{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:00:59Z","timestamp":1725465659071},"publisher-location":"New York","reference-count":38,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"0387275606"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-28918-6_10","type":"book-chapter","created":{"date-parts":[[2006,1,16]],"date-time":"2006-01-16T14:47:26Z","timestamp":1137422846000},"page":"109-122","source":"Crossref","is-referenced-by-count":4,"title":["Beliefs about Computing: Contrary Evidence from a Study of Mobile Computing Use among Criminal Justice Personnel"],"prefix":"10.1007","author":[{"given":"Andrea","family":"Tapia","sequence":"first","affiliation":[]},{"given":"Steve","family":"Sawyer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"volume-title":"Technology and the Future of Work","year":"1992","key":"10_CR1","unstructured":"Adler, P. (Ed.). Technology and the Future of Work, New York: Oxford University Press, 1992."},{"key":"10_CR2","unstructured":"Adorno, T., and Horkheimer, M. \u201cThe Culture Industry: Enlightenment as Mass Deception,\u201d in Dialectic of Enlightenment, 1944."},{"key":"10_CR3","first-page":"293","volume-title":"Theory of Culture","author":"J. Alexander","year":"1992","unstructured":"Alexander, J. \u201cThe Promise of a Cultural Sociology: Technological Discourse and the Sacred and Profane Information Machine,\u201d in Theory of Culture, R. M. Smelser (Ed.), Berkeley, CA: University of California Press, 1992, pp. 293\u2013323."},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Allen, D., and Wilson, T. \u201cAction, Interaction and the Role of Ambiguity in the Introduction of Mobile Information Systems in a UK Police Force,\u201d in Proceedings of the IFIP TC8 Working Conference on Mobile Information Systems, September 15\u201317, 2004, pp. 15\u201336.","DOI":"10.1007\/0-387-22874-8_2"},{"issue":"1","key":"10_CR5","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MC.1987.1663532","volume":"4","author":"F. Brooks","year":"1987","unstructured":"Brooks, F. \u201cNo Silver Bullet; Essence and Accidents of Software Engineering,\u201d Computer (4:1), 1987, pp. 10\u201319.","journal-title":"Computer"},{"issue":"4","key":"10_CR6","doi-asserted-by":"crossref","first-page":"351","DOI":"10.2307\/3381224","volume":"24","author":"M. Brown","year":"2001","unstructured":"Brown, M. \u201cThe Benefits and Costs of Information Technology Innovations: An Empirical Assessment of a Local Government Agency,\u201d Public Performance & Management Review (24:4), 2001, pp. 351\u2013366.","journal-title":"Public Performance & Management Review"},{"key":"10_CR7","volume-title":"Techgnosis","author":"E. Davis","year":"1998","unstructured":"Davis, E. Techgnosis, New York: Random House, 1998."},{"key":"10_CR8","volume-title":"The Technological Society","author":"J. Ellul","year":"1965","unstructured":"Ellul, J. The Technological Society, NewYork: Alfred A. Knopf, 1965."},{"key":"10_CR9","volume-title":"Technological Man: The Myth and the Reality","author":"V. Ferkiss","year":"1969","unstructured":"Ferkiss, V. Technological Man: The Myth and the Reality, New York: George Brazilier, 1969."},{"key":"10_CR10","doi-asserted-by":"crossref","DOI":"10.1037\/10030-000","volume-title":"When Prophecy Fails","author":"L. Festinger","year":"1956","unstructured":"Festinger, L., Riecken, H., and Schachter, S. When Prophecy Fails, Minneapolis, MN: University of Minnesota Press, 1956."},{"issue":"4","key":"10_CR11","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1080\/01972240290075129","volume":"18","author":"N. Green","year":"2002","unstructured":"Green, N. \u201cOn the Move: Technology, Mobility, and the Mediation of Social Time and Space,\u201d The Information Society (18:4), 2002, pp. 135\u2013152.","journal-title":"The Information Society"},{"key":"10_CR12","volume-title":"The Millennium Myth","author":"M. Grosso","year":"1995","unstructured":"Grosso, M. The Millennium Myth, Wheaton, IL: Theosophical Publishing Press, 1995."},{"key":"10_CR13","volume-title":"The Question Concerning Technology","author":"M. Heidegger","year":"1977","unstructured":"Heidegger, M. The Question Concerning Technology, New York: Harper and Row, 1977."},{"issue":"12","key":"10_CR14","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/585597.585621","volume":"45","author":"L. Jessup","year":"2002","unstructured":"Jessup, L., and Robey, D. \u201cThe Relevance of Social Issues in Ubiquitous Computing Environments,\u201d Communications of the ACM (45:12), 2002, pp. 88\u201391.","journal-title":"Communications of the ACM"},{"key":"10_CR15","first-page":"2","volume":"12","author":"M. L. Kaarst-Brown","year":"1999","unstructured":"Kaarst-Brown, M. L., and Robey, D. \u201cMore on Myth, Magic and Metaphor: Cultural Insights into the Management of Information Technology in Organizations,\u201d Information, Technology and People (12:2), 1999.","journal-title":"Information, Technology and People"},{"key":"10_CR16","doi-asserted-by":"publisher","first-page":"144","DOI":"10.2307\/2391789","volume":"19","author":"P. N. Khandwalla","year":"1974","unstructured":"Khandwalla, P. N. \u201cMass Output Orientation of Operations Technology and Organizational Structure,\u201d Administrative Science Quarterly (19), 1974, pp. 144\u2013156.","journal-title":"Administrative Science Quarterly"},{"issue":"1","key":"10_CR17","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/356802.356806","volume":"12","author":"R. Kling","year":"1980","unstructured":"Kling, R. \u201cSocial Analysis of Computing: Theoretical Perspectives in Recent Empirical Research,\u201d ACM Computing Surveys (12:1), 1980, pp. 61\u2013110.","journal-title":"ACM Computing Surveys"},{"issue":"1","key":"10_CR18","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1177\/0894439303259881","volume":"22","author":"C. Lin","year":"2004","unstructured":"Lin, C., Hu, P. J-H., and Chen, H. \u201cTechnology Implementation Management in Law Enforcement,\u201d Social Science Computer Review (22:1), 2004, pp. 24.","journal-title":"Social Science Computer Review"},{"issue":"1","key":"10_CR19","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/585597.585616","volume":"45","author":"K. Lyytinen","year":"2002","unstructured":"Lyytinen, K., and Yoo, Y. \u201cIssues and Challenges in Ubiquitous Computing: Introduction,\u201d Communications of the ACM (45:1), 2002a, pp. 62\u201365.","journal-title":"Communications of the ACM"},{"issue":"4","key":"10_CR20","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1287\/isre.13.4.377.75","volume":"13","author":"K. Lyytinen","year":"2002","unstructured":"Lyytinen, K., and Yoo, Y. \u201cThe Next Wave of Nomadic Computing,\u201d Information Systems Research (13:4), 2002b, pp. 377\u2013388.","journal-title":"Information Systems Research"},{"key":"10_CR21","volume-title":"Police Work: The Social Organization of Policing","author":"P. Manning","year":"1977","unstructured":"Manning, P. Police Work: The Social Organization of Policing, Prospect Heights, IL: Waveland Publishing, 1977."},{"key":"10_CR22","doi-asserted-by":"crossref","DOI":"10.7208\/chicago\/9780226503523.001.0001","volume-title":"Policing Contingencies","author":"P. Manning","year":"2003","unstructured":"Manning, P. Policing Contingencies, Chicago: University of Chicago Press, 2003."},{"issue":"3","key":"10_CR23","first-page":"425","volume":"9","author":"H. Marcuse","year":"1941","unstructured":"Marcuse, H. \u201cSocial Science Implications of Modern Technology,\u201d Studies in Philosophy and Social Sciences (9:3), 1941, p. 425","journal-title":"Studies in Philosophy and Social Sciences"},{"key":"10_CR24","volume-title":"Science, Technology and Society","author":"R. McGinn","year":"1941","unstructured":"McGinn, R. Science, Technology and Society, Englewood Cliffs, NJ: Prentice Hall, 1941."},{"key":"10_CR25","unstructured":"NASCIO. \u201cConcept for Operations for Integrated Justice Information Sharing Version 1.0,\u201d National Association of State Chief Information Officers, July 2003 (available online at https:\/\/www.nascio.org\/publications\/index.cfm)."},{"issue":"3","key":"10_CR26","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/0047-2352(95)00019-M","volume":"23","author":"A. Northrup","year":"1995","unstructured":"Northrup, A., Kraemer, K., and King, J. \u201cPolice Use and Computers,\u201d Journal of Criminal Justice (23:3), 1995, pp. 259\u2013275.","journal-title":"Journal of Criminal Justice"},{"issue":"2","key":"10_CR27","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1111\/0033-3352.00024","volume":"61","author":"S. Nunn","year":"2001","unstructured":"Nunn, S. \u201cPolice Information Technology: Assessing the Effects of Computerization on Urban Police Functions,\u201d Public Administration Review (61:2), 2001, pp. 221\u2013234.","journal-title":"Public Administration Review"},{"issue":"2","key":"10_CR28","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1287\/isre.12.2.121.9700","volume":"12","author":"W. Orlikowski","year":"2001","unstructured":"Orlikowski, W., and Iacono, S. \u201cDesperately Seeking the \u2018IT\u2019 in IT Research\u2014A Call to Theorizing the IT Artifact,\u201d Information Systems Research (12:2), 2001, pp. 121\u2013124.","journal-title":"Information Systems Research"},{"key":"10_CR29","unstructured":"Pica, D., and Kakihara, M. \u201cThe Duality of Mobility: Designing Fluid Organizations through Stable Interaction,\u201d in Proceedings of the 11 th European Conference on Information Systems, C. Ciborra, R. Mercurio, M. DeMarco, and O. Hanseth, Naples, Italy, June 19\u201321, June 2003, pp. 259\u2013275."},{"key":"10_CR30","volume-title":"Technopoly","author":"N. Postman","year":"1992","unstructured":"Postman, N. Technopoly, New York: Vintage Books, 1992."},{"key":"10_CR31","doi-asserted-by":"crossref","DOI":"10.1525\/9780520914889","volume-title":"The Cult of Information","author":"T. Rozak","year":"1994","unstructured":"Rozak, T. The Cult of Information, Berkley, CA: University of California Press, 1994."},{"key":"10_CR32","unstructured":"Rudman, W., Clarke, R., and Metzel, J. \u201cEmergency Responders: Drastically Underfunded, Dangerously Unprepared,\u201d Report of an Independent Task Force Sponsored by the Council on Foreign Relations, July 29, 2003 (available online at http:\/\/www.cfr.org\/pdf\/Responders_TF.pdf)."},{"issue":"2","key":"10_CR33","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1080\/0268396032000101171","volume":"18","author":"S. Sawyer","year":"2003","unstructured":"Sawyer, S., Allen, J., and Lee, H. \u201cBroadband and Mobile Opportunities: A Sociotechnical Perspective,\u201d Journal of Information Technology (18:2), 2003, pp. 31\u201350.","journal-title":"Journal of Information Technology"},{"key":"10_CR34","volume-title":"Wireless Communications and Interoperability among State and Local Law Enforcement Agencies","author":"M. Taylor","year":"1998","unstructured":"Taylor, M., Epper, R., and Tolman, T. Wireless Communications and Interoperability among State and Local Law Enforcement Agencies, Report 168945, National Criminal Justice Institute, Washington, DC, 1998."},{"key":"10_CR35","volume-title":"Organizations in Action","author":"J. Thompson","year":"1967","unstructured":"Thompson, J. Organizations in Action, New York: McGraw-Hill, 1967."},{"key":"10_CR36","doi-asserted-by":"crossref","DOI":"10.1525\/9780520915077","volume-title":"What Machines Can\u2019t Do","author":"R. J. Thomas","year":"1994","unstructured":"Thomas, R. J. What Machines Can\u2019t Do, Los Angeles: University of California Press, 1994."},{"key":"10_CR37","first-page":"19","volume-title":"The Whale and the Reactor: A Search for Limits in an Age of High Technology","author":"L. Winner","year":"1986","unstructured":"Winner, L. \u201cDo Artifacts Have Politics?,\u201d The Whale and the Reactor: A Search for Limits in an Age of High Technology, Chicago: University of Chicago Press, 1986, pp. 19\u201339."},{"key":"10_CR38","volume-title":"Industrial Organizations: Theory and Practice","author":"J. Woodward","year":"1965","unstructured":"Woodward, J. Industrial Organizations: Theory and Practice, London: Oxford University Press, 1965."}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Designing Ubiquitous Information Environments: Socio-Technical Issues and Challenges"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-28918-6_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T07:36:47Z","timestamp":1706859407000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-28918-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387275606"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/0-387-28918-6_10","relation":{},"subject":[]}}