Digital communications -- Social aspects -- United StatesSee also what's at your library, or elsewhere.
Broader terms: |
Filed under: Digital communications -- Social aspects -- United States
Items below (if any) are from related and broader terms.
Filed under: Digital communications -- Social aspects
Filed under: Computer networks -- Social aspects Rights and Responsibilities of Participants in Networked Communities (1994), ed. by Dorothy Elizabeth Robling Denning and Herbert Lin (HTML with commentary at NAP) The Virtual Community: Homesteading on the Electronic Frontier (1993), by Howard Rheingold (HTML at rheingold.com) The Network Turn: Changing Perspectives in the Humanities (Cambridge, UK: Cambridge University Press, 2020), by Ruth Ahnert, Sebastian E. Ahnert, Catherine Nicole Coleman, and Scott Weingart (illustrated HTML and PDF with commentary at Cambridge University Press) The Wealth of Networks: How Social Production Transforms Markets and Freedom (New Haven: Yale University Press, 2006), by Yochai Benkler (PDF and HTML files with commentary at benkler.org)
Filed under: Computer networks -- Social aspects -- Periodicals
Filed under: Telecommunication -- Social aspects -- United States
Filed under: Digital communications -- United States
Filed under: Digital communications -- United States -- ManagementFiled under: Computer networks -- United States
Filed under: Computer networks -- United States -- HistoryFiled under: Computer networks -- Access control -- United StatesFiled under: Computer networks -- Law and legislation -- United StatesFiled under: Computer networks -- Security measures -- United States Issue Update on Information Security and Privacy in Network Environments (Washington: GPO, 1995), by United States Congress Office of Technology Assessment Information Security and Privacy in Network Environments (Washington: GPO, 1994), by United States Congress Office of Technology Assessment Cyberdeterrence and Cyberwar (Santa Monica, CA: RAND Corporation, c2009), by Martin C. Libicki (multiple formats with commentary at rand.org)
Filed under: Computer networks -- Security measures -- Government policy -- United States |