{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T19:20:13Z","timestamp":1774293613041,"version":"3.50.1"},"reference-count":41,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2005,3,1]],"date-time":"2005-03-01T00:00:00Z","timestamp":1109635200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005,3,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>To extend the work of Rob Kling, whose research interests, and advocacy were at the center of a movement in analytical inquiry and empirical research now known as \u201csocial informatics\u201d.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Reviews the work of those who engage in social informatics research to strengthen and further the conceptual perspective, analytical approaches, and intellectual contributions of social informatics.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The vibrant and growing international community of active social informatics scholars has assembled a social informatics resource kit that includes: perspective lenses through which research data can be viewed critically; techniques for building theory and developing models from socially rich empirical data; and a common body of knowledge regarding the uses and effects of ICTs.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper identifies opportunities to engage new scholars in social informatics discussions, and suggests new venues for promoting and extending the work of scholars already enrolled in the social informatics movement.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09593840510584595","type":"journal-article","created":{"date-parts":[[2005,3,28]],"date-time":"2005-03-28T17:51:06Z","timestamp":1112032266000},"page":"9-20","source":"Crossref","is-referenced-by-count":25,"title":["On extending social informatics from a rich legacy of networks and conceptual resources"],"prefix":"10.1108","volume":"18","author":[{"given":"Roberta","family":"Lamb","sequence":"first","affiliation":[]},{"given":"Steve","family":"Sawyer","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022020719555745600_b1","unstructured":"Agre, P.E. and Schuler, D. (Eds) (1997), Reinventing Technology, Rediscovering Community: Critical Studies in Computing and Social Practice, Ablex, Norwood, NJ."},{"key":"key2022020719555745600_b2","doi-asserted-by":"crossref","unstructured":"Allen, J.P. (2004), \u201cRedefining the network: enrollment strategies in the PDA industry\u201d, Information Technology & People, Vol. 17 No. 2, pp. 171\u201085.","DOI":"10.1108\/09593840410542493"},{"key":"key2022020719555745600_b3","doi-asserted-by":"crossref","unstructured":"Attewell, P. (1987), \u201cThe deskilling controversy\u201d, Work and Occupation, Vol. 14 No. 3, pp. 323\u201046.","DOI":"10.1177\/0730888487014003001"},{"key":"key2022020719555745600_b4","doi-asserted-by":"crossref","unstructured":"Attewell, P. (1991), \u201cBig brother and the sweatshop: computer surveillance in the automated office\u201d, Sociological Theory, Vol. 5, pp. 87\u201099, Reprinted in Dunlop and Kling, 1991.","DOI":"10.2307\/201997"},{"key":"key2022020719555745600_b5","doi-asserted-by":"crossref","unstructured":"Becker, H.S. (1998), Tricks of the Trade: How to Think about Your Research While You're Doing It, University of Chicago Press, Chicago, IL.","DOI":"10.7208\/chicago\/9780226040998.001.0001"},{"key":"key2022020719555745600_b6","doi-asserted-by":"crossref","unstructured":"Bockowski, P. (2004), \u201cThe mutual shaping of technology and society in videotex newspapers: beyond diffusion and social\u2010shaping perspectives\u201d, The Information Society, Vol. 20 No. 4, pp. 255\u201068.","DOI":"10.1080\/01972240490480947"},{"key":"key2022020719555745600_b8","unstructured":"Castells, M. (1991), The Informational City: Information Technology, Economic Restructuring, and the Urban\u2010Regional Process, Reprint Edition, Blackwell, Oxford."},{"key":"key2022020719555745600_b7","unstructured":"Castells, M. (1996), The Information Age: Economy, Society and Culture. Vol I: The Rise of the Network Society, Blackwell, Oxford."},{"key":"key2022020719555745600_b9","doi-asserted-by":"crossref","unstructured":"Dutton, W.H. (1999), \u201cThe web of technology and people: challenges for economic and social research\u201d, Prometheus, Vol. 17 No. 1, pp. 5\u201020.","DOI":"10.1080\/08109029908629393"},{"key":"key2022020719555745600_b10","unstructured":"Dutton, W.H., Wyer, J. and O'Connell, J. (1993), \u201cThe governmental impacts of information technology: a case study of Santa Monica's public electronic network\u201d, in Banker, R., et al. (Eds), Strategic Information Technology Management, Idea Group, Harrisburg, PA."},{"key":"key2022020719555745600_b11","doi-asserted-by":"crossref","unstructured":"Eschenfelder, K. (2003), \u201cThe customer is always right, but whose customer is more important? conflict and web site classification schemes\u201d, Information Technology & People, Vol. 16 No. 4, pp. 419\u201039.","DOI":"10.1108\/09593840310509644"},{"key":"key2022020719555745600_b12","doi-asserted-by":"crossref","unstructured":"Faraj, S., Dowan, K. and Watts, S. (2004), \u201cContested artifact: technology sensemaking, actor networks, and the shaping of the web browser\u201d, Information Technology & People, Vol. 17 No. 2, pp. 186\u2010209.","DOI":"10.1108\/09593840410542501"},{"key":"key2022020719555745600_b13","doi-asserted-by":"crossref","unstructured":"Glaser, B.G. and Strauss, A.L. (1967), The Discovery of Grounded Theory: Strategies for Qualitative Research, Aldine de Gruyter, New York, NY.","DOI":"10.1097\/00006199-196807000-00014"},{"key":"key2022020719555745600_b14","unstructured":"Greenbaum, J. and Kyng, M. (1991), Design at Work: Cooperative Design of Computer Systems, Lawrence Erlbaum, Hillsdale, NJ."},{"key":"key2022020719555745600_b15","doi-asserted-by":"crossref","unstructured":"Grudin, J. (1990), \u201cInterface\u201d, Proceedings of the Conference on Computer Supported Cooperative Work, Los Angeles, CA, 7\u201010 October 1990, pp. 269\u201078.","DOI":"10.1145\/99332.99360"},{"key":"key2022020719555745600_b16","doi-asserted-by":"crossref","unstructured":"Horton, K., Elisabeth, D. and Trevor, W\u2010H. (2005), \u201cExploring sociotechnical interaction with Rob Kling: Five \u2018BIG\u2019 Ideas\u201d, Information Technology & People, Vol. 18 No. 1.","DOI":"10.1108\/09593840510584621"},{"key":"key2022020719555745600_b17","doi-asserted-by":"crossref","unstructured":"Kaplan, B. (2001), \u201cEvaluating informatics applications \u2013 social interactionism and call for methodological pluralism\u201d, International Journal of Medical Informatics, Vol. 64 No. 1, pp. 39\u201056.","DOI":"10.1016\/S1386-5056(01)00184-8"},{"key":"key2022020719555745600_b18","unstructured":"Kiesler, S., Robert, K., Tridas, M. and William, S. (1997), Homenet Overview: Recent Results from a Field Trial of Residential Internet Use, available at: http:\/\/homenet.andrew.cmu.edu\/progress\/ovrview8697.html, Carnegie Mellon University, Pittsburgh, PA."},{"key":"key2022020719555745600_b19","doi-asserted-by":"crossref","unstructured":"Kling, R. (1980), \u201cSocial analyses of computing: theoretical perspectives in recent empirical research\u201d, Computing Surveys, Vol. 12 No. 1, pp. 61\u2010110.","DOI":"10.1145\/356802.356806"},{"key":"key2022020719555745600_b20","doi-asserted-by":"crossref","unstructured":"Kling, R. (1999), \u201cWhat is social informatics and why does it matter?\u201d, D\u2010Lib Magazine, available at: www.dlib.org:80\/dlib\/january99\/kling\/01kling.html.","DOI":"10.1045\/january99-kling"},{"key":"key2022020719555745600_b21","doi-asserted-by":"crossref","unstructured":"Kling, R. and Covi, L. (1995), \u201cElectronic journals and legitimate media in the systems of scholarly communication\u201d, The Information Society, Vol. 11 No. 4, pp. 261\u201071.","DOI":"10.1080\/01972243.1995.9960200"},{"key":"key2022020719555745600_b22","doi-asserted-by":"crossref","unstructured":"Kling, R. and Iacano, S. (1989), \u201cThe institutional character of computerized information systems\u201d, Office: Technology and People, Vol. 5 No. 1, pp. 7\u201028.","DOI":"10.1108\/EUM0000000003526"},{"key":"key2022020719555745600_b23","unstructured":"Kling, R. and Lamb, R. (1998), \u201cMorceaux de villes. Comment les visions utopiques structurent le pouvior social dans l'espace physique et dans le cyberspace\u201d, in Eveno, E. (Ed.), Utopies Urbaines, see English text \u201cBits of Cities\u201d, available at: www.slis.indiana.edu\/CSI\/WP\/wp96\u201002B.html, Presses Universitaires du Mirail."},{"key":"key2022020719555745600_b24","doi-asserted-by":"crossref","unstructured":"Kling, R. and Scacchi, W. (1982), \u201cThe web of computing: computer technology as social organization\u201d, Advances in Computer, Vol. 21, Academic Press, New York, NY.","DOI":"10.1016\/S0065-2458(08)60567-7"},{"key":"key2022020719555745600_b25","unstructured":"Kraemer, K.L., Dickhoven, S., Tierney, S.F. and King, J.L. (1987), Datawars: The Politics of Modeling in Federal Policymaking, Columbia University Press, New York, NY."},{"key":"key2022020719555745600_b26","doi-asserted-by":"crossref","unstructured":"Lamb, R. and Kling, R. (2003), \u201cReconceptualizing users as social actors in information systems research\u201d, MIS Quarterly, Vol. 27 No. 2.","DOI":"10.2307\/30036529"},{"key":"key2022020719555745600_b27","unstructured":"Lanham, R. (1999), Revising Prose, 4th ed., Longman, Harlow."},{"key":"key2022020719555745600_b28","unstructured":"MacKenzie, D. and Wajcman, J. (1999), The Social Shaping of Technology, 2nd ed., Open University Press, Philadelphia, PA."},{"key":"key2022020719555745600_b29","doi-asserted-by":"crossref","unstructured":"Mansell, R. (2005), \u201cSocial informatics and the political economy of communications\u201d, Information Technology & People, Vol. 18 No. 1.","DOI":"10.1108\/09593840510584603"},{"key":"key2022020719555745600_b31","doi-asserted-by":"crossref","unstructured":"Markus, M.L. (1983), \u201cPower, politics and MIS implementation\u201d, Communications of the ACM, Vol. 26, pp. 430\u201044.","DOI":"10.1145\/358141.358148"},{"key":"key2022020719555745600_b30","doi-asserted-by":"crossref","unstructured":"Markus, M. (1990), \u201cToward a \u2018critical mass\u2019 theory of interactive media\u201d, in Fulk, J. and Steinfield, C.W. (Eds), Organization and Communication Technology, Sage, Newbury Park, CA, pp. 194\u2010218.","DOI":"10.4135\/9781483325385.n9"},{"key":"key2022020719555745600_b32","doi-asserted-by":"crossref","unstructured":"Markus, M.L. and Bjorn\u2010Andersen, N. (1987), \u201cPower over users: its exercise by systems professionals\u201d, Communications of the ACM, Vol. 30 No. 6, pp. 498\u2010504.","DOI":"10.1145\/214762.214764"},{"key":"key2022020719555745600_b33","doi-asserted-by":"crossref","unstructured":"Mitchell, W.J. (1995), City of Bits: Space, Place, and the Infobahn, The MIT Press, Cambridge, MA.","DOI":"10.7551\/mitpress\/1847.001.0001"},{"key":"key2022020719555745600_b34","doi-asserted-by":"crossref","unstructured":"Mumford, E. (1995), Effective Systems Design & Requirements Analysis: The ETHICS Approach, Macmillan, Basingstoke.","DOI":"10.1007\/978-1-349-13774-9"},{"key":"key2022020719555745600_b35","unstructured":"Negroponte, N. (1995), Being Digital, Alfred A.Knopf, New York, NY."},{"key":"key2022020719555745600_b36","doi-asserted-by":"crossref","unstructured":"Orlikowski, W.J. and Iacono, C.S. (2001), \u201cResearch commentary: desperately seeking the \u2018IT\u2019 in IT research \u2013 a call to theorizing the IT artifact\u201d, Information Systems Research, Vol. 12 No. 2, pp. 121\u201043.","DOI":"10.1287\/isre.12.2.121.9700"},{"key":"key2022020719555745600_b37","unstructured":"Robey, D. (1997), \u201cThe paradox of transformation: using contradictory logic to manage the organizational consequences of information technology\u201d, in Sauer, C. and Yetton, P. (Eds), Steps to the Future: Fresh Thinking on the Dynamics of Organizational Transformation, Jossey\u2010Bass, Inc., San Francisco, CA."},{"key":"key2022020719555745600_b39","doi-asserted-by":"crossref","unstructured":"Sawyer, S. and Eschenfelder, K. (2002), \u201cSocial informatics: perspectives, examples, and trends\u201d, in Cronin, B. (Ed.), Annual Review of Information Science and Technology, Vol. 36, Information Today Inc.\/ASIST, Medford, NJ, pp. 427\u201065.","DOI":"10.1002\/aris.1440360111"},{"key":"key2022020719555745600_b38","doi-asserted-by":"crossref","unstructured":"Sawyer, S., Allen, J. and Lee, H. (2003), \u201cBroadband and mobile opportunities: a sociotechnical perspective\u201d, Journal of Information Technology, Vol. 18, pp. 121\u201036.","DOI":"10.1080\/0268396032000101171"},{"key":"key2022020719555745600_b40","doi-asserted-by":"crossref","unstructured":"Star, S.L. and Ruhleder, K. (1996), \u201cSteps towards and ecology of infrastructure: design and access for large\u2010scale collaborative systems\u201d, Information Systems Research, Vol. 7, pp. 111\u201038.","DOI":"10.1287\/isre.7.1.111"},{"key":"key2022020719555745600_b41","unstructured":"Strum, S. and Latour, B. (1988), \u201cThe meanings of social: from baboons to humans\u201d, in Schubert, G. and Masters, R. (Eds), Primate Politics, Southern Illinois University, Carbondale, IL."}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09593840510584595","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593840510584595\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09593840510584595\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:36:44Z","timestamp":1753403804000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itp\/article\/18\/1\/9-20\/185242"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,3,1]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2005,3,1]]}},"alternative-id":["10.1108\/09593840510584595"],"URL":"https:\/\/doi.org\/10.1108\/09593840510584595","relation":{},"ISSN":["0959-3845"],"issn-type":[{"value":"0959-3845","type":"print"}],"subject":[],"published":{"date-parts":[[2005,3,1]]}}}