Abstract
Chapter 4 demonstrates design and appropriation by way of case examples ranging from explicit participation (game console hacking) to implicit user
participation in information management processes. These cases illustrate to
what extent computer technology and software, in tandem with the Internet,
create the possibility of countless concatenations between the various actors
involved. This chapter
... read more