{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T19:20:16Z","timestamp":1774293616881,"version":"3.50.1"},"publisher-location":"Boston, MA","reference-count":34,"publisher":"Springer US","isbn-type":[{"value":"9780387378756","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-37876-3_4","type":"book-chapter","created":{"date-parts":[[2007,1,16]],"date-time":"2007-01-16T17:40:56Z","timestamp":1168969256000},"page":"49-62","source":"Crossref","is-referenced-by-count":14,"title":["Social Informatics: Principles, Theory, and Practice"],"prefix":"10.1007","author":[{"given":"Steve","family":"Sawyer","sequence":"first","affiliation":[]},{"given":"Michael","family":"Tyworth","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Baird, Z., & Barksdale, J. (2003). Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force. Task Force on National Security in the Information Age Retrieved January 1, 2005, from http:\/\/www.markle.org\/downloadable~assets\/nstf~report2~fulI~report,pdf"},{"issue":"1","key":"4_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/4132338","volume":"26","author":"R. Baskerville","year":"2002","unstructured":"Baskerville, R., & Myers, M. (2002). Information systems as a reference discipline. MIS Quarterly, 26(1), 1\u201323.","journal-title":"MIS Quarterly"},{"key":"4_CR3","volume-title":"Of Bicycles, Bakelites, and Bulbs: Toward a Theory of Sociotechnical Change","author":"W. E. Bijker","year":"1995","unstructured":"Bijker, W. E. (1995). Of Bicycles, Bakelites, and Bulbs: Toward a Theory of Sociotechnical Change. Cambridge, MA: MIT Press."},{"key":"4_CR4","unstructured":"Bureau of Justice Assistance. (2002). Mission Possible: Strong Governance Structures for the Integration of Justice Information Systems. Retrieved November 3, 2004. from http:Nwww.ncjrs.org\/pdffiles1\/bja~l92278.pdf."},{"key":"4_CR5","first-page":"371","volume":"3","author":"T. Dunworth","year":"2000","unstructured":"Dunworth, T. (2000). Criminal Justice and the IT Revolution. Policies, Processes, and Decisions of the Criminal Justice System, 3, 371\u2013426.","journal-title":"Policies, Processes, and Decisions of the Criminal Justice System"},{"key":"4_CR6","first-page":"1","volume-title":"Information Technology and the Criminal Justice System","author":"T. Dunworth","year":"2005","unstructured":"Dunworth, T. (2005). Information Technology and the Criminal Justice System: A Historical Review. In A. Pattavina (Ed.), Information Technology and the Criminal Justice System (pp. 1\u201328). Thousand Oaks, CA: Sage Publications, Inc."},{"issue":"6","key":"4_CR7","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1016\/0048-7333(94)90014-0","volume":"23","author":"J. Fleck","year":"1994","unstructured":"Fleck, J. (1994). Learning by trying: the implementation of configurational technology. Research Policy, 23(6), 637\u2013652.","journal-title":"Research Policy"},{"key":"4_CR8","unstructured":"General Accountability Office. (2003). Information Technology: FBI Needs an Enterprise Architecture to Guide Its Modernization Activities. Retrieved, from http:Nwww.gao.gov\/new.items\/dO3959.pdf."},{"issue":"1","key":"4_CR9","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1093\/ijlit\/6.1.69","volume":"6","author":"A. Hoey","year":"1998","unstructured":"Hoey, A. (1998). Techno-Cops: Information Technology and Law Enforcement, International Journal of Law and Information Technology, 6(1), 69\u201390.","journal-title":"International Journal of Law and Information Technology"},{"issue":"1","key":"4_CR10","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1108\/09593840510584621","volume":"18","author":"K. Horton","year":"2005","unstructured":"Horton, K., Davenport, E., & Wood-Harper, T. (2005). Exploring sociotechnical interaction with Rob Kling: Five \u2018big\u2019 ideas. Information Technology & People, 18(1), 50\u201365.","journal-title":"Information Technology & People"},{"key":"4_CR11","first-page":"30","volume-title":"Abusing Science: The case against creationism","author":"P. Kitcher","year":"1982","unstructured":"Kitcher, P. (1982). Believing what we cannot prove. In P. Kitcher (Ed.), Abusing Science: The case against creationism (pp. 30\u201354). Cambridge, Mass.: MIT Press."},{"key":"4_CR12","unstructured":"Kling, R. (1999). What is Social Informatics and Why Does it Matter? D-Lib Magazine Retrieved September 1, 2004, from http:\/\/www.dlib.orgldlib\/january99\/kling\/01kling.html"},{"issue":"1","key":"4_CR13","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1002\/asi.10154","volume":"54","author":"R. Kling","year":"2003","unstructured":"Kling, R., McKim, G., & King, A. (2003). A Bit More to IT: Scholarly Communication Forums as Socio-Technical Interaction Networks. Journal of the American Society for Information Science and Technology, 54(1), 47\u201367.","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"4_CR14","volume-title":"Understanding and Communicating Social Informatics: A Framework for Studying and Teaching the Human Contexts of Information and Communications Technologies","author":"R. Kling","year":"2005","unstructured":"Kling, R., Rosenbaum, H., & Sawyer, S. (2005a). Teaching Key Ideas of Social Informatics. In Understanding and Communicating Social Informatics: A Framework for Studying and Teaching the Human Contexts of Information and Communications Technologies (pp. 83\u2013103). Medford, N.J.: Information Today Inc."},{"key":"4_CR15","volume-title":"Understanding and Communicating Social Informatics: A Framework for Studying and Teaching the Human Contexts of Information and Communications Technologies","author":"R. Kling","year":"2005","unstructured":"Kling, R., Rosenbaum, H., & Sawyer, S. (2005b). Understanding and Communicating Social Informatics: A Framework for Studying and Teaching the Human Contexts of Information and Communications Technologies. Medford, New Jersey: Information Today, Inc."},{"issue":"2","key":"4_CR16","doi-asserted-by":"crossref","first-page":"197","DOI":"10.2307\/30036529","volume":"27","author":"R. Lamb","year":"2003","unstructured":"Lamb, R., & Kling, R. (2003). Reconceptualizing users as social actors in information systems research. MIS Quarterly, 27(2), 197\u2013235.","journal-title":"MIS Quarterly"},{"issue":"1","key":"4_CR17","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1108\/09593840510584595","volume":"18","author":"R. Lamb","year":"2005","unstructured":"Lamb, R., & Sawyer, S. (2005). On extending social informatics from a rich legacy of networks and conceptual resources. Information Technology & People, 18(1), 9\u201319.","journal-title":"Information Technology & People"},{"key":"4_CR18","volume-title":"Qualitative data analysis: a sourcebook of new methods","author":"M. Miles","year":"1984","unstructured":"Miles, M., & Huberman, A. (1984). Qualitative data analysis: a sourcebook of new methods. Newbury Park: Sage Publications."},{"key":"4_CR19","volume-title":"The 9\/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States: official government edition","author":"National Commission on Terrorist Attacks upon the United States","year":"2004","unstructured":"National Commission on Terrorist Attacks upon the United States. (2004). The 9\/11 Commission report: final report of the National Commission on Terrorist Attacks upon the United States: official government edition. Washington, D.C.: U.S. Government Printing Office."},{"issue":"4","key":"4_CR20","first-page":"380","volume":"3","author":"W. Orlikowski","year":"1992","unstructured":"Orlikowski, W. (1992). The Duality of Technology: Rethinking the Concept of Technology in Organizations, Organization Science, 3(4), 380\u2013398","journal-title":"Organization Science"},{"issue":"2","key":"4_CR21","doi-asserted-by":"crossref","first-page":"145","DOI":"10.2307\/3250927","volume":"25","author":"W. Orlikowski","year":"2001","unstructured":"Orlikowski, W., & Barley, S. (2001). Technology and institutions: What can research on information technology and research on organizations learn from each other? MIS Quarterly, 25(2), 145\u2013164.","journal-title":"MIS Quarterly"},{"issue":"1","key":"4_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1287\/isre.2.1.1","volume":"2","author":"W. J. Orlikowski","year":"1991","unstructured":"Orlikowski, W. J., & Baroudi, J. J. (1991). Studying Information Technology in Organizations: Research Approaches and Assumptions, Information Systems Research, 2(1), 1\u201319","journal-title":"Information Systems Research"},{"issue":"4","key":"4_CR23","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1287\/orsc.6.4.423","volume":"6","author":"W. J. Orlikowski","year":"1995","unstructured":"Orlikowski, W. J., Yates, J., Okamura, K., & Fujimoto, M. (1995). Shaping electronic communication: The metastructuring of technology in the context of use. Organization Science, 6(4), 401\u2013423.","journal-title":"Organization Science"},{"key":"4_CR24","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1108\/09593849410074016","volume":"7","author":"P. Quintas","year":"1994","unstructured":"Quintas, P. (1994). Programmed Innovation? Trajectories of Change in Software Development. Information Technology & People, 7, 25\u201347.","journal-title":"Information Technology & People"},{"key":"4_CR25","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/1-4020-8095-6_3","volume-title":"lnformation systems research: relevant theory and informedpractice","author":"S. Sawyer","year":"2004","unstructured":"Sawyer, S., & Crowston, K. (2004). Information Systems in Organizations and Society: Speculating on the Next 25 Years of Research. In B. Kaplan, D. Truex, D. Wastell, A. Wood-Harper & J. DeGross (Eds.), lnformation systems research: relevant theory and informedpractice, (pp. 35\u201352) Boston: Kluwer Academic Publishers."},{"issue":"3","key":"4_CR26","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/971617.971647","volume":"47","author":"S. Sawyer","year":"2004","unstructured":"Sawyer, S., Tapia, A., Pesheck, L., & Davenport, J. (2004). Mobility and the First Responder. Communications of the ACM, 47(3), 62\u201366.","journal-title":"Communications of the ACM"},{"key":"4_CR27","volume-title":"Institutions and organizations","author":"W. R. Scott","year":"2001","unstructured":"Scott, W. R. (2001). Institutions and organizations (2nd). Thousand Oaks, CA: Sage Publications.","edition":"(2nd)"},{"key":"4_CR28","unstructured":"Shelby, R. (2002). September I1 and the Imperative of Reform in the U.S. Intelligence Community: Additional Views ofSenator Richard C. Shelby Vice Chairman, Senate Select Committee on Intelligence. Retrieved November 1, 2004. from http:\/\/www.fas.org\/irp\/congress\/2002_rpt\/shelby.pdf."},{"issue":"6","key":"4_CR29","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1002\/bult.1720300604","volume":"30","author":"L. Strickland","year":"2004","unstructured":"Strickland, L. (2004). Analytic Myopia, Data Disintegration and Homeland Insecurity. Bulletin of the American Society for lnformation Science and Technology, 30(6), 7\u201321.","journal-title":"Bulletin of the American Society for lnformation Science and Technology"},{"key":"4_CR30","volume-title":"Plans and situated actions: the problem of human-machine communication","author":"L. Suchman","year":"1987","unstructured":"Suchman, L. (1987). Plans and situated actions: the problem of human-machine communication. Cambridge: Cambridge University Press."},{"key":"4_CR31","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/978-0-387-35634-1_3","volume-title":"Global and organizational discourse about information technology","author":"L. Suchman","year":"2003","unstructured":"Suchman, L. (2003). Figuring Service in Discourses of ICT: The Case of Software Agents. In E. Wynn, E. Whitley, M. Myers & J. DeGross (Eds.), Global and organizational discourse about information technology, (pp. 33\u201345). Boston: Kluwer Academic Publishers."},{"key":"4_CR32","first-page":"19","volume-title":"The Whale and the Reactor: A Search for Limits in an Age ofHigh Technology","author":"L. Winner","year":"1986","unstructured":"Winner, L. (1986). Do Artifacts Have Politics? In The Whale and the Reactor: A Search for Limits in an Age ofHigh Technology (pp. 19\u201339). Chicago: University of Chicago Press."},{"issue":"1","key":"4_CR33","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1108\/09593840510585918","volume":"18","author":"T. Wood-Harper","year":"2005","unstructured":"Wood-Harper, T., & Wood, B. (2005). Multiview as social informatics in action: past, present and future. Information Technology & People, 18(1), 21\u201326.","journal-title":"Information Technology & People"},{"key":"4_CR34","first-page":"5","volume-title":"Public Knowledge: An Essay Concerning the Social Dimension of Science","author":"J. M. Ziman","year":"1968","unstructured":"Ziman, J. M. (1968). What is Science? In J. M. Ziman (Ed.), Public Knowledge: An Essay Concerning the Social Dimension of Science (pp. 5\u201327). London: Cambridge University Press."}],"container-title":["IFIP International Federation for Information Processing","Social Informatics: An Information Society for all? In Remembrance of Rob Kling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-37876-3_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T02:01:04Z","timestamp":1619575264000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-37876-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387378756"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-37876-3_4","relation":{},"subject":[]}}