{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T04:21:59Z","timestamp":1751516519501,"version":"3.41.0"},"publisher-location":"Cham","reference-count":106,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030784614"},{"type":"electronic","value":"9783030784621"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78462-1_9","type":"book-chapter","created":{"date-parts":[[2021,7,3]],"date-time":"2021-07-03T00:48:50Z","timestamp":1625273330000},"page":"123-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Machine-Human Interaction: A Paradigm Shift?"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0455-6626","authenticated-orcid":false,"given":"Herv\u00e9","family":"Saint-Louis","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"9_CR1","volume-title":"La structure des r\u00e9volutions scientifiques","author":"TS Kuhn","year":"2008","unstructured":"Kuhn, T.S.: La structure des r\u00e9volutions scientifiques. Flammarion, Paris (2008)"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Licklider, J.C.R.: Man-computer symbiosis. In: IRE Transactions on Human Factors in Electronics, vol. HFE-1, pp. 4\u201311 (1960)","DOI":"10.1109\/THFE2.1960.4503259"},{"key":"9_CR3","volume-title":"User Perceptions of Security Risks in Multiple Authentications","author":"H Saint-Louis","year":"2018","unstructured":"Saint-Louis, H.: User Perceptions of Security Risks in Multiple Authentications. University of Toronto Libraries, Toronto (2018)"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1102187.1102190","volume":"83","author":"C Lewis","year":"2005","unstructured":"Lewis, C.: HCI for people with cognitive disabilities. Accessibility Comput. 83, 12\u201324 (2005)","journal-title":"Accessibility Comput."},{"issue":"2","key":"9_CR5","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1080\/1463922042000295669","volume":"6","author":"H Wandke","year":"2005","unstructured":"Wandke, H.: Assistance in human\u2013machine interaction: a conceptual framework and a proposal for a taxonomy. Theor. Issues Ergon. Sci. 6(2), 129\u2013155 (2005)","journal-title":"Theor. Issues Ergon. Sci."},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Mankoff, J., Hayes, G.R., Kasnitz, D.: Disability studies as a source of critical inquiry for the field of assistive technology. In: Proceedings of the 12th International ACM SIGACCESS Conference on Computers and Accessibility, New York (2010)","DOI":"10.1145\/1878803.1878807"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Armagno, G.: The role of HCI in the construction of disability. In: The 26th BCS Conference on Human Computer Interaction, vol. 26, Swinton (2012)","DOI":"10.14236\/ewic\/HCI2012.71"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Frauenberger, C.: Disability and technology: a critical realist perspective. In: Proceedings of the 17th International ACM SIGACCESS Conference on Computers & Accessibility, Lisbon (2015)","DOI":"10.1145\/2700648.2809851"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1102187.1102189","volume":"83","author":"SJ Czaja","year":"2005","unstructured":"Czaja, S.J.: The impact of aging on access to technology. Accessibility Comput. 83, 7\u201311 (2005)","journal-title":"Accessibility Comput."},{"issue":"3","key":"9_CR10","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/2168931.2168940","volume":"19","author":"RM Baecker","year":"2012","unstructured":"Baecker, R.M., Moffatt, K., Massimi, M.: Technologies for aging gracefully. Interactions 19(3), 32\u201336 (2012)","journal-title":"Interactions"},{"issue":"35","key":"9_CR11","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1080\/07370024.2020.1731690","volume":"5\u20136","author":"J Sin","year":"2020","unstructured":"Sin, J., Munteanu, C.: An empirically grounded sociotechnical perspective on designing virtual agents for older adults. Hum.-Comput. Interact. 5\u20136(35), 481\u2013510 (2020)","journal-title":"Hum.-Comput. Interact."},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"DiSalvo, C., Light, A., Hirsch, T., Le Dantec, C.A., Goodman, E., Hill, K.: HCI, communities and politics. In: CHI EA 2010: CHI 2010 Extended Abstracts on Human Factors in Computing Systems, New York (2010)","DOI":"10.1145\/1753846.1753940"},{"issue":"5","key":"9_CR13","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.intcom.2011.04.005","volume":"23","author":"JA Rode","year":"2011","unstructured":"Rode, J.A.: A theoretical agenda for feminist HCI. Interact. Comput. 23(5), 393\u2013400 (2011)","journal-title":"Interact. Comput."},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Hankerson, D., Marshall, A.R., Booker, J., El Mimouni, H., Walker, I., Rode, J.A.: Does technology have race? In: CHI EA 2016: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, 2016 (2016)","DOI":"10.1145\/2851581.2892578"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Schlesinger, A., Edwards, W.K., Grinter, R.E.: Intersectional HCI: engaging identity through gender, race, and class. In: CHI 2017: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, New York (2017)","DOI":"10.1145\/3025453.3025766"},{"issue":"6","key":"9_CR16","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/3363033","volume":"26","author":"Y Rankin","year":"2019","unstructured":"Rankin, Y., Thomas, J.: Straighten up and fly right: rethinking intersectionality in HCI research. Interactions 26(6), 64\u201368 (2019)","journal-title":"Interactions"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Ogbonnaya-Ogburu, I.F., Smith, A.D., To, A., Toyama, K.: Critical race theory for HCI. In: HI 2020: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, New York (2020)","DOI":"10.1145\/3313831.3376392"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Schlesinger, A., O\u2019Hara, K.P., Taylor, A.S.: Let\u2019s talk about race: identity, chatbots, and AI. In: Proceedings of the 2018 chi Conference on Human Factors in Computing Systems, New York (2019)","DOI":"10.1145\/3173574.3173889"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Grudin, J.: A moving target: the evolution of human-computer interaction. In: Jacko, J.A. (ed.) The Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications, 3 edn., pp. xxvii\u2013lxi. CRC Press, Boca Raton (2012)","DOI":"10.1201\/b11963-ch-101"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Grudin, J.: From Tool to Partner: The Evolution of Human-Computer Interaction. Morgan and Claypool, Williston, Vermont (2017)","DOI":"10.1007\/978-3-031-02218-0"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Suchman, L.: Human-Machine Reconfigurations: Plans and Situated Actions, 2nd edn. Cambridge University Press, Cambridge (2007)","DOI":"10.1017\/CBO9780511808418"},{"key":"9_CR22","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7221.001.0001","volume-title":"Where the Action Is: The Foundations of Embodied Interaction","author":"P Dourish","year":"2001","unstructured":"Dourish, P.: Where the Action Is: The Foundations of Embodied Interaction. MIT Press, Cambridge (2001)"},{"issue":"4","key":"9_CR23","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1145\/2163.358092","volume":"26","author":"DA Norman","year":"1983","unstructured":"Norman, D.A.: Design rules based on analyses of human error. Commun. ACM 26(4), 254\u2013258 (1983)","journal-title":"Commun. ACM"},{"key":"9_CR24","volume-title":"The Design of Everyday Things: Revised and Expanded","author":"DA Norman","year":"2013","unstructured":"Norman, D.A.: The Design of Everyday Things: Revised and Expanded. Basic Books, New York (2013)"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Hassenzahl, M., Tractinsky, N.: User experience \u2013 a research agenda. Behav. Inf. Technol. 25(2), 91\u201397 (2006)","DOI":"10.1080\/01449290500330331"},{"key":"9_CR26","unstructured":"Harrison, S., Tatar, D., Sengers, P.: The three paradigms of HCI. In: CHI, San Jose (2007)"},{"key":"9_CR27","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.intcom.2011.03.005","volume":"23","author":"S Harrison","year":"2011","unstructured":"Harrison, S., Sengers, P., Tatar, D.: Making epistemological trouble: third-paradigm HCI as successor science. Interact. Comput. 23, 385\u2013392 (2011)","journal-title":"Interact. Comput."},{"key":"9_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3726\/b14399","volume-title":"Human-Machine Communication: Rethinking Communication, Technology, and Ourselves","author":"AL Guzman","year":"2018","unstructured":"Guzman, A.L.: Introductions: \u201cwhat is human-machine communication, anyway?\u201d In: Guzman, A.L. (ed.) Human-Machine Communication: Rethinking Communication, Technology, and Ourselves, pp. 1\u201328. Peter Lang, New York (2018)"},{"issue":"6","key":"9_CR29","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/3001896","volume":"23","author":"U Farooq","year":"2016","unstructured":"Farooq, U., Grudin, J.: Human-computer integration. ACM Interact. 23(6), 26\u201332 (2016)","journal-title":"Human-computer integration. ACM Interact."},{"key":"9_CR30","unstructured":"Farooq, U., Grudin, J.T.: Paradigm shift from human computer interaction to integration. In: CHI 2017, Denver (2017)"},{"key":"9_CR31","first-page":"27","volume":"9","author":"B Shneiderman","year":"1982","unstructured":"Shneiderman, B.: Fighting for the user. Bull. Am. Soc. Inf. Sci. 9, 27\u201329 (1982)","journal-title":"Bull. Am. Soc. Inf. Sci."},{"key":"9_CR32","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/4201.001.0001","volume-title":"Leonardo\u2019s Laptop: Human Needs and the New Computing Technologies","author":"B Shneiderman","year":"2003","unstructured":"Shneiderman, B.: Leonardo\u2019s Laptop: Human Needs and the New Computing Technologies. MIT Press, Cambridge (2003)"},{"key":"9_CR33","volume-title":"The Human Factor","author":"K Vincente","year":"2003","unstructured":"Vincente, K.: The Human Factor. Alfred A. Knopf Canada, Toronto (2003)"},{"volume-title":"Security and Usability: Designing Secure Systems that People Can Use","year":"2005","key":"9_CR34","unstructured":"Cranor, L.F., Garfinkel, S. (eds.): Security and Usability: Designing Secure Systems that People Can Use. O\u2019Reilly, Sebastapol (2005)"},{"key":"9_CR35","doi-asserted-by":"crossref","unstructured":"Garfinkel, S., Ritcher Lipford, H.: Usable Security: History, Themes, and Challenges. Morgan & Claypool Publishers, Williston, Vermount (2014)","DOI":"10.1007\/978-3-031-02343-9"},{"key":"9_CR36","first-page":"26","volume-title":"The Social Shaping of Technology: HOW the Refrigerator Got its Hum","author":"L Winner","year":"1985","unstructured":"Winner, L.: Do artifacts have politics? In: MacKenzie, D., Wajcman, J. (eds.) The Social Shaping of Technology: HOW the Refrigerator Got its Hum, pp. 26\u201338. Open University Press, Philadelphia (1985)"},{"key":"9_CR37","first-page":"290","volume-title":"Shaping Technology\/Building Society: Studies in Sociotechnical Change","author":"WE Bijker","year":"1992","unstructured":"Bijker, W.E., Law, J.: Postrcript: technology, stability, and social theory. In: Bijker, W.E., Law, J. (eds.) Shaping Technology\/Building Society: Studies in Sociotechnical Change, pp. 290\u2013308. MIT Press, Cambridge (1992)"},{"key":"9_CR38","volume-title":"Democracy and Technology","author":"R Sclove","year":"1995","unstructured":"Sclove, R.: Democracy and Technology. The Guilford Press, New York (1995)"},{"key":"9_CR39","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1016\/0048-7333(96)00885-2","volume":"25","author":"R Williams","year":"1996","unstructured":"Williams, R., Edge, D.: The social shaping of technology. Res. Policy 25, 865\u2013899 (1996)","journal-title":"Res. Policy"},{"key":"9_CR40","volume-title":"Surveiller et punir: naissance de la prison","author":"M Foucault","year":"1975","unstructured":"Foucault, M.: Surveiller et punir: naissance de la prison. Gallimard, Paris (1975)"},{"key":"9_CR41","first-page":"225","volume-title":"Shaping Technology\/Building Society: Studies in Sociotechnical Change","author":"B Latour","year":"1992","unstructured":"Latour, B.: Where are the missing masses? The sociology of a few mundane artifacts. In: Bijker, W.E., Law, J. (eds.) Shaping Technology\/Building Society: Studies in Sociotechnical Change, pp. 225\u2013258. MIT Press, Cambridge (1992)"},{"key":"9_CR42","volume-title":"Cyber-Marx: Cycles and Circuits of Struggle in High Technology Capitalism","author":"N Dyer-Witheford","year":"1999","unstructured":"Dyer-Witheford, N.: Cyber-Marx: Cycles and Circuits of Struggle in High Technology Capitalism. University of Illinois Press, Urbana (1999)"},{"key":"9_CR43","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/6352.001.0001","volume-title":"Sorting Things Out: Classification and Its Consequences","author":"GC Bowker","year":"2000","unstructured":"Bowker, G.C., Star, S.L.: Sorting Things Out: Classification and Its Consequences. MIT Press, Cambridge (2000)"},{"key":"9_CR44","doi-asserted-by":"crossref","DOI":"10.4324\/9780203953365","volume-title":"A Review of Cybertypes: Race, Ethnicity, and Identity on the Internet","author":"L Nakamura","year":"2002","unstructured":"Nakamura, L.: A Review of Cybertypes: Race, Ethnicity, and Identity on the Internet. Routledge, London (2002)"},{"key":"9_CR45","volume-title":"Digitizing Race: Visual Cultures of the Internet","author":"L Nakamura","year":"2007","unstructured":"Nakamura, L.: Digitizing Race: Visual Cultures of the Internet. University of Minnesota Press, Minneapolis (2007)"},{"key":"9_CR46","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctt1pwt9w5","volume-title":"Algorithms of Oppression : How Search Engines Reinforce Racism","author":"SU Noble","year":"2018","unstructured":"Noble, S.U.: Algorithms of Oppression\u202f: How Search Engines Reinforce Racism. New York University Press, New York (2018)"},{"key":"9_CR47","volume-title":"Race After Technology: Abolitionist Tools for the New Jim Code","author":"R Benjamin","year":"2019","unstructured":"Benjamin, R.: Race After Technology: Abolitionist Tools for the New Jim Code. Wiley, Cambridge (2019)"},{"key":"9_CR48","volume-title":"Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor","author":"V Eubanks","year":"2019","unstructured":"Eubanks, V.: Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. St. Martin\u2019s Press, New York (2019)"},{"key":"9_CR49","volume-title":"Artificial Intelligence: How Computers Misunderstand the World","author":"M Broussard","year":"2019","unstructured":"Broussard, M.: Artificial Intelligence: How Computers Misunderstand the World. The MIT Press, Cambridge (2019)"},{"key":"9_CR50","unstructured":"Hao, K.: We read the paper that forced Timnit Gebru out of Google. Here\u2019s what it says, December 2020. https:\/\/www.technologyreview.com\/2020\/12\/04\/1013294\/google-ai-ethics-research-paper-forced-out-timnit-gebru\/"},{"key":"9_CR51","unstructured":"Buolamwini, J., Gebru, T.: Gender shades: intersectional accuracy disparities in commercial gender classification. In: Conference on Fairness, Accountability and Transparency (2018)"},{"key":"9_CR52","first-page":"251","volume-title":"The Oxford Handbook of Ethics of AI","author":"T Gebru","year":"2020","unstructured":"Gebru, T.: Race and gender. In: Dubber, M.D., Pasquale, F., Das, S. (eds.) The Oxford Handbook of Ethics of AI, pp. 251\u2013269. Oxford Press, Oxford (2020)"},{"key":"9_CR53","doi-asserted-by":"crossref","unstructured":"Jo, E.S., Gebru, T.: Lessons from archives: strategies for collecting sociocultural data in machine learning. In: Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency, New York (2020)","DOI":"10.1145\/3351095.3372829"},{"issue":"4","key":"9_CR54","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1177\/0196859916664082","volume":"40","author":"RS Maragh","year":"2016","unstructured":"Maragh, R.S.: \u201cOur struggles are unequal\u201d: black women\u2019s affective labor between television and twitter. J. Commun. Inq. 40(4), 351\u2013369 (2016)","journal-title":"J. Commun. Inq."},{"key":"9_CR55","doi-asserted-by":"crossref","unstructured":"Chatman, D.: Black Twitter and the politics of viewing Scandal. In: Gray, J., Sandvoss, C., Harrington, C.L. (eds.) Fandom: Identities and Communities in a Mediated World, Second Edition edn., pp. 299\u2013314. New York University Press, New York (2017)","DOI":"10.2307\/j.ctt1pwtbq2.21"},{"issue":"3","key":"9_CR56","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1080\/1369118X.2017.1386705","volume":"22","author":"S Harlow","year":"2017","unstructured":"Harlow, S., Benbrook, A.: How #Blacklivesmatter: exploring the role of hip-hop celebrities in constructing racial identity on Black Twitter. Inf. Commun. Soc. 22(3), 352\u2013368 (2017)","journal-title":"Inf. Commun. Soc."},{"issue":"7","key":"9_CR57","doi-asserted-by":"publisher","first-page":"984","DOI":"10.1080\/1369118X.2017.1303077","volume":"20","author":"A Williams","year":"2017","unstructured":"Williams, A., Gonlin, V.: I got all my sisters with me (on Black Twitter): second screening of how to get away with murder as a discourse on black womanhood. Inf. Commun. Soc. 20(7), 984\u20131004 (2017)","journal-title":"Inf. Commun. Soc."},{"key":"9_CR58","doi-asserted-by":"crossref","unstructured":"Guti\u00e9rrez, A.: Situating representation as a form of erasure: #OscarsSoWhite, black twitter, and latinx twitter. Telev. New Med. (2020)","DOI":"10.1177\/1527476420961247"},{"issue":"7\u20138","key":"9_CR59","doi-asserted-by":"publisher","first-page":"1512","DOI":"10.1177\/0163443720926040","volume":"42","author":"A Smit","year":"2020","unstructured":"Smit, A., Bosch, T.: Television and black twitter in South Africa: our perfect wedding. Media Cult. Soc. 42(7\u20138), 1512\u20131527 (2020)","journal-title":"Media Cult. Soc."},{"issue":"11","key":"9_CR60","doi-asserted-by":"publisher","first-page":"1814","DOI":"10.1080\/01419870.2017.1334931","volume":"40","author":"J Ince","year":"2017","unstructured":"Ince, J., Rojas, F., Davis, C.A.: The social media response to black lives matter: how twitter users interact with black lives matter through hashtag use. Ethn. Racial Stud. 40(11), 1814\u20131830 (2017)","journal-title":"Ethn. Racial Stud."},{"issue":"2","key":"9_CR61","doi-asserted-by":"publisher","first-page":"289","DOI":"10.32473\/jpic.v2.i2.p289","volume":"2","author":"CL Edrington","year":"2018","unstructured":"Edrington, C.L., Lee, N.: Tweeting a social movement: black lives matter and its use of twitter to share information, build community, and promote action. J. Publ. Interest Commun. 2(2), 289\u2013306 (2018)","journal-title":"J. Publ. Interest Commun."},{"key":"9_CR62","unstructured":"Schiappa, J.: #IfTheyGunnedMeDown: the necessity of \u201cBlack Twitter\u201d and hashtags in the age of ferguson. ProudFlesh: New Afrikan J. Cul. Polit. Conscious. (10) (2014)"},{"issue":"1","key":"9_CR63","first-page":"56","volume":"45","author":"M Lavan","year":"2015","unstructured":"Lavan, M.: The Negro tweets his presence: black twitter as social and political watchdog. Mod. Lang. Stud. 45(1), 56\u201365 (2015)","journal-title":"Mod. Lang. Stud."},{"issue":"2","key":"9_CR64","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1080\/10646175.2017.1354789","volume":"29","author":"L Stevens","year":"2018","unstructured":"Stevens, L., Maurantonio, N.: Black twitter asks Rachel: racial identity theft in \u201cPost-Racial\u201d America. Howard J. Commun. 29(2), 179\u2013195 (2018)","journal-title":"Howard J. Commun."},{"issue":"4","key":"9_CR65","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1080\/08838151.2012.732147","volume":"56","author":"A Brock","year":"2012","unstructured":"Brock, A.: From the blackhand side: twitter as a cultural conversation. J. Broadcast. Electron. Med. 56(4), 529\u2013549 (2012)","journal-title":"J. Broadcast. Electron. Med."},{"key":"9_CR66","volume-title":"To Tweet Our Own Cause: A Mixed-Methods Study of the Online Phenomenon \u201cBlack Twitter\u201d","author":"M Clark","year":"2019","unstructured":"Clark, M.: To Tweet Our Own Cause: A Mixed-Methods Study of the Online Phenomenon \u201cBlack Twitter.\u201d University of North Carolina at Chapel Hill Graduate School, Chapel Hill (2019)"},{"key":"9_CR67","first-page":"205","volume-title":"Hashtag Publics: The Power and Politics of Discursive Networks","author":"M Clark","year":"2015","unstructured":"Clark, M.: Black twitter: building connection through cultural conversation. In: Rambukkana, N. (ed.) Hashtag Publics: The Power and Politics of Discursive Networks, pp. 205\u2013215. Peter Lang, New York (2015)"},{"issue":"1","key":"9_CR68","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1111\/jcc4.12144","volume":"21","author":"D Murthy","year":"2015","unstructured":"Murthy, D., Gross, A., Pensavalle, A.: Urban social media demographics: an exploration of twitter use in major american cities. J. Comput.-Mediat. Commun. 21(1), 33\u201349 (2015)","journal-title":"J. Comput.-Mediat. Commun."},{"issue":"2","key":"9_CR69","first-page":"1","volume":"6","author":"LA Lee","year":"2017","unstructured":"Lee, L.A.: Black twitter: a response to bias in mainstream media. Soc. Sci. 6(2), 1\u201317 (2017)","journal-title":"Soc. Sci."},{"key":"9_CR70","doi-asserted-by":"crossref","unstructured":"Freelon, D., Lopez, L., Clarck, M.D., Jackson, S.J.: How Black Twitter and Other Social Media Communities Interact With Mainstream News. John S. and James L. Knight Foundation, Miami (2018)","DOI":"10.31235\/osf.io\/nhsd9"},{"issue":"1","key":"9_CR71","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1080\/01440357.2016.1151763","volume":"38","author":"P Prasad","year":"2016","unstructured":"Prasad, P.: Beyond rights as recognition: black twitter and posthuman coalitional possibilities. Prose Stud.: History Theory Criticism 38(1), 50\u201373 (2016)","journal-title":"Prose Stud.: History Theory Criticism"},{"key":"9_CR72","doi-asserted-by":"crossref","unstructured":"Chaudhry, I.: \u201cNot So Black and White\u201d: discussions of race on twitter in the aftermath of #Ferguson and the shooting death of mike brown. Cult. Stud. \u2194 Critic. Methodol. 16(3), 296\u2013304 (2016)","DOI":"10.1177\/1532708616634814"},{"issue":"7","key":"9_CR73","first-page":"591","volume":"19","author":"RS Maragh","year":"2017","unstructured":"Maragh, R.S.: Authenticity on \u201cBlack Twitter\u201d: reading racial performance and social networking. TEMA J. Land Use Mobil. Environ. 19(7), 591\u2013609 (2017)","journal-title":"TEMA J. Land Use Mobil. Environ."},{"issue":"4","key":"9_CR74","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1177\/2332649216639067","volume":"2","author":"R Graham","year":"2016","unstructured":"Graham, R., Smith, S.: The content of our #Characters: black twitter as counterpublic. Sociol. Race Ethn. 2(4), 433\u2013449 (2016)","journal-title":"Sociol. Race Ethn."},{"issue":"2","key":"9_CR75","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1177\/0042085917747124","volume":"53","author":"ML Hill","year":"2018","unstructured":"Hill, M.L.: \u201cThank You, Black Twitter\u201d: state violence, digital counterpublics, and pedagogies of resistance. Urban Educ. 53(2), 286\u2013302 (2018)","journal-title":"Urban Educ."},{"issue":"2","key":"9_CR76","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1017\/rep.2019.17","volume":"4","author":"AB Tillery Jr.","year":"2019","unstructured":"Tillery Jr., A.B.: What kind of movement is black lives matter? The view from twitter. J. Race Ethn. Polit. 4(2), 297\u2013323 (2019)","journal-title":"J. Race Ethn. Polit."},{"key":"9_CR77","doi-asserted-by":"crossref","unstructured":"Merckl\u00e9, P.: Sociologie des r\u00e9seaux sociaux, Troisi\u00e8me \u00e9dition ed., Paris: La d\u00e9couverte (2016)","DOI":"10.3917\/dec.merck.2016.01"},{"key":"9_CR78","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis: Methods and Applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman, S.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)"},{"key":"9_CR79","first-page":"03","volume":"06","author":"P Merckl\u00e9","year":"2012","unstructured":"Merckl\u00e9, P.: Les r\u00e9seaux: un nouveau concept, une vieille histoire. Ressources en Sci. \u00e9conomiques et sociales 06, 03 (2012)","journal-title":"Ressources en Sci. \u00e9conomiques et sociales"},{"issue":"3","key":"9_CR80","doi-asserted-by":"publisher","first-page":"331","DOI":"10.2307\/2096108","volume":"56","author":"K Carley","year":"1991","unstructured":"Carley, K.: A theory of group stability. Am. Sociol. Rev. 56(3), 331\u2013354 (1991)","journal-title":"Am. Sociol. Rev."},{"key":"9_CR81","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511810831","volume-title":"Max Weber: Selections in Translation","author":"M Weber","year":"1978","unstructured":"Weber, M.: Max Weber: Selections in Translation. Cambridge University Press, Cambridge (1978)"},{"key":"9_CR82","volume-title":"Raison, Bonnes Raisons","author":"R Boudon","year":"2003","unstructured":"Boudon, R.: Raison, Bonnes Raisons. Presses Universitaires de France, Paris (2003)"},{"key":"9_CR83","volume-title":"De la division du travail social","author":"E Durkheim","year":"1973","unstructured":"Durkheim, E.: De la division du travail social. Presses universitaires de France, Paris (1973)"},{"key":"9_CR84","volume-title":"The Structure of Social Action; A Study in Social Theory with Special Reference to a Group of Recent European Writers","author":"T Parsons","year":"1949","unstructured":"Parsons, T.: The Structure of Social Action; A Study in Social Theory with Special Reference to a Group of Recent European Writers. Free Press, New York (1949)"},{"key":"9_CR85","volume-title":"Choses dites : Le sens commun","author":"P Bourdieu","year":"1987","unstructured":"Bourdieu, P.: Choses dites\u202f: Le sens commun. \u00c9ditions de Minuit, Paris (1987)"},{"key":"9_CR86","unstructured":"Simonite, T.: Behind the Paper That Led to a Google Researcher\u2019s Firing. Accessed 8 Dec 2020. https:\/\/www.wired.com\/story\/behind-paper-led-google-researchers-firing\/"},{"issue":"176","key":"9_CR87","first-page":"101","volume":"1","author":"V Bush","year":"1945","unstructured":"Bush, V.: As we may think. Atlantic 1(176), 101\u2013108 (1945)","journal-title":"Atlantic"},{"key":"9_CR88","unstructured":"Albert, W., Tullis, T.: Measuring the User Experience: Collecting, Analyzing, and Presenting Usability Metrics, 2nd edn. Morgan Kaufmann, Amsterdam (2013)"},{"key":"9_CR89","doi-asserted-by":"crossref","unstructured":"Hassenzahl, M.: User experience (UX): towards an experiential perspective on product quality. In: Proceedings of the 20th International Conference of the Association Francophone d\u2019Interaction Homme-Machine, Metz (2008)","DOI":"10.1145\/1512714.1512717"},{"key":"9_CR90","first-page":"441","volume-title":"The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma","author":"A Turing","year":"2004","unstructured":"Turing, A.: Computing machinery and intelligence (1950). In: Copeland, B.J. (ed.) The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma, pp. 441\u2013464. Oxford University Press, London (2004)"},{"key":"9_CR91","unstructured":"Pew Research Center: Social Media Fact Sheet, 19 June 2019. https:\/\/www.pewresearch.org\/internet\/fact-sheet\/social-media\/. Accessed 01 Feb 2021"},{"issue":"3","key":"9_CR92","first-page":"223","volume":"15","author":"S Florini","year":"2013","unstructured":"Florini, S.: Tweets, tweeps, and signifyin\u2019: communication and cultural performance on \u201cBlack Twitter.\u201d TEMA J. Land Use Mob. Environ. 15(3), 223\u2013237 (2013)","journal-title":"TEMA J. Land Use Mob. Environ."},{"issue":"4","key":"9_CR93","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1215\/00031283-3442117","volume":"90","author":"T Jones","year":"2015","unstructured":"Jones, T.: Toward a description of african american vernacular english dialect regions using \u201cBlack Twitter. Am. Speech 90(4), 403\u2013440 (2015)","journal-title":"Am. Speech"},{"issue":"78","key":"9_CR94","doi-asserted-by":"publisher","first-page":"46","DOI":"10.3898\/NewF.78.02.2013","volume":"19","author":"S Sharma","year":"2013","unstructured":"Sharma, S.: Black Twitter? Racial hashtags, networks and contagion. New Formations 19(78), 46\u201364 (2013)","journal-title":"New Formations"},{"issue":"4","key":"9_CR95","first-page":"1","volume":"8","author":"C Katzenbach","year":"2019","unstructured":"Katzenbach, C., Ulbricht, L.: Algorithmic governance. J. Internet Regul. 8(4), 1\u201318 (2019)","journal-title":"J. Internet Regul."},{"issue":"3","key":"9_CR96","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/s13347-019-00363-w","volume":"33","author":"PD K\u00f6nig","year":"2019","unstructured":"K\u00f6nig, P.D.: Dissecting the algorithmic leviathan: on the socio-political anatomy of algorithmic governance. Philos. Technol. 33(3), 467\u2013485 (2019). https:\/\/doi.org\/10.1007\/s13347-019-00363-w","journal-title":"Philos. Technol."},{"key":"9_CR97","volume-title":"The Constitution of Society","author":"A Giddens","year":"1984","unstructured":"Giddens, A.: The Constitution of Society. Polity Press, Cambridge (1984)"},{"key":"9_CR98","unstructured":"Cervantes Saavedra, M.D.: L\u2019ing\u00e9nieux Hidalgo Don Quichotte de la Manche, \u00c9ditions du Seuil, Paris (1997)"},{"key":"9_CR99","doi-asserted-by":"crossref","unstructured":"Beskow, D.M., Carley, K.M.: Bot conversations are different: leveraging network metrics for bot detection in twitter. In: IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (2018)","DOI":"10.1109\/ASONAM.2018.8508322"},{"key":"9_CR100","doi-asserted-by":"crossref","unstructured":"Gilani, Z., Farahbakhsh, R., Tyson, G., Wang, L., Crowcroft, J.: Of bots and humans (on Twitter). In: ASONAM 2017: Proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, New York (2017)","DOI":"10.1145\/3110025.3110090"},{"issue":"1","key":"9_CR101","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/3298789","volume":"13","author":"Z Gilani","year":"2019","unstructured":"Gilani, Z., Farahbakhsh, R., Tyson, G., Crowcroft, J.: A large scale behavioural analysis of bots and humans on twitter. ACM Trans. Web 13(1), 2\u201324 (2019)","journal-title":"ACM Trans. Web"},{"key":"9_CR102","doi-asserted-by":"crossref","unstructured":"Varol, O., Ferrara, E., Davis, C.A., Menczer, F., Flammini, A.: Online human-bot interactions: detection, estimation, and characterization. In: Proceedings of the Eleventh International AAAI Conference on Web and Social Media (2017)","DOI":"10.1609\/icwsm.v11i1.14871"},{"issue":"2","key":"9_CR103","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1089\/big.2017.0041","volume":"6","author":"A Duh","year":"2018","unstructured":"Duh, A., Rupnik, M.S., Koro\u0161ak, D.: Collective behavior of social bots is encoded in their temporal twitter activity. Big Data 6(2), 113\u2013123 (2018)","journal-title":"Big Data"},{"key":"9_CR104","doi-asserted-by":"crossref","unstructured":"Wald, R., Khoshgoftaar, T.M., Napolitano, A., Sumner, C.: Predicting susceptibility to social bots on twitter. In: 2013 IEEE 14th International Conference on Information Reuse & Integration, San Francisco (2013)","DOI":"10.1109\/IRI.2013.6642447"},{"key":"9_CR105","doi-asserted-by":"crossref","unstructured":"Knight Steele, C.: The Digital Barbershop: Blogs and Online Oral Culture Within the African American Community, vol. 2, no. 4. Social Media + Society, October 2016","DOI":"10.1177\/2056305116683205"},{"key":"9_CR106","volume-title":"As Seen on Twitter: African-American Rhetorical Traditions Gone Viral","author":"T Long","year":"2012","unstructured":"Long, T.: As Seen on Twitter: African-American Rhetorical Traditions Gone Viral. Eastern Michigan University Library, Ypsilanti (2012)"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction. Theory, Methods and Tools"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78462-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:26:21Z","timestamp":1751495181000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78462-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030784614","9783030784621"],"references-count":106,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78462-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}