICK, JAMES B. M., “Coming of Age in Computing,” 143. SCHOEN, HARALD, and THORSTEN FAAS, “When Methodology Interferes With Substance: The Difference of Attitudes Toward E-Campaigning and E- Voting in Online and Offline Surveys,” 326. SELWYN, NEIL, “The Social Processes of Learning to Use Computers,” 122. SHERMAN, ROBERT M.., see Herrnson, P. S. SLATTA, RICHARD W., and E. KALE HAYWOOD, “Enhancing Latin American History Teaching and Research With Computers,” 152. SNIJKERS, KRIS, see Kampen, J. K. SUN, CHUEN-TSAIT, see Wu, H.-C. TANKARD, JR., JAMES W., and CINDY ROYAL, “What’s on the Web—And What’s Not,” 360. TAYLOR, JACQUI, see Denegri-Knott, J. TRAUGOTT, MICHAEL, see Herrnson, P. S. TURGEMAN-GOLDSCHMIDT, ORLY, “Hackers’ Accounts: Hacking as a Social Entertainment,” 8. UTZ, SONJA, “Types of Deception and Underlying Motivation: What People Think,” 49. VAN DEN BESSELAAR, PETER, see Oostveen, A.-M. WHITCOMB, MICHAEL E., see Porter, S. R. WHITTY, MONICA T., “The Realness of Cybercheating: Men’s and Women’s Representations of Unfaithful Internet Relationships,” 57. WILLIAMS, JAMES L., “Jechnology in Counseling and Psychotherapy: A Practitioner’s Guide, edited by Stephen Goss and Kate Anthony” [Book Review], 389. WU, HSU-CHIH, and CHUEN-TSAIT SUN, “What Should We Do Before Running a Social Simula- tion? The Importance of Model Analysis,” 221. XENAKIS, ALEXANDROS, and ANN MACINTOSH, “Trust Analysis of the U.K. E-Voting Pilots,” 312. YOSHIURA, NORIAKI, see Fujii, Y. Articles: “Academic Computing in Asia: An Overview and a Case Study,” Gordon, 167. “American Digital History,” Burton, 206. “The Challenges of Regulating Warez Trading,’ Goldman, 24. “Challenging Online Behaviors of Youth: Findings From a Comparative Analysis of Young People in the United States and New Zealand,” Berson and Berson, 29. “Coming of Age in Computing,” Schick, 143. “Deviance and the Internet: New Challenges for Social Science,” Joinson, 5. “E-mai! Subject Lines and Their Effect on Web Survey Viewing and Response,” Porter and Whitcomb, 380. “Early Appraisals of Electronic Voting,’ Herrnson et al., 274. “Enhancing Latin American History Teaching and Research With Computers,” Slatta and Haywood, 152. “Expanding Privacy Rationales under the Federal Freedom of Information Act: Stigmatization as Tal- isman,” Davis, 453. “Fool’s Gold in the Nation’s Data-Mining Programs,” Brasch, 401. “From Crayons to Computers: The Evolution of Computer Use in Redistricting.” Altman et al., 334. “Government Surveillance and Political Participation on the Internet,” Krueger, 439. ‘Hackers’ Accounts: Hacking as a Social Entertainment,” Turgeman-Goldschmidt, 8. “History and the Computer in Canadian Institutions: An Overview,” Corbeil, 181. “ICT in History Education—Scotland and Europe,” Hillis and Munro, 190. “Information Technology and Historians: The Australian Experience,” McLachlan, 174. “Information Technology and Surveillance: Implications for Public Administration in a New World Order,” Haque, 480. INDEX “Internet Abuse: Addiction? Disorder? Symptom? Alternative Explanations?” Morahan-Martin, 39. “The Labeling Game: A Conceptual Exploration of Deviance on the Internet,” Denegri-Knott and Taylor, 93. “Less Safe—the Dismantling of Public Information Systems After 9/11,’ Hammitt, 429. “Number of Parties, Endogenous Partisan Preferences, and Electoral Turnout Rates: A Stochastic Equilibrium Analysis,’ Martin and Pliimper, 347. “Patriotic Information Systems: Evaluating Bush Administration Information Policy,’ Garson, 395. “The Realness of Cybercheating: Men’s and Women’s Representations of Unfaithful Internet Rela- tionships,” Whitty, 57. “Reports and Communications Follow the Money: Assessing the Allocation of e-Rate Funds,” Panagopoulos, 502. “Security, Sovereignty and Continental Interoperability: Canada’s Elusive Balance,” Rov, 463. “Sexual Harassment on the Internet,” Barak, 77. “The Social Processes of Learning to Use Computers,” Selwyn, 122. “Storming and Forming a Normative Response to a Deception Revealed Online,” Birchmeier et al., 108. “Survey Measures of Web-Oriented Digital Literacy,” Hargittai, 371. “Symposium on Current Research in Voting, Elections, and Information Technology Current Research in Voting, Elections, and Technology,” Altman and Klass, 269. “Technology Trends in Survey Data Collection,’ Couper, 486. “To I-Vote or Not to I-Vote? Opinions About Internet Voting from Arizona Voters,” Kenski, 293. “Trust Analysis of the U.K. E-Voting Pilots,’ Xenakis and Macintosh, 312. “Trust, Identity, and the Effects of Voting Technologies on Voting Behavior,’ Oostveen and van den Besselaar, 304. “Types of Deception and Underlying Motivation: What People Think,” Utz, 49. “A Typology of Real-Time Validations in Web-Based Surveys,” Peytchev and Crawford, 235 “Understanding Cyberhate: Social Competition and Social Creativity in Online White Supremacist Groups,” Douglas et al., 68. “What Should We Do Before Running a Social Simulation? The Importance of Model Analysis,” Wu and Sun, 221. “What’s on the Web—And What’s Not,” Tankard, Jr., and Royal, 360. “When Methodology Interferes With Substance: The Difference of Attitudes Toward E-Campaigning and E-Voting in Online and Offline Surveys,” Schoen and Faas, 326. Book Reviews: “Democracy and New Media, edited by Henry Jenkins and David Thorburn,” Beahm, 259. “Digitizing the News: Innovation in Online Newspapers, by Pablo J. Boczkowski,”’ Mincheva, 507. “Social, Ethical, and Political Implications of Information Technology, edited by Linda L. Brennan and Victoria E. Johnson,’ Murphy, 388. “Technology in Counseling and Psychotherapy: A Practitioner's Guide, edited by Stephen Goss and Kate Anthony,” Williams, 389. Reports and Communications: “Creating a Worldwide Community Security Structure Using Individually Maintained Home Comput ers: The e-JIKEI Network Project,” Fujii et al., 250. “Public Priorities Concerning the Developmeat of E-Government in Flanders,” Kampen et al., 136.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.