default search action
Jenna Burrell
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Jenna Burrell:
Automated decision-making as domination. First Monday 29(4) (2024) - [j13]Jenna Burrell, Jacob Metcalf:
Introduction for the special issue of "Ideologies of AI and the consolidation of power": Naming power. First Monday 29(4) (2024) - 2021
- [j12]Zoe Kahn, Jenna Burrell:
A Sociocultural Explanation of Internet-Enabled Work in Rural Regions. ACM Trans. Comput. Hum. Interact. 28(3): 17:1-17:22 (2021)
2010 – 2019
- 2019
- [j11]Anne Jonas, Jenna Burrell:
Friction, snake oil, and weird countries: Cybersecurity systems could deepen global inequality through regional blocking. Big Data Soc. 6(1): 205395171983523 (2019) - [j10]Jenna Burrell, Zoe Kahn, Anne Jonas, Daniel Griffin:
When Users Control the Algorithms: Values Expressed in Practices on Twitter. Proc. ACM Hum. Comput. Interact. 3(CSCW): 138:1-138:20 (2019) - 2018
- [j9]Jenna Burrell:
Thinking relationally about digital inequality in rural regions of the U.S. First Monday 23(6) (2018) - 2017
- [c8]Morgan G. Ames, Jenna Burrell:
'Connected Learning' and the Equity Agenda: A Microsociology of Minecraft Play. CSCW 2017: 446-457 - 2016
- [j8]Jenna Burrell:
How the machine 'thinks': Understanding opacity in machine learning algorithms. Big Data Soc. 3(1): 205395171562251 (2016) - 2015
- [j7]Eric P. S. Baumer, Morgan G. Ames, Jenna Burrell, Jed R. Brubaker, Paul Dourish:
Why study technology non-use? First Monday 20(11) (2015) - [j6]Eric P. S. Baumer, Jenna Burrell, Morgan G. Ames, Jed R. Brubaker, Paul Dourish:
On the importance and implications of studying technology non-use. Interactions 22(2): 52-56 (2015) - [e1]Arul Chib, Matthew Kam, Jenna Burrell:
Proceedings of the Seventh International Conference on Information and Communication Technologies and Development, ICTD 2015, Singapore, May 15 - 18, 2015. ACM 2015, ISBN 978-1-4503-3163-0 [contents] - 2014
- [c7]Eric P. S. Baumer, Morgan G. Ames, Jed R. Brubaker, Jenna Burrell, Paul Dourish:
Refusing, limiting, departing: why we should study technology non-use. CHI Extended Abstracts 2014: 65-68 - 2013
- [c6]Janaki Srinivasan, Jenna Burrell:
Revisiting the fishers of Kerala, India. ICTD (1) 2013: 56-66 - 2012
- [j5]Jenna Burrell:
Technology hype versus enduring uses: A longitudinal study of Internet use among early adopters in an African city. First Monday 17(6) (2012) - 2010
- [j4]Jenna Burrell:
Evaluating Shared Access: social equality and the circulation of mobile phones in rural Uganda. J. Comput. Mediat. Commun. 15(2): 230-250 (2010)
2000 – 2009
- 2008
- [j3]Jenna Burrell, Ken Anderson:
'I have great desires to look beyond my world': trajectories of information and communication technology use among Ghanaians living abroad. New Media Soc. 10(2): 203-224 (2008) - 2004
- [j2]Jenna Burrell, Tim Brooke, Richard Beckwith:
Vineyard Computing: Sensor Networks in Agricultural Production. IEEE Pervasive Comput. 3(1): 38-45 (2004) - [c5]John Sherry, Scott D. Mainwaring, Jenna Burrell, Richard Beckwith, Tony Salvador:
'This All Together, Hon?' Ubicomp in Non-office Work Environments. UbiComp 2004: 179-195 - 2003
- [c4]Jenna Burrell, Tim Brooke, Richard Beckwith:
Extending ubiquitous computing to vineyards. CHI Extended Abstracts 2003: 822-823 - 2002
- [j1]Jenna Burrell, Geri Gay:
E-graffiti: evaluating real-world use of a context-aware system. Interact. Comput. 14(4): 301-312 (2002) - [c3]Jenna Burrell, Geri Gay, Kiyo Kubo, Nick Farina:
Context-Aware Computing: A Test Case. UbiComp 2002: 1-15 - 2001
- [c2]Jenna Burrell, Geri K. Gay:
Collectively defining context in a mobile, networked computing environment. CHI Extended Abstracts 2001: 231-232 - 2000
- [c1]Jenna Burrell, Paul Treadwell, Geri K. Gay:
Designing for context: usability in a ubiquitous environment. CUU 2000: 80-84
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-07 19:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint