{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:43:28Z","timestamp":1743003808545,"version":"3.40.3"},"publisher-location":"Cham","reference-count":56,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319208855"},{"type":"electronic","value":"9783319208862"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20886-2_31","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T11:28:45Z","timestamp":1437391725000},"page":"328-338","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Twenty Years on: A Second Look at 10 Important Social Impact Characteristics of Computer Technology"],"prefix":"10.1007","author":[{"given":"Blaise W.","family":"Liffick","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","unstructured":"13 Revelations from the Sony hack. Seth Rosenblatt. C\/Net, 13 December 2014. \nhttp:\/\/www.cnet.com\/news\/13-revelations-from-the-sony-hack\/\n\n. Accessed 17 Dec 2015"},{"key":"31_CR2","unstructured":"www.antares.com"},{"key":"31_CR3","unstructured":"Apple Watch Unveiled. C\/Net, 11 September 2014. \nhttp:\/\/www.cnet.com\/products\/apple-watch\/\n\n. Accessed 20 Oct 2014"},{"key":"31_CR4","unstructured":"www.EPIC.org"},{"key":"31_CR5","unstructured":"Global mobile statistics 2014 Part A: Mobile subscribers; handset market share; mobile operators, 16 May 2014. \nhttp:\/\/mobiforge.com\/research-analysis\/global-mobile-statistics-2014-part-a-mobile-subscribers-handset-market-share-mobile-operators"},{"key":"31_CR6","unstructured":"https:\/\/www.google.com\/intl\/en\/docs\/about\/"},{"key":"31_CR7","unstructured":"http:\/\/www.gotomeeting.com\/online\/"},{"key":"31_CR8","unstructured":"The history of cyber attacks \u2013 a timeline. NATO Review Magazine. \nhttp:\/\/www.nato.int\/docu\/review\/2013\/cyber\/timeline\/EN\/index.htm\n\n. Accessed 17 Dec 2014"},{"key":"31_CR9","unstructured":"The history of social networking. Digital Trends. \nhttp:\/\/www.digitaltrends.com\/features\/the-history-of-social-networking\/\n\n. Accessed 9 Jan 2015"},{"key":"31_CR10","unstructured":"iPhone, iPad and iPod Sales from 1st Quarter 2006 to 4th Quarter 2014. Statista. \nhttp:\/\/www.statista.com\/statistics\/253725\/iphone-ipad-and-ipod-sales-comparison\/\n\n. Accessed 27 Dec 2014"},{"key":"31_CR11","unstructured":"Misery Merchants. The Economist, 5 July 2014. \nhttp:\/\/www.economist.com\/news\/international\/21606307-how-should-online-publication-explicit-images-without-their-subjects-consent-be\n\n. Accessed 20 Dec 2014"},{"key":"31_CR12","unstructured":"Print me a Stradivarius. The Economist, 10 February 2011. \nhttp:\/\/www.economist.com\/node\/18114327?story_id=18114327\n\n. Accessed 8 Jan 2015"},{"key":"31_CR13","unstructured":"REAL ID Implementation Review: Few Benefits, Staggering Costs. EPIC, May 2008. \nhttps:\/\/epic.org\/privacy\/id_cards\/"},{"key":"31_CR14","unstructured":"www.reputation.com"},{"key":"31_CR15","unstructured":"The size of the World Wide Web (The Internet). \nhttp:\/\/www.worldwidewebsize.com\/\n\n. Accessed 21 Dec 2014"},{"key":"31_CR16","unstructured":"The Smartwatch that\u2019s also a Smartphone. C\/Net, 17 November 2014. \nhttp:\/\/www.cnet.com\/products\/samsung-gear-s\/\n\n. Accessed 1 Dec 2014"},{"key":"31_CR17","unstructured":"Statistics and Facts about Online Shopping. Statista. \nhttp:\/\/www.statista.com\/topics\/871\/online-shopping\/\n\n. Accessed 3 Jan 2015"},{"key":"31_CR18","unstructured":"Ahuja, G.: Does web site promote celebrity stalking? ABC News, 15 March 2006. \nhttp:\/\/abcnews.go.com\/GMA\/story?id=1729270\n\n. Accessed 4 Jan 2015"},{"key":"31_CR19","unstructured":"Anderson, L.: Seduced by \u2018perfect\u2019 pitch: how Auto-Tune conquered pop music. The Verger, 27 February 2013. \nhttp:\/\/www.theverge.com\/2013\/2\/27\/3964406\/seduced-by-perfect-pitch-how-auto-tune-conquered-pop-music\n\n. Accessed 9 Jan 2015"},{"key":"31_CR20","unstructured":"Angwin, J., Valentino-DeVries, J.: Google\u2019s iPhone tracking. Wall Street J., 17 February 2012"},{"key":"31_CR21","unstructured":"http:\/\/www.wsj.com\/news\/articles\/SB10001424052970204880404577225380456599176\n\n Accessed 19 Dec 2014"},{"key":"31_CR22","unstructured":"Araujo, I., Araujo, I.: Developing trust in internet commerce. In: Proceedings of the 2003 Conference of the Centre for Advanced Studies on Collaborative Research, pp 1\u201315. IBM Press (2003)"},{"issue":"4","key":"31_CR23","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MPRV.2014.81","volume":"13","author":"M Baker","year":"2014","unstructured":"Baker, M., Hong, J., Billinhurst, M.: Wearable computing from jewels to joules. Pervasive Comput. 13(4), 20\u201322 (2014). \nhttp:\/\/dx.doi.ieeecomputersociety.org\/10.1109\/MPRV.2014.81","journal-title":"Pervasive Comput."},{"key":"31_CR24","unstructured":"Biggs, J.: TC50: FitBit, A Fitness Gadget that Makes Us Want to Exercise. TechCrunch, 9 September 2008. \nhttp:\/\/techcrunch.com\/2008\/09\/09\/tc50-fitbit-fitness-gadget-the-makes-us-want-to-exercise\/\n\n. Accessed 27 Dec 2014"},{"key":"31_CR25","unstructured":"Campbell, T.: Internet Trolls. Internet Archives, 13 July 2001. \nhttp:\/\/web.archive.org\/web\/20011026130853\/http:\/\/members.aol.com\/intwg\/trolls.htm\n\n. Accessed 6 Jan 2015"},{"key":"31_CR26","unstructured":"Condon, B.: Sony Hacking Fallout Explodes as Theaters Cancel \u2018The Interview\u2019 Showings. The Huffington Post, 17 December 2014. \nhttp:\/\/www.huffingtonpost.com\/2014\/12\/17\/sony-hack-theaters_n_6338246.html"},{"key":"31_CR27","unstructured":"Curtis, A.: The Brief History of Social Media. \nhttp:\/\/www2.uncp.edu\/home\/acurtis\/NewMedia\/SocialMedia\/SocialMediaHistory.html\n\n. Accessed 9 Jan 2015"},{"key":"31_CR28","unstructured":"Cutler, K.: Apple Has Sold 600 M iOS Devices, But Android Is Not Impressed. TechCrunch. \nhttp:\/\/techcrunch.com\/2013\/06\/10\/apple-android-2\/\n\n. Accessed 27 Dec 2014"},{"key":"31_CR29","unstructured":"Ferenstein, G.: The science of building trust with social media. Mashable, 24 February 2010. \nhttp:\/\/mashable.com\/2010\/02\/24\/social-media-trust\/\n\n. Accessed 10 Jan 2015"},{"key":"31_CR30","unstructured":"Fitzgerald, B.: Social Media is Causing Anxiety, Study finds. Huffington Post. \nhttp:\/\/www.huffingtonpost.com\/2012\/07\/10\/social-media-anxiety_n_1662224.html\n\n. Accessed 3 Jan 2015"},{"key":"31_CR31","unstructured":"Flood, A.: Where did the story of ebooks begin? The Guardian, 12 March 2014. \nhttp:\/\/www.theguardian.com\/books\/2014\/mar\/12\/ebooks-begin-medium-reading-peter-james\n\n. Accessed 4 Jan 2015"},{"key":"31_CR32","unstructured":"Greenwald, G., MacAskill, E.: NSA Prism program taps in to user data of Apple, Google and others. The Guardian, 7 June 2013. \nhttp:\/\/www.theguardian.com\/world\/2013\/jun\/06\/us-tech-giants-nsa-data\n\n. Accessed 19 Dec 2014"},{"key":"31_CR33","unstructured":"Gross, M.J.: Silent War. Vanity Fair. July 2013. \nhttp:\/\/www.vanityfair.com\/culture\/2013\/07\/new-cyberwar-victims-american-business\n\n. Accessed 17 Dec 2014"},{"issue":"1","key":"31_CR34","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/5254.747900","volume":"14","author":"J Grudin","year":"1999","unstructured":"Grudin, J.: Has the ice man arrived? tact on the Internet. IEEE Intell. Syst. 14(1), 8\u20139 (1999)","journal-title":"IEEE Intell. Syst."},{"issue":"1","key":"31_CR35","first-page":"10","volume":"13","author":"MA Hearst","year":"1999","unstructured":"Hearst, M.A.: When information technology \u201cgoes social\u201d. IEEE Intell. Syst. 13(1), 10\u201315 (1999)","journal-title":"IEEE Intell. Syst."},{"issue":"3","key":"31_CR36","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1080\/10447310701702717","volume":"23","author":"H Hochheiser","year":"2007","unstructured":"Hochheiser, H., Lazar, J.: HCI and societal issues: a framework for engagement. Int. J. Hum. Comput. Interact. 23(3), 339\u2013374 (2007). Lawrence Erlbaum Associates","journal-title":"Int. J. Hum. Comput. Interact."},{"key":"31_CR37","unstructured":"Kassner, M.: Search engine bias: What search results are telling you (and what they\u2019re not). TechRepublic, 23 September 2013. \nhttp:\/\/www.techrepublic.com\/blog\/it-security\/search-engine-bias-what-search-results-are-telling-you-and-what-theyre-not\/\n\n. Accessed 9 Jan 2015"},{"key":"31_CR38","unstructured":"Knapp, E.: A Brief History of Apple\u2019s iTunes. Wall St. Cheat Sheet, 16 June 2011. \nhttp:\/\/wallstcheatsheet.com\/breaking-news\/a-brief-history-of-apples-itunes.html\/\n\n. Accessed 3 Jan 2015"},{"key":"31_CR39","unstructured":"Liffick, B.: Social impact characteristics of computer technology. In: Proceedings of ETHICOMP95 International Conference, De Montfort University, Leicester, March 28\u201330 (1995)"},{"key":"31_CR40","volume-title":"Cruising the E-Mall: Shopping by Computer. In a Reader in Ethical Computing and Business","author":"B Liffick","year":"1997","unstructured":"Liffick, B.: Cruising the E-Mall: Shopping by Computer. In a Reader in Ethical Computing and Business. Blackwell Publishers, London (1997)"},{"key":"31_CR41","doi-asserted-by":"publisher","DOI":"10.1515\/9781400839568","volume-title":"Nine Algorithms that Changed the Future","author":"J MacCormick","year":"2013","unstructured":"MacCormick, J.: Nine Algorithms that Changed the Future. Princeton University Press, New Jersey (2013)"},{"key":"31_CR42","unstructured":"McDonald, S.N.: Everyone hates Auto-Tune. The Washington Post, 31 October 2014. \nhttp:\/\/www.washingtonpost.com\/news\/morning-mix\/wp\/2014\/10\/31\/everyone-hates-auto-tune-t-pain-may-have-finally-put-us-all-out-of-our-misery\/\n\n. Accessed 9 Jan 2015"},{"key":"31_CR43","unstructured":"McGregor, J.: The Top 5 Most Brutal Cyber Attacks of 2014 So Far. Forbes, 28 July 2014. \nhttp:\/\/www.forbes.com\/sites\/jaymcgregor\/2014\/07\/28\/the-top-5-most-brutal-cyber-attacks-of-2014-so-far\/\n\n. Accessed 17 Dec 2015"},{"key":"31_CR44","unstructured":"Owen, L.H.: PwC: The US consumer ebook market will be bigger than the print book market by 2017. Gigaom Research, 4 June 2013. \nhttps:\/\/gigaom.com\/2013\/06\/04\/pwc-the-u-s-consumer-ebook-market-will-be-bigger-than-the-print-book-market-by-2017\/\n\n. Accessed 3 Jan 2015"},{"key":"31_CR45","unstructured":"Peng, W., Lin, Y.: Ranking web search results from personalized perspective. In: Proceedings of the International Conference on E-Commerce Technology. IEEE Computer Society, San Francisco, June 26\u201329 (2006)"},{"key":"31_CR46","unstructured":"Ramanathan, L.: High-tech gifts: You should love them. If only you knew how to use them. Washington Post, 26 December 2015. \nhttp:\/\/www.washingtonpost.com\/lifestyle\/style\/high-tech-gifts-you-should-love-them-if-only-you-knew-how-to-use-them\/2014\/12\/26\/9d7c6adc-8d35-11e4-8ff4-fb93129c9c8b_story.html\n\n. Accessed 30 Dec 2015"},{"key":"31_CR47","volume-title":"Building Java Programs","author":"S Reges","year":"2014","unstructured":"Reges, S., Stepp, M.: Building Java Programs, 4th edn. Addison-Wesley Publishing, Boston (2014)","edition":"4"},{"key":"31_CR48","unstructured":"Rosenblatt, S.: Revelations from the Sony hack. C\/Net, 13 December 2014. \nhttp:\/\/www.cnet.com\/news\/13-revelations-from-the-sony-hack\/\n\n. Accessed 17 Dec 2015"},{"key":"31_CR49","unstructured":"Shaer, M.: Google gets $25\u00a0K fine for \u2018impeding\u2019 FCC probe into Street View, 17 April 2012. The Christian Science Monitor. \nhttp:\/\/www.csmonitor.com\/Innovation\/Horizons\/2012\/0417\/Google-gets-25K-fine-for-impeding-FCC-probe-into-Street-View\n\n. Accessed 19 Dec 2014"},{"issue":"5","key":"31_CR50","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/332833.332843","volume":"43","author":"B Shneiderman","year":"2000","unstructured":"Shneiderman, B.: Universal usability. Commun. ACM. 43(5), 84\u201391 (2000). \nhttp:\/\/dl.acm.org\/citation.cfm?id=332843","journal-title":"Commun. ACM."},{"key":"31_CR51","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1023\/A:1011144232235","volume":"11","author":"C Stephanidis","year":"2001","unstructured":"Stephanidis, C.: Adaptive techniques for universal access. User Model. User-Adap. Inter. 11, 159\u2013179 (2001)","journal-title":"User Model. User-Adap. Inter."},{"key":"31_CR52","unstructured":"Stossel, J.: How the Internet helps society be more trusting. The Washington Examiner, 6 January 2015. \nhttp:\/\/www.washingtonexaminer.com\/how-the-internet-helps-society-be-more-trusting\/article\/2558247\n\n. Accessed 10 Jan 2015"},{"key":"31_CR53","unstructured":"Takei, G.: Oh, Myyy (There Goes the Internet). Limited Liability Company (2013)"},{"key":"31_CR54","unstructured":"Tavani, H.: Search engines and ethics. The Stanford Encyclopedia of Philosophy (Spring 2014 Edition). \nhttp:\/\/plato.stanford.edu\/entries\/ethics-search\/\n\n. Accessed 9 Jan 2015"},{"key":"31_CR55","unstructured":"Temperton, J.: NASA just emailed a wrench to space. Wired, 19 December 2014. \nhttp:\/\/www.wired.co.uk\/news\/archive\/2014-12\/19\/3d-printed-space-wrench\n\n Accessed 20 Dec 2014"},{"key":"31_CR56","unstructured":"Van Natta, D., Becker, J., Bowley, G.: Tabloid Hack Attack on Royals, and Beyond. The New York Times Magazine, 1 September 2010. \nhttp:\/\/topics.nytimes.com\/top\/reference\/timestopics\/organizations\/n\/news_of_the_world\/index.html\n\n. Accessed 17 Dec 2014"}],"container-title":["Lecture Notes in Computer Science","Design, User Experience, and Usability: Design Discourse"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20886-2_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,12]],"date-time":"2020-05-12T20:05:40Z","timestamp":1589313940000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20886-2_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319208855","9783319208862"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20886-2_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}