{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T13:34:07Z","timestamp":1774272847053,"version":"3.50.1"},"reference-count":39,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2015,4,24]],"date-time":"2015-04-24T00:00:00Z","timestamp":1429833600000},"content-version":"vor","delay-in-days":478,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2014,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title><jats:p>While social informatics (SI) is uniquely positioned to examine the technical and organizational properties of information and communication technology (ICT) and associated user practices, it often ignores the cultural mediation of design, use, and meaning of ICTs. Critical informatics, more so than normative and analytic orientations to ICT, offers possibilities to foreground culture as a sensitizing context for studying information and technology in society. This paper articulates a new critical informatics approach: critical technocultural discourse analysis (CTDA) as an analysis employing critical cultural frameworks (e.g. critical race or feminist theory) to jointly interrogate culture and technology. CTDA (Brock ) is a bifurcated approach for studying Internet phenomena integrating interface analysis with user discourse analysis. This paper outlines CTDA, providing examples of how its methodological flexibility applies to examining varied ICT artifacts, such as twitter and search engine phenomena, while maintaining a critical perspective on design and use. CTDA is an important tool for critical informaticists that contributes to building understanding of technology as culture, grounded in user perspectives and real\u2010world practices.<\/jats:p>","DOI":"10.1002\/meet.2014.14505101032","type":"journal-article","created":{"date-parts":[[2015,4,24]],"date-time":"2015-04-24T17:19:02Z","timestamp":1429895942000},"page":"1-8","source":"Crossref","is-referenced-by-count":37,"title":["Critical informatics: New methods and practices"],"prefix":"10.1002","volume":"51","author":[{"given":"Miriam E.","family":"Sweeney","sequence":"first","affiliation":[{"name":"University of Alabama  513 Gorgas Library Box 870252 Tuscaloosa AL 35487\u20100252"}]},{"given":"Andr\u00e9","family":"Brock","sequence":"additional","affiliation":[{"name":"University of Michigan  5381 North Quad 105 South State Street Ann Arbor MI 48109\u20101285"}]}],"member":"311","published-online":{"date-parts":[[2015,4,24]]},"reference":[{"key":"e_1_2_7_2_1","unstructured":"Althusser L.(1971).Ideology and ideological state apparatuses (notes towards an investigation).Lenin and philosophy and other essays. Retrieved fromhttp:\/\/www.marxists.org\/reference\/archive\/althusser\/1970\/ideology.htm"},{"key":"e_1_2_7_3_1","volume-title":"Scholarly Communication and Bibliometrics","author":"Borgman C.L.","year":"1990"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/0730888487014003001"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/13691180802660628"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2012.732147"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203928912"},{"issue":"1","key":"e_1_2_7_8_1","article-title":"Game analysis: Developing a methodological toolkit for the qualitative study of games","volume":"6","author":"Consalvo M.","year":"2006","journal-title":"Game Studies"},{"key":"e_1_2_7_9_1","unstructured":"Crawford K.(2013 April 1).The hidden biases in big data.Harvard Business Review. URL:http:\/\/blogs.hbr.org\/2013\/04\/the-hidden-biases-in-big-data\/. Accessed: 2014\u201004\u201028. (Archived by WebCite\u00ae athttp:\/\/www.webcitation.org\/6PBLgOlwn)"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812462849"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20546"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1353\/aq.2006.0056"},{"key":"e_1_2_7_13_1","volume-title":"White","author":"Dyer R.","year":"1997"},{"key":"e_1_2_7_14_1","volume-title":"Cyber\u2010Marx: Cycles and circuits of struggle in high\u2010technology capitalism","author":"Dyer\u2010Witheford N.","year":"1999"},{"issue":"2","key":"e_1_2_7_15_1","doi-asserted-by":"crossref","DOI":"10.15353\/joci.v3i2.2373","article-title":"Trapped in the Digital Divide: The Distributive Paradigm in Community Informatics","volume":"3","author":"Eubanks V. E.","year":"2007","journal-title":"The Journal of Community Informatics"},{"key":"e_1_2_7_16_1","first-page":"121","volume-title":"Methods of critical discourse analysis","author":"Fairclough N.","year":"2001"},{"key":"e_1_2_7_17_1","volume-title":"The Sage encyclopedia of social science research methods","author":"Fairclough N.","year":"2004"},{"issue":"2","key":"e_1_2_7_18_1","doi-asserted-by":"crossref","first-page":"243","DOI":"10.31269\/triplec.v7i2.91","article-title":"Towards a critical theory of information","volume":"7","author":"Fuchs C.","year":"2009","journal-title":"tripleC"},{"key":"e_1_2_7_19_1","first-page":"157","volume-title":"Technology and Society (ISTAS)","author":"Fusco S. J.","year":"2010"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1353\/nlh.0.0062"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1086\/448224"},{"key":"e_1_2_7_22_1","volume-title":"The constitution of society: Outline of the theory of structuration","author":"Giddens A.","year":"2013"},{"key":"e_1_2_7_23_1","volume-title":"The machine at work: Technology, work, and organization","author":"Grint K.","year":"1997"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/S0038038501000219"},{"key":"e_1_2_7_25_1","first-page":"53","volume-title":"Technology and the transformation of white collar work","author":"Iacono S.","year":"1987"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1045\/january99-kling"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780199256044.001.0001"},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.2307\/2713291"},{"key":"e_1_2_7_29_1","volume-title":"The social shaping of technology","author":"MacKenzie D. A.","year":"1999"},{"key":"e_1_2_7_30_1","unstructured":"Mathews M.(2007May 9).Transcript of remarks by Mich Mathews Senior Vice President Central Marketing Microsoft Corporation. Microsoft Strategic Account Summit 2007 Seattle WA. Retrieved fromhttp:\/\/www.microsoft.com\/presspass\/exec\/mathews\/05-08-2007MSNSAS.mspx"},{"key":"e_1_2_7_31_1","first-page":"29","volume-title":"Critical cyberculture studies","author":"Nakamura L.","year":"2006"},{"key":"e_1_2_7_32_1","volume-title":"The culture of technology","author":"Pacey A.","year":"1985"},{"key":"e_1_2_7_33_1","doi-asserted-by":"publisher","DOI":"10.1177\/030631284014003004"},{"key":"e_1_2_7_34_1","doi-asserted-by":"publisher","DOI":"10.1002\/aris.1440360111"},{"key":"e_1_2_7_35_1","doi-asserted-by":"publisher","DOI":"10.2307\/358761"},{"key":"e_1_2_7_36_1","unstructured":"Sweeney M.(2013).Not just a pretty (inter)face: A critical analysis of Microsoft's \u201cMs. Dewey.\u201d (Doctoral dissertation). Retrieved fromhttp:\/\/hdl.handle.net\/2142\/46617"},{"key":"e_1_2_7_37_1","unstructured":"Tiku Nitasha(2014 April 24).IMs and emails support allegations about the toxic culture at GitHub.Valleywag. URL:http:\/\/valleywag.gawker.com\/ims-and-email-support-allegations-about-the-toxic-cultu-1567175545Accessed: 2014\u201004\u201028"},{"key":"e_1_2_7_38_1","doi-asserted-by":"publisher","DOI":"10.1525\/9780520948693"},{"key":"e_1_2_7_39_1","doi-asserted-by":"publisher","DOI":"10.1177\/0957926593004002006"},{"key":"e_1_2_7_40_1","doi-asserted-by":"crossref","first-page":"63","DOI":"10.4135\/9780857028020","volume-title":"Methods of Critical Discourse Analysis","author":"Wodak R.","year":"2001"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2014.14505101032","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2014.14505101032","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.2014.14505101032","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/meet.2014.14505101032","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.2014.14505101032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T12:05:25Z","timestamp":1760961925000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.2014.14505101032"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["10.1002\/meet.2014.14505101032"],"URL":"https:\/\/doi.org\/10.1002\/meet.2014.14505101032","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"value":"0044-7870","type":"print"},{"value":"1550-8390","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1]]}}}