Abstract
Chapter 4 demonstrates design and appropriation by way of case examples ranging from explicit participation (game console hacking) to implicit user participation in information management processes. These cases illustrate to what extent computer technology and software, in tandem with the Internet, create the possibility of countless concatenations between the various
... read more