于慧玲(2005)網絡時代手機涉及的隱私權探索。商場現代化, 10(450):136-137。
王淑美(2011)網路作為時光機:日常網路使用與時間意義之初探。2011年中華傳播學會年會論文。
── (2014)傳播科技與生活韻律——關於研究方法的探討。傳播研究與實踐,4(1):23-43。
方怡潔(2009)譯序:事實,在行路的終點。後事實追尋:兩個國家、四個十年、一位人類學家,頁v-xii。台北:群學。
方念萱(2003)性別與傳播科技:數位落差的女性網路退用者研究。2003年中華傳播學會論文。
朱元鴻(1997)背叛/洩密/出賣:論民族誌的冥界。台灣社會研究季刊,26:29-65。江淑琳(2014)流動的空間,液態的隱私:再思考社交媒體的隱私意涵。傳播研究與實踐,4(1):85-104。林文源(2007)論行動者網絡理論的行動本體論。科技、醫療與社會,4:65-108。林淇瀁(2004)超文本,跨媒介與全球化:網路科技衝擊下的台灣文學傳播。中外文學,33(7):103-128。沈雲聰(2007)我們真的在墮落嗎?見史蒂芬‧強森(Steven Johnson)著,蔡孟璇譯,開機:電視、電腦、電玩佔據生命,怎麼辦?頁5-8。臺北:早安財經文化。
胡惠君(2015)察覺App使用者之心智模式:以即時通訊軟體LINE為例。設計學報,20(2):25-42。陳順孝(2012)網路動員的繼往開來——反國光石化運動的社會科技基礎和行動策略演化。線上資料:http://www.ashaw.org/2012/01/blog-post.html黃啟龍 (2002)網路上的公共領域實踐:以弱勢社群網站為例。資訊社會研究,3:85-111。鄭宇君、陳百齡(2012)溝通不確定性:探索社交媒體在災難事件中的角色。中華傳播學刊,21:119-153。蕭阿勤(2012) 敘事分析。見瞿海源、畢恆達、劉長萱、楊國樞主編,社會及行為科學研究法(二):質性研究法,頁133-166。臺北:東華書局。
鍾蔚文、陳百齡、陳順孝(2006)數位時代的技藝:提出一個分析架構。中華傳播學刊,10:233-264。Berger, Peter著,黃樹仁,劉雅靈譯 (1982)社會學導引:人文取向的透視。台北:巨流。
Bilton, Nick著,王惟芬、黃柏恆、楊雅婷譯(2001) 一位數位移民的告白:Facebook, iPad, iPhone如何翻轉我們的世界。台北:行人。
Draaisma, Douwe (2013) 記憶的風景:我們為什麼「想起」,又為什麼「遺忘」?張朝霞譯。台北:漫遊者文化。
Geertz, Clifford (2009) 後事實追尋:兩個國家、四個十年、一位人類學家。國立編譯館、方怡潔、郭彥君譯。台北:群學。
唐‧伊德(Don Ihde)著,韓連慶譯 (2008) 讓事物”說話”:後現象學與技術科學。北京:北京大學出版社。
馬塞爾‧普魯斯特(Marcel Proust)著,李桓基等譯(2015)追憶似水年華。台北:聯經。
華康德(Wacquant, Loïc) (1998)〈邁向社會實踐理論:布迪厄社會學的結構與邏輯〉,《實踐與反思》(An Invitation to Reflexive Sociology),頁1-90。北京:中央編譯出版社。
Abbott, Andrew (2004) Methods of Discovery: Heuristics for the Social Sciences. New York : W.W. Norton & Co.
Abrams, Philip (1982) Historical Sociology. Cornell University Press.
Agger, Ben (2011) iTime: Labor and Life in a Smartphone Era. Time & Society 20(1): 119-136.
Agre, Philip E. (2001) Changing Places: Contexts of Awareness in Computing. Human-Computer Interaction, 16(2-4):177-192.
Ahas, R., and Mark, Ü. (2005) Location based services—new challenges for planning and public administration? Futures, 37(6): 547-561.
Akrich, Madeline (1992) The De-scription of Technical Objects. in Wiebe Eco Bijker and John Law(eds), Shaping technology/Building society: Studies in sociotechnical change (pp. 205-224) . Cambridge: MIT Press.
Alford, Robert R. (1998) The Craft of Inquiry: Theories, Methods, Evidence. New York: Oxford University Press.
Allen, Anita L. (2008) Dredging up the Past: Lifelogging, Memory, and Surveillance. University of Chicago Law Review, 75:47-74.
Arnold , Michael (2004) The Connected Home: Probing the Effects and Affects of Domesticated ICTs. In PDC-04, Proceedings of the Participatory Design Conference, vol. 2, pp. 183-186, Toronto, Canada, July 27-31, 2004.
Bakardjieva, Maria (2005) Internet Society: the Internet in Everyday Life. London: Sage.
── (2006) Domestication Running Wild: From the Moral Economy of the Household to the Mores of a Culture, in Thomas Berker, Maren Hartmann, Yves Punie, and Katie Ward(eds.), Domestication of Media and Technology(pp.62-79). Open University Press.
Bannon, Liam J. (2006) Forgetting as a Feature, not a Bug: the Duality of Memory and Implications for Ubiquitous Computing. CoDesign 2(1): 3-15.
Barley, Stephen R. (1988) On technology, time, and social order: technologically induced change in the tem- poral organization of radiological work. In F. A. Dubinskas, Making time: ethnographies of high- technology organizations (pp. 123–169). Philadelphia, PA: Temple University Press.
Bartlett, Fredrick Charles (1932) Remembering: A Study in Experimental Social Psychology. Cambridge University Press: Cambridge.
Becker, Karin (1995) Media and the Ritual Process. Media, Culture & Society, 17: 629-646.
Bell, Gordon, and Jim Gemmell (2007) A Digital Life. Scientific American, 296: 58-65.
Berker, Thomas, Maren Hartmann, Yves Punie, and Katie Ward (2006) Introduction, in Thomas Berker, Maren Hartmann, Yves Punie, and Katie Ward(eds.), Domestication of Media and Technology(pp.1-17). Open University Press.
Bentley, Clyde H. (2000) Make My Day: Ritual, Dependency and the Habit of Newspaper Reading. Doctoral dissertation, University of Oregon.
Blumler, Jay G. (1979) The Role of Theory in Uses and Gratifications Studies. Communication Research, 6: 9-36.
Bourdieu, Pierre (2004) Science of Science and Reflexivity. Cambridge: Polity.
Bourdieu, Pierre, Jean-Claude Chamboredon & Jean-Claude Passeron (1991) The Craft of Sociology: Epistemological Preliminaries. New York: Walter de Gruyter.
Bossewitch, Jonah, and Aram Sinnreich (2012) The End of Forgetting: Strategic Agency Beyond the Panopticon. New Media & Society, 15(2): 224-242.
boyd, danah m. and Nicole B. Ellison (2007) Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication, 13(1): 210-230.
Bradner, Erin, Wendy A. Kellogg, and Thomas Erickson (1999) The Adoption and Use of ‘BABBLE’:A Field Study of Chat in the Workplace. In Proceedings of the Sixth European Conference on Computer-Supported Cooperative Work (pp. 139-158), 12-16 September 1999, Copenhagen, Denmark.
Bradner, Erin (2000) Social Affordances: Understanding Technology Mediated Social Networks at Work. Paper presented at the Annual Meeting of the Association of Internet Researchers, Minneapolis, MN. http://www.autodeskresearch.com/pdf/techmediatednetworks.pdf
── (2001) Social Affordances of Computer-Mediated Communication Technology: Understanding Adoption. In CHI''01 Extended Abstracts on Human Factors in Computing Systems (pp. 67-68). ACM.
Bray, Francesca (2007) Gender and Technology. Annual Review of Anthropology 36(September): 37-53.
Bruner, Edward M. (1986) Ethnography as Narrative, in Victor Turner and Edward M. Bruner(eds.) The Anthropology of Experience (pp. 139-155). Chicago: University of Illinois.
Bush, Vannevar (1945) As We May Think. The Atlantic Monthly, 176(1): 101-108.
Castells, Manuel (1996)The rise of the network society. Cambridge: Blackwell Publishers.
── (2001) The Internet galaxy: reflections on the Internet, business, and society. Oxford University Press.
Chang, I-Cheng, Chuang-Chun Liu and Kuanchin Chen (2013) The Push, Pull and Mooring Effects in Virtual Migration for Social Networking Sites. Information System Journal, 24(4): 323-346.
Chemero, Anthony (2003) An Outline of a Theory of Affordances. Ecological psychology, 15(2): 181-195.
Clarke, Roger (1988) Information technology and dataveillance. Communications of the ACM, 31(5): 498-512.
Cowan, Ruth Schwartz (1993) The Consumption Junction: A Proposal for Research Strategies in the Sociology of Technology. In Bijker, Wiebe E., Thomas P. Hughes, and Trevor Pinch(eds.), The Social Construction of Technological Systems : New Directions in the Sociology and History of Technology(Pp.261-280). Cambridge, Mass.: MIT Press.
Consolvo, Sunny, Beverly Harrison, Ian Smith, Mike Y. Chen, Katherine Everitt, John Froehlich, and James A. Landay (2007) Conducting in Situ Evaluations for and With Ubiquitous Computing Technologies. International Journal of Human-Computer Interaction, 22(1-2): 103-118.
Couldry, Nick (2003) Media Rituals: A Critical Approach. London; New York: Rputledge.
Crabtree, Andy, Steve Benford, Chris Greenhalgh, Paul Tennent, Matthew Chalmers, Barry Brown (2006) Supporting Ethnographic Studies of Ubiquitous Computing in the Wild. Proc. of INTERACT 2006, ACM Press.
Csikszentmihalyi, Mihaly and Reed Larson (1987) Validity and Reliability of the Experience-sampling Method. Journal of Nervous and Mental Disease, 175 (9):526-536.
Daft, Richard L., and Robert H. Lengel (1984) Information Richness: A New Approach to Managerial Behavior and Organization Design. Research in Organization Behavior 6: 191-233.
Danezis, George, Stephen Lewis, and Ross Anderson (2005) How Much is Location Privacy Worth? Fourth Workshop on the Economics of Information Security, 2005. Harvard University. 網址:http://infosecon.net/workshop/pdf/location-privacy.pdf (2015/1/8瀏覽)
Davis, Fred D. (1989) Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterley 13(3): 319-340.
Davis, Fred D., Richard P. Bagozzi, and Paul R. Warshaw (1989) User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science 35(8):982-1003.
de Certeau, Michel (1984). The practice of everyday life. Berkeley: University of California Press.
de Montjoye Yve.-Alexandre, Radaelli L., Singh V. K., Pentland A. S. (2015) Unique in the Shopping Mall: On the Reidentifiability of Credit Card Metadata. Science, 347 (6221), 536-539.
Dennis, Alan R., and Joseph S. Valacich (1999) Rethinking Media Richness: Towards a Theory of Media Synchronicity. In Proceedings of the 32nd Hawaii Internal Conference on system Sciences. Los Alamitos: IEEE, 1999.
Dourish, Paul and Ken Anderson (2006) Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Human-Computer Interaction, 21: 319-342.
Dreyfus, Hubert (1979) What Computers Can’t Do: the limits of artificial intelligence. New York: Harper and Row.
Eagle, Nathan, and Alex Pentland (2006) Reality Mining: Sensing Complex Social Systems. Personal and Qbiquitous Computing, 10(4): 255-268.
Ellul, Jacques (1964) The technological society. New York: Vintage.
Ewick, Patricia, and Susan S. Silbey (1995) Subversive Stories and Hegemonic Tales: Toward a Sociology of Narrative. Law & Society Review, 29(2): 197-226.
Fei, Liu and Xiao Bo (2014) Do I Switch? Understanding Users’ Intention to Switch Between Social Network Sites. 47th Hawaii International Conference on System Science.
Felski, Rita (2000) Doing time: Feminist theory and postmodern culture. NYU Press.
Flaherty, Michael G. (1987) Multiple Realities and the Experience of Duration. The Sociological Quarterly, 28(3): 313-326.
Flaherty, Michael G. and Lucas Seipp-Williams (2005) Sociotemporal Rhythms in E-mail: A case study. Time & Society, 14(1): 39-49.
Forty, Adrian (1986) Objects of Desire: Design and Society Since 1750. Thames & Hudson.
Foulger, Davis Albert (1993) Medium as Process: The Structure, Use, and Practice of Computer Conferencing on IBM''s IBMPC Computer Conferencing Facility. Ann Arbor, Mich.: UMI.
Frissen, Valerie A. J. (2000) ICTs in the Rush Hour of Life. The Information Society: An International Journal, 16(1): 65-75.
Froonmkin, Michael A. (2000) The Death of Privacy? Standford Law Review, 52, 1461-1543.
Fulk, Janet, Charles W. Steinfield, Joseph Schmitz, and J. Gerard Power (1987) A Social Information Processing Model of Media Use in Organizations. Communication Research, 18(4): 487-523
Fulk, Janet, Joseph Schmitz and Charles W. Steinfield (1990) A Social Influence Model of Technology Use, in Janet Fulk and Charles W. Steinfield, Organizations and Communication Technology (pp. 117-140). Newbury Park, CA: Sage.
Garnham, Nicholas (2004) The Media and the Public Sphere. In Frank Webster (ed.), The Information Society Reader (pp.357-378). Psychology Press.
Gemmell, Jim, Gordon Bell, Roger Lueder, Steven M. Drucker, Curties Wong (2002) MyLifeBits: Fulfilling the Memex vision. Proceeding of ACM Multimedia’02, December 1-6 2002, Juan-les-Pins..
Gemmell, Jim, Aleks Aris, and Roger Lueder (2005) Telling Stories With MyLifeBits. ICME 2005, July 6-9 2005.
Gershuny, Jonathan (2003) Web use and net nerds: a neofunctionalist analysis of the impact of information technology in the home. Social Forces, 82(1), 141-168.
Gibson, James J. (1979) The ecological approach to visual perception. Boston: Houghton Mifflin.
Giddens, Anthony (1987) Social Theory and Modern Sociology. Standford University Press.
── (1991) Modernity and Self-Identity: Self and Society in the Late Modern Age. Stanford, Calif.: Stanford University Press.
Gillmor, Dan (2006) We the media: Grassroots journalism by the people, for the people. " O''Reilly Media, Inc.".
Goffman, Erving (1967) Interaction Ritual. New York: Pantheon Books.
Green, Nicola (2002) On the Move: Technology, Mobility, and the Mediation of Social Time and Space. The Information Society, 18: 281-292.
Gross, Elisheva F. (2004) Adolescent Internet Use: What We Wxpect, What Tenns Report. Applied Developmental Psychology, 25: 633-649.
Habib, Laurence (2005) Finding a place and a space for online learning environments in an institutional setting: issues of objectification. IPSI BgD Transactions on Internet Research, 1(2).
Hackman, Michael Zane and Kim B. Walker (1990) Instructional Communication in the televised Classroom: The Effects of System Design and Teacher Immediacy on Student Learning and Satisfaction. Communication Education 39(3): 196-206
Haddon, Leslie (1993) Studying Information and Communication Technologies Teleworking Households. Proceeding of COST A4 Workshop in Trondheim, Norway, 28th-30th November 1993.
── (2003) Domestication and Mobile Telephony, in James E. Katz (ed), Machines That Become Us: The Social Context of Personal Communication Technology (pp.43-55). Transaction Publishers.
── (2004) Information and Communication Technologies in Everyday Life: A Concise Introduction and Research Guide. Oxford ; New York : Berg.
── (2006) The Contribution of Domestication Research to in-home Computing and Media Consumption. The Information Society, 22(4): 195-203.
── (2011) Domestication Analysis, Objects of Study, and the Centrality of Technologies in Everyday Life. Canadian Journal of Communication, 36(2):311-323.
Harding, Sandra (ed.) (1987) Feminism and methodology: social science issues. Bloomington: Indiana University Press.
Hartmann, Maren (2006) The Triple Articulation of ICTs, Media as Technological Objects, Symbolic Environments and Individual Texts, in Thomas Berker, Maren Hartmann, Yves Punie, and Katie Ward(eds.), Domestication of Media and Technology (pp .80-102). Open University Press.
Heres, Jeroen, Enid Mante-Meijer, Tomaz Turk, and Jo Pierson (2005) Adoption of ICTs: A proposed framework, in EA Mante-Meijer & L. Klamer (eds.), ICT capabilities in action: What people do. Luxemburg: Office for Official Publications of the European Communities.
Hine, Christine (2000) Virtual Ethnography. London: Sage.
Hodges, Mark R., and Martha E. Pollack (2007) An “Object-Use Fingerprint”: the Use of Electronic Sensors for Human Identification, in UbiComp 2007: Ubiquitous Computing 9th International Conference (pp. 289-303). Innsbruck, Austria, September 16-19 2007. Berlin: Springer.
Hörning, Karl H., Daniela Ahrens, and Anette Gerhard (1999) Do Technologies Have Time? : New Practices of Time and the Transformation of Communication Technologies. Time and Society, 8(2): 293-308.
Hou, Avus C.Y., Yu-Chen Chen, Rong-An Shang, and Ching-Chin Chern (2012) The Post Adoption Switching of Social Network Service: A Human Migratory Model. PACIS 2012 Proceedings.
Hubers, Christa, Schwanen, Tim, & Dijst, Martin (2008) ICT and temporal fragmentation of activities: an analytical framework and initial empirical findings. Tijdschrift voor economische en sociale geografie, 99(5), 528-546.
Hutchby, Ian (2001) Technologies, Texts and Affordances. Sociology, 35(2): 441-456.
Hynes, Deirdre, and Els Rommes (2006). ‘Fitting the Internet into Our Lives’: IT Courses for Disadvantaged Users, in Thomas Berker, Maren Hartmann, Yves Punie, and Katie Ward(eds.), Domestication of Media and Technology(pp.125-144). Open University Press.
Hwang, Ha Sung and SungBok Park (2007) Being Together: User’s Subjective Experience of Social Presence in CMC Environments, in J. Jacko (ed.), Human-Computer Interaction, Part I (pp. 844-853). Springer-Verlag Berlin Heidelberg.
Ihde, Don (1990). Technology and the Lifeworld: From Garden to Earth. Indiana University Press.
── (1998) Expanding hermeneutics: Visualism in science. Northwestern University Press.
Intille, Stephen S., Emmanuel Munguia Tapia, John Rondoni, Jennifer Beaudin, Chuck Kukla, Sitij Agarwal, Ling Bao, and Kent Larson (2003) Tools for studying behavior and technology in natural settings. In UbiComp 2003: Ubiquitous Computing (pp. 157-174). Springer Berlin Heidelberg.
Jackson, Linda A., Kelly S. Ervin, Philip D. Gardner, and Neal Schmitt (2001) Gender and the Internet: Women communicating and men searching. Sex Roles, 44, 363-379.
Jenkins, Henry (2006) Convergence Culture: Where Old and New Media Collide. NYU Press.
Jonas, Hans (1976) Responsibility Today: The Ethics of an Endangered Future. Social Research, 43(1): 77-97.
Kahneman, Daniel, Alan B. Krueger, David A. Schkade, Norbert Schwarz, and Arthur A. Stone (2004) A Survey Method for Characterizing Daily Life Experience: The Day Reconstruction Method. Science, 306(5702): 1776-1780.
Kang, Jerry (1998) Information privacy in cyberspace transactions. Stanford Law Review, 50: 1193-1294.
Kopytoff, Igor (1986) The Cultural Biography of Things: Commoditization as Process, in Arjun Appadurai(ed.), The Social Life of Things: Commodities in a Cultural Perspective (pp. 64-91) . Cambridge: Cambridge University Press.
Kraut, Robert, Malcolm Brynin, and Sara Kiesler (eds.) (2006). Computers, phones, and the Internet: Domesticating information technology. Oxford: Oxford University Press.
Krumm, John (2008) A Survey of Computational Location Privacy. Personal and Ubiquitous Computing, 2008. 網址:http://research.microsoft.com/en-us/um/people/jckrumm/publications%202008/computational%20location%20privacy%20preprint.pdf (2015/1/8瀏覽)
Lahlou, Saadi (2008) Identity, Social Status, Privacy and Face-keeping in Digital Society. Social Science Information, 47(3): 299-330.
LaRose, Robert (2010) The problem of media habits. Communication Theory, 20(2): 194-222.
Law, John (1992) Notes on the theory of the actor-network: Ordering, strategy, and heterogeneity. Systems practice, 5(4): 379-393.
Law, John, and Bijker, W (1992) Technology, stability and social theory. In Bijker, W. E., and John Law (eds.), Shaping Technology/Building Society: Studies in Sociotechnical Change (pp.290-308). Cambridge, Mass:MIT Press.
Lash, Scott (2002) Critique of Information. London: Sage.
Lee, H., and Liebenau, J. (2000) Temporal effects of information systems on business processes: focusing on the dimensions of temporality. Accounting, Management and Information Technologies, 10(3), 157-185.
Leino-Kilpi, H., Välimäki, M., Dassen, T., Gasull, M., Lemonidou, C., Scott, A., and Arndt, M. (2001) Privacy: A Review of the Literature. International journal of nursing studies, 38(6), 663-671.
Leonardi, Paul M. (2011) When Flexible Routines Meet Flexible Technologies: Affordance, Constraint, and the Imbrication of Human and Material Agencies. MIS Quarterly, 35(1):147-167.
Lewis, David and Andrew J. Weigert (1981) The Structures and Meanings of Social Time. Social Forces, 60(2): 432-462.
Lie, Merete and Knut H. Srensen (1996) Making Technology Our Own? Domesticating Technology into Everyday Life, in Merete Lie and Knut H. Srensen(eds.), Making Technology Our Own? Domesticating Technology into Everyday Life (pp.1-30). Scandinavian University Press.
Lim, Sun Sun and Carol Soon (2010) The influence of social and cultural factors on mothers’ domestication of household ICTs–Experiences of Chinese and Korean women. Telematics and Informatics, 27(3), 205-216.
Ling, Rich and Leslie Haddon (2007) Mobile Telephony, Mobility, and the Coordination of Everyday Life, in James E. Katz (ed), Machines that become us (pp.245-265). Transaction Publishers.
Livingstone, Sonia (2008) Taking risky opportunities in youthful content creation: teenagers'' use of social networking sites for intimacy, privacy and self-expression. New media & society, 10(3), 393-411.
Lombard, Matthew and Theresa Ditton (1997) At the Heart of It All: The Concept of Presence. Journal of Computer-Mediated Communication, 3(2) Available online: http://jcmc.indiana.edu/vol3/issue2/lombard.html
Luciano, Floridi (2007) A Look into the Future Impact of ICT on Our Lives. The Information Society, 23: 59-64.
Mackay, Hughie, and Gareth Gillespie (1992). Extending the social shaping of technology approach: ideology and appropriation. Social studies of science, 22(4), 685-716.
Madan, A., & Pentland, A. (2009) Modeling Social Diffusion Phenomena using Reality Mining. In AAAI Spring Symposium: Human Behavior Modeling (pp. 43-48).
Mante-Meijer, Enid, and Lajla Klamer (eds). (2004) ICT capabilities in action: What people do. Luxemburg: Office for Official Publications of the European Communities.
Marcuse, Herbert (1964) One Dimensional Man: Studies in the Ideology of Advanced Industrial Society. Boston: Beacon Press.
McKeon, Richard (1974) Time and temporality. Philosophy East and West, 24(2), 123-128.
McLuhan, Marshall [1964](2001). Understanding media : the extensions of man. London : Routledge.
Moore, Sally F. and Barbara G. Myerhoff (1977) Introduction: Secular Ritual: Forms and Meanings, in Dally F. Moore and Barbara G. Myerhoff (eds), Secular Ritual (pp. 3-24). Assen and Amsterdam: Van Gorcum.
Mulder, I., G.H. ter Hofte, J. Kort (2005). SocioXensor: Measuring user behavior and user experience in context with mobile devices, in L.P.J.J. Noldus, F. Grieco, L.W.S. Loijens, and P.H. Zimmerman (eds.), Proceedings of Measuring Behavior 2005, the 5th International Conference on Methods and Techniques in Behavioral Research, August 30-September2, 2005, Wageningen, the Netherlands, pp.355-358.
Nansen, Bjorn, Michael Arnold, Martin R. Gibbs and Hilary Davis (2009) Domestic Orchestration: Rhythms in the Mediated Home. Time and Society, 18(2/3): 181-207.
Nissenbaum, Helen (2010) Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press.
Norman, Donald (1988) The Psychology of Everyday Things. New York: Basic Books.
O’Hara, Kieron, Mischa M. Tuffield, and Nigel Shadbolt (2009) Lifelogging: Privacy and Empowerment with Memories for Life. Identity in the Information Society, 1(2): 155-172.
O’Hara, Kieron (2010) Narcissus to a Man: Lifelogging, Technology and the Normativity of Truth. At Second Annual SenseCam Symposium, Dublin.
Ohmori, Nobuaki, and Noboru Harata (2008) How different are activities while commuting by train? A case in Tokyo. Tijdschrift voor economische en sociale geografie,99(5), 547-561.
Oldenziel, Ruth. (2001) Man the Maker, Woman the Consumer: The Consumption Junction Revisted, in Angela N. H. Creager, Elizabeth Lunbeck, and Londa Schiebinger (eds), Feminism in Twentieth-Century Science, Technology, and Medicine (pp. 128-148). Chicago: The University of Chicago Press.
Oudshoorn, Nelly and Trevor Pinch (2003) How Users and Non-Users Matter, in Nelly Oudshoorn and Trevor Pinch (eds), How Users Matter: The Co-Construction of Users and Technology (pp.1-25). Cambridge, Mass.: MIT Press.
Palen, Leysia, and Paul Dourish (2003) Unpacking “Privacy” for a Networked World. In Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 129-136). ACM.
Papacharissi, Zizi and Alan M. Rubin (2000) Predictors of Internet Use. Journal of Broadcasting and Electronic Media, 44(2):175-196.
Pentland, A., Lazer, D., Brewer, D., & Heibeck, T. (2009) Using reality mining to improve public health and medicine. Stud Health Technol Inform, 149:93-102.
Petronio, Sandra and Judith N. Martin (1986) Ramifications of Revealing Private Information: A Gender Gap. Journal of Clinical Psychology, 42 (3): 499-506.
Pfaffenberger, Bryan (1992) Technological Dramas. Technology & Human Values, 17(3):282-312.
Pinch, Trevor and Wiebe E. Bijker (1984) The Social Construction of Facts and Artefacts: Or How the Sociology of Science and the Sociology of Technology Might Benefit Each Other. Social Studies of Science, 14(3): 399-441.
Polkinghorne, Donald E. (1988) Narrative Knowing and the Human Sciences. Albany: State University of New York Press.
Poster, Mark (1990). The mode of informatio : poststructuralisms and contexts. Chicago: University of Chicago Press.
Poster, Mark (1997). Cyberdemocracy: Internet and the public sphere. Internet culture, 201, 218.
Prensky, Marc (2001) Digital Natives, Digital Immigrants. On the Horizon, 9(5). Lincoln: MCB University Press.
Rawassizadeh, Reza (2011) Towards Sharing Life-log Information with Society. Behavior &Information Technology, 31(11): 1057-1067.
Reichelt, Lisa (2007) Ambient Intimacy. http://www.disambiguity.com/ambient-intimacy/
Rekimoto, Jun, Takashi Miyaki, and Takaaki Ishizawa (2007) LifeTag: WiFi-based Continuous Location Logging for Life Pattern Analysis. in Location-and Context-Awarness Third International Symposium (pp.35-49). Proceedings of the conference at Oberpfaffenhofen, German, 20-1 September 2007. Berlin: Springer.
Rettie, Ruth (2003) A Comparison of Four New Communication Technologies. Pp. 686-690, in Proceedings of HCI International Conference on Human-Computer Interaction. New Jersey: Lawrence Erlbaum Associates.
Ricoeur, P. (1980) Narrative time. Critical inquiry, 169-190.
Richardson, Laurel (1990) Narrative and Sociology. Journal of Contemporary Ethnography, 19(1): 116-135.
Riddle, Matthew and Michael Arnold (2007) The Day Experience Method: A Resource Kit. http://www.matthewriddle.com/papers/Day_Experience_Resource_Kit.pdf
Riddle, Matthew and Catherine Howell (2008) You are here: Students map their own ICT landscapes. Proceedings ascilite Melbourne 2008 (pp.802-808).
Riessman, Catherine Kohler (1993) Narrative Analysis. London: Sage.
Rogge, Jan-Uwe (2013) The Media in Everyday Family Life: Some Biographical and Typological Aspects., in Ellen Seiter et al. (eds.), Remote control: Television, Audiences, and Cultural Power (pp.168-179). Routledge.
Rosenstein, Aviva W. and August E. Grant (1997) Reconceptualizing the Role of Habit: A New Model of Television Audience Activity. Journal of Broadcasting & Electronic Media, 41(3): 324-344.
Rubin, Alan M. (1984) Ritualized and Instrumental Television Viewing. Journal of Communication, 34(3):67-77.
Salancik, Gerald R. and Jeffrey Pfeffer (1978) A Social Information Processing Approach to Job Attitudes and Task Design. Administrative Science Quarterly, 23:224-253.
Schmitz, Joseph and Janet Fulk (1991) Organizational Colleagues, Media Richness, and Electronic Mail: A Test of the Social Infuence Model of Technology Use. Communication Research, 18(4): 487-523.
Schwanen, Tim., Martin Dijst, and Mei-Po Kwan (2008) ICTs and the decoupling of everyday activities, space and time: Introduction. Tijdschrift voor economische en sociale geografie, 99(5), 519-527.
Sellen, Abigail, and Steve Whittaker (2010) Beyond Total Capture: A Constructive Critique of Lifelogging. Communications of the ACM, 53(5): 70-77.
Shachtman, Noah (2004) Pentagon Kills LifeLog Project. Wired, 2nd April. Available Online: http://www.wired.com/politics/security/news/2004/02/62158 .
Shaw, Lindsay H., and Larry M. Grant (2002) Users divided? Exploring the gender gap in Internet use. Cyberpsychology & Behavior, 5, 517-527.
Sheldon, Pavica (2008) The relationship between unwillingness-to-communicate and students’ Facebook use. Journal of Media Psychology, 20(2), 67-75.
Shklovski, Irina (2012) Social Network Sites: Indispensable or Optional Social Tools. Proceedings of the Sixth International AAAL Conference on Weblogs and Social Media.
Short, John, Ederyn Williams and Bruce Christie (1976) The Social Psychology of telecommunication. London: Wiley.
Silverstone, Roger, Eric Hirsch, and David Morley (1991) Listening to a Long Conversation: An Ethnographic Approach to the Study of Information and Communication Technologies in the Home. Cultural Studies, 5(2): 204-227.
Silverstone, Roger, Eric Hirch and David Morley (1992) Information and Communication Technologies and the Moral Economy of the Household, in Roger Silverstond and Eric Hirch(eds.), Consuming Technologies: Media and Information in Domestic Spaces (pp. 15-31). London: Routledge.
Silverstone, Roger (1993) Time, Information and Communication Technologies and the Household. Time and Society, 2(3): 283-311.
── (1994) Television and Everyday Life. London; New York: Routledge.
Silverstone, Roger and Leslie Haddon (1996) Design and the Domestication of Information and Communication Technology: Technical Chang and Everyday Life, in Roger Silverstone and Robin Mansell (Eds.), Communication by Design: The Politics of Information and Communication Technology (pp.44-74). Oxford: Oxford University Press.
Slater, Mel and Sylvia Wilbur (1997) A Framework for Immersive Virtual Environments(FIVE): Speculations on the Role of Presence in Virtual Environments. Presence: Teleoperators and Virtual Environments, 6(6): 603-616.
Snow, Robert P. (1987) Interaction with Mass Media: The Importance of Rhythm and Tempo. Communication Quarterly, 35(3): 225-237.
Somers, Margaret R., and Gloria D. Gibson (1994) Reclaiming the Epistemological “Other”: Narrative and the Social Construction of Identity. in Craig Calhoun(ed.), Social Theory and the Politics of Identity (pp. 37-99) . Ozford, UK: Blackwell.
Srensen, Knut H. (2006) Domestication: the Enactment of Technology, in Thomas Berker, Maren Hartmann, Yves Punie, and Katie Ward(eds.), Domestication of Media and Technology (pp .40-61). Open University Press.
Southerton, Dale, and Mark Tomlinson (2005) Pressed for time’–the differential impacts of a ‘time squeeze. The Sociological Review, 53(2), 215-239.
Southerton, Dale (2006) Analysing the temporal organization of daily life: Social constraints, practices and their allocation. Sociology, 40(3), 435-454.
Stewart, James (2007) Local Experts in the Domestication of Information and Communication Technologies. Information, Communication & Society, 10(4):547-569.
Symes, Colin (1999) Chronicles of Labour: A Discourse Analysis of Diaries. Time and Society, 8(2): 357-380.
Taylor, Charles (1989) Sources of the Self: The Making of the Modern Identity. Cambridge: Cambridge University Press.
Thayer, Stacy E., and Sukanya Ray (2006). Online communication preferences across age, gender, and duration of Internet use. CyberPsychology & Behavior, 9(4), 432-440.
Thompson, Clive (2008) Brave New World of Digital Intimacy. http://www.nytimes.com/2008/09/07/magazine/07awareness-t.html?pagewanted=2&_r=0
Trevino, Linda Kiebe, Richard L. Daft, and Robert H. Lengel (1990) Understanding Managers’ Media Choices: A Symbolic Interactionist Perspective. in Janet Fulk and Charles Steinfield(eds.), Organizations and Communication Technology (pp. 71-94). Newbury Park, CA:Sage.
Tu, Chih-Hsiung (2002) The Impacts of Text-based CMC on Online Social Presence. The Journal of Interactive Online Learning, 1(2) Available online: http://www.ncolr.org
Turkle, Sherry (1984) The Second Self: Computers and the Human Spirit. New York : Simon and Schuster.
Van Oost, E. (2003) Materialized gender: how shavers configure the users’ femininity and masculinity’, in Nelly Oudshoorn and Trevor Pinch (eds), How Users Matter: The Co-construction of Users and Technology (pp. 193-208). Cambridge, Mass.: MIT Press.
Venkatesh, Viswanath and Fred D. Davis (2000) A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies. Management Science, 46(2): 186-204.
Venkatesh, Viswanath, Michael G. Morris, Gordon B. Davis and Fred D. Davis (2003) User Acceptance of Information Technology: Toward a Unified View. MIS Quarterly, 27(3): 425-478.
Veroff, J., Sutherland, L., Chadiha, L., & Ortega, R. M. (1993) Newlyweds tell their stories: A narrative method for assessing marital experiences. Journal of Social and Personal Relationships, 10(3), 437-457.
Wagman, Ira (2010) Log On, Goof Off, and Look Up: Facebook and the Rhythms of Canadian Internet Use, in Beaty, B., Briton, D., Filax, G., Sullivan, R. (eds.), How Canadians Communicate. Athabasca University Press, Athabasca 2010: 55- 77 [http://hdl.handle.net/10807/56826]
Wajcman, Judy (2008) Life in the fast lane? Towards a sociology of technology and time. The British journal of sociology, 59(1), 59-77.
Webster, Juliet (1996) Shaping Women''s Work: Gender Employment and Information Technology. Routledge.
Weiser, Eric B. (2000) Gender differences in Internet use patterns and Internet application preferences: A two-sample comparison. CyberPsychology & Behavior, 3, 167-178.
Weitzner, Daniel J.,Hal Abelson, Cynthia Dwork, Cameron Kerry, Daniela Rus, Sandy Pentland, and Salil Vadhan (2014) Consume Privacy Bill of Rights and Big Data: Response to White House Office of Science and Technology Policy Request for Information. Retrieved from http://privacytools.seas.harvard.edu/publications/consumer-privacy-bill-rights-and-big-data
Wellman, Barry and Milena Gulia (1999) Virtual Communities as Communities: Net Surfers don’t Ride Alone. In Smith, Marc A. and Peter Kollock (eds.), Communities in Cyberspace (pp.167-194). London ; New York : Routledge.
Wellman, Barry (2001) Physical Place and Cyberspace: The Rise of Personalized Networks. International Urban and Regional Research, 25:227-252.
Wellman, Barry, Anabel Quan‐Haase,Jeffrey Boase, Wenhong Chen, Keith Hampton, Isabel Díaz, and Kakuko Miyata (2003). The social affordances of the Internet for networked individualism. Journal of Computer‐Mediated Communication, 8(3). http://onlinelibrary.wiley.com/doi/10.1111/j.1083-6101.2003.tb00216.x/full
Wu, Yu-Lung, Yu-Hui Tao, Ching-Pu Li, Sheng-Yuan Wang, and Chi-Yuan Chiu (2014) User-switching Behavior in Social Network Sites: A Model Perspective with Drill-Down Analyses. Computers in Human Behavior, 33: 92-103.
Zengyn, Cheng, Yang Yinping, and John Lim (2009) Cyber Migration: An Empirical Investigation of Factors that Affect Users’ Switch Intention in Social Networking Sites. Proceedings of the 42nd Hawaii International Conference on System Sciences.
Zerubavel, Eviatar (1976). Timetables and Scheduling: On the Social Organization of Time. Sociological Inquiry, 46(2): 87-94.
── (1979). Patterns of Time in Hospital Life. Chicago: The University of Chicago Press.
── (1987). The language of time: toward a semiotics of temporality. Sociological Quarterly, 343-356.