Antisocial computing: exploring design risks in social computing systems. McDonald, D. W., Ackley, D. H., Bryant, R. E., Gedney, M., Hirsh, H., & Shanley, L. Interactions, 21(6):72-75, 2014.
Link
Paper bibtex @article{journals/interactions/McDonaldABGHS14,
added-at = {2020-10-26T00:00:00.000+0100},
author = {McDonald, David W. and Ackley, David H. and Bryant, Randal E. and Gedney, Melissa and Hirsh, Haym and Shanley, Lea},
biburl = {https://www.bibsonomy.org/bibtex/22aa830b71fd7915ea61bec0781b5f091/dblp},
ee = {https://doi.org/10.1145/2675705},
interhash = {bfadef624fc3dbf181b5af89b26f7393},
intrahash = {2aa830b71fd7915ea61bec0781b5f091},
journal = {Interactions},
keywords = {dblp},
number = 6,
pages = {72-75},
timestamp = {2020-10-27T11:56:41.000+0100},
title = {Antisocial computing: exploring design risks in social computing systems.},
url = {http://dblp.uni-trier.de/db/journals/interactions/interactions21.html#McDonaldABGHS14},
volume = 21,
year = 2014
}
Downloads: 0
{"_id":"Wavn73oNfscXcgExJ","bibbaseid":"mcdonald-ackley-bryant-gedney-hirsh-shanley-antisocialcomputingexploringdesignrisksinsocialcomputingsystems-2014","author_short":["McDonald, D. W.","Ackley, D. H.","Bryant, R. E.","Gedney, M.","Hirsh, H.","Shanley, L."],"bibdata":{"bibtype":"article","type":"article","added-at":"2020-10-26T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["McDonald"],"firstnames":["David","W."],"suffixes":[]},{"propositions":[],"lastnames":["Ackley"],"firstnames":["David","H."],"suffixes":[]},{"propositions":[],"lastnames":["Bryant"],"firstnames":["Randal","E."],"suffixes":[]},{"propositions":[],"lastnames":["Gedney"],"firstnames":["Melissa"],"suffixes":[]},{"propositions":[],"lastnames":["Hirsh"],"firstnames":["Haym"],"suffixes":[]},{"propositions":[],"lastnames":["Shanley"],"firstnames":["Lea"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/22aa830b71fd7915ea61bec0781b5f091/dblp","ee":"https://doi.org/10.1145/2675705","interhash":"bfadef624fc3dbf181b5af89b26f7393","intrahash":"2aa830b71fd7915ea61bec0781b5f091","journal":"Interactions","keywords":"dblp","number":"6","pages":"72-75","timestamp":"2020-10-27T11:56:41.000+0100","title":"Antisocial computing: exploring design risks in social computing systems.","url":"http://dblp.uni-trier.de/db/journals/interactions/interactions21.html#McDonaldABGHS14","volume":"21","year":"2014","bibtex":"@article{journals/interactions/McDonaldABGHS14,\n added-at = {2020-10-26T00:00:00.000+0100},\n author = {McDonald, David W. and Ackley, David H. and Bryant, Randal E. and Gedney, Melissa and Hirsh, Haym and Shanley, Lea},\n biburl = {https://www.bibsonomy.org/bibtex/22aa830b71fd7915ea61bec0781b5f091/dblp},\n ee = {https://doi.org/10.1145/2675705},\n interhash = {bfadef624fc3dbf181b5af89b26f7393},\n intrahash = {2aa830b71fd7915ea61bec0781b5f091},\n journal = {Interactions},\n keywords = {dblp},\n number = 6,\n pages = {72-75},\n timestamp = {2020-10-27T11:56:41.000+0100},\n title = {Antisocial computing: exploring design risks in social computing systems.},\n url = {http://dblp.uni-trier.de/db/journals/interactions/interactions21.html#McDonaldABGHS14},\n volume = 21,\n year = 2014\n}\n\n","author_short":["McDonald, D. W.","Ackley, D. H.","Bryant, R. E.","Gedney, M.","Hirsh, H.","Shanley, L."],"key":"journals/interactions/McDonaldABGHS14","id":"journals/interactions/McDonaldABGHS14","bibbaseid":"mcdonald-ackley-bryant-gedney-hirsh-shanley-antisocialcomputingexploringdesignrisksinsocialcomputingsystems-2014","role":"author","urls":{"Link":"https://doi.org/10.1145/2675705","Paper":"http://dblp.uni-trier.de/db/journals/interactions/interactions21.html#McDonaldABGHS14"},"keyword":["dblp"],"metadata":{"authorlinks":{}},"downloads":0,"html":""},"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/Hirsh?items=1000","dataSources":["JaQqrWT4WprgvWPEG"],"keywords":["dblp"],"search_terms":["antisocial","computing","exploring","design","risks","social","computing","systems","mcdonald","ackley","bryant","gedney","hirsh","shanley"],"title":"Antisocial computing: exploring design risks in social computing systems.","year":2014}