bowker in Tenen & Foxman 2014


a, Jacques. "Archive Fever: a Freudian Impression." *Diacritics*
25, no. 2 (July 1995): 9--63.

DiMaggio, Paul, Eszter Hargittai, W. Russell Neuman, and John P.
Robinson. "Social Implications of the Internet." *Annual Review of
Sociology* 27 (January 2001): 307--36.

Edwards, Paul N. "Infrastructure and Modernity: Force, Time, and Social
Organization in the History of Sociotechnical Systems." In *Modernity
and Technology*, 185--225, 2003.

---------. "Y2K: Millennial Reflections on Computers as Infrastructure."
*History and Technology* 15, no. 1-2 (1998): 7--29.

Edwards, Paul N., Geoffrey C. Bowker, Steven J. Jackson, and Robin
Williams. "Introduction: an Agenda for Infrastructure Studies." *Journal
of the Association for Information Systems* 10, no. 5 (2009): 364--74.

Ernesto. "US P2P Lawsuit Shows Signs of a 'Pirate Honeypot'."
Technology. *TorrentFreak*. Last edited in June 2011 and archived on
January 14, 2014.
[http://torrentfreak.com/u-s-p2p-lawsuit-shows-signs-of-a-pirate-honeypot-110601/](“https://web.archive.org/web/20140114200326/http://torrentfreak.com/u-s-p2p-lawsuit-shows-signs-of-a-pirate-honeypot-110601/”).

Gauravaram, Praveen, and Lars R. Knudsen. "Cryptographic Has


Sphere." *New Media & Society* 4, no. 1 (February 2002): 9--27.

Priest, Eric. "The Future of Music and Film Piracy in China." *Berkeley
Technology Law Journal* 21 (2006): 795.

Salmon, Ricardo, Jimmy Tran, and Abdolreza Abhari. "Simulating a File
Sharing System Based on BitTorrent." In *Proceedings of the 2008 Spring
Simulation Multiconference*, 21:1--:5. SpringSim '08. San Diego, CA,
USA: Society for Computer Simulation International, 2008.

Shirky, Clay. *Here Comes Everybody: the Power of Organizing Without
Organizations*. New York: Penguin Press, 2008.

Star, Susan Leigh, and Geoffrey C. Bowker. "How to Infrastructure." In
*Handbook of New Media: Social Shaping and Social Consequences of ICTs*,
Updated Student Edition., 230--46. SAGE Publications Ltd, 2010.

Stuart, Mary. "Creating a National Library for the Workers' State: the
Public Library in Petrograd and the Rumiantsev Library Under Bolshevik
Rule." *The Slavonic and East European Review* 72, no. 2 (April 1994):
233--58.

---------. "'The Ennobling Illusion': the Public Library Movement in
Late Imperial Russia." *The Slavonic and East European Review* 76, no. 3
(July 1998): 401--40.

---------. "The Evolution of Librarianship in


5-27}
28. [GIMEL/viewtopic.php?f=17&t=299.
[[↩](#fnref-2025-28)]{.footnotereverse}]{#fn-2025-28}
29. [GIMEL/viewtopic.php?f=8&t=169. All quotes translated from Russian
by the authors, unless otherwise noted.
[[↩](#fnref-2025-29)]{.footnotereverse}]{#fn-2025-29}
30. [GIMEL/viewtopic.php?f=8&t=6999&p=41911.
[[↩](#fnref-2025-30)]{.footnotereverse}]{#fn-2025-30}
31. [GIMEL/viewtopic.php?f=8&t=757.
[[↩](#fnref-2025-31)]{.footnotereverse}]{#fn-2025-31}
32. [In this sense, we see our work as complementary to but not
exhausted by infrastructure studies. See Geoffrey C. Bowker and
Susan Leigh Star, *Sorting Things Out: Classification and Its
Consequences* (The MIT Press, 1999); Paul N. Edwards, "Y2K:
Millennial Reflections on Computers as Infrastructure," *History and
Technology* 15.1-2 (1998): 7--29; Paul N. Edwards, "Infrastructure
and Modernity: Force, Time, and Social Organization in the History
of Sociotechnical Systems," in *Modernity and Technology*, 2003,
185--225; Paul N. Edwards et al., "Introduction: an Agenda for
Infrastructure Studies," *Journal of the Association for Information
Systems* 10.5 (2009): 364--74; Brian Larkin "Degraded Images,
Distorted Sounds: Nigerian Video and the Infrastructure of Piracy,"
*Public Culture* 16.2 (2004): 289--314; Brian Larkin "Pirate
Infrastructures," in *Structures of Participation in Digital
Culture*, ed. Joe Karaganis (New York: SSRC, 2008), 74--87; Susan
Leigh Star and Geoffrey C. Bowker, "How to Infrastructure," in
*Handbook of New Media: Social Shaping and Social Consequences of
ICTs*, (SAGE Publications Ltd, 2010), 230--46.
[[↩](#fnref-2025-32)]{.footnotereverse}]{#fn-2025-32}
33. [For information on cryptographic hashing see Praveen Gauravaram and
Lars R. Knudsen, "Cryptographic Hash Functions," in *Handbook of
Information and Communication Security*, ed. Peter Stavroulakis and
Mark Stamp (Springer Berlin Heidelberg, 2010), 59--79.
[[↩](#fnref-2025-33)]{.footnotereverse}]{#fn-2025-33}
34. [See GIMEL/viewtopic.php?f=8&t=55kj and
GIMEL/vie

 

Display 200 300 400 500 600 700 800 900 1000 ALL characters around the word.