default search action
Morgan G. Ames
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Morgan Ames, Ekaterina Babintseva, Xiaochang Li, Colette Perold, Gili Vidan:
Notes From the 2024 SIGCIS Meeting: System Update: Patches, Tactics, Responses. IEEE Ann. Hist. Comput. 46(3): 94-95 (2024) - [c21]Beatrice Fadrigon, Princess Gordon, Jane Lupica, Morgan G. Ames:
A Playbook to be Proud of: Making the Case for LGBTQ+ Inclusive User Account Design. CHI 2024: 505:1-505:22 - 2023
- [j9]Gillian R. Hayes, Candice L. Odgers, Julie A. Kientz, Jason C. Yip, Kiley Sobel, Morgan Ames, Anamara Ritt Olson:
Codesign and the Art of Creating a Global Research-Practice Network Built for Impact. Interactions 30(2): 6-9 (2023) - [e2]Casey Fiesler, Loren G. Terveen, Morgan Ames, Susan R. Fussell, Eric Gilbert, Vera Liao, Xiaojuan Ma, Xinru Page, Mark Rouncefield, Vivek Singh, Pamela J. Wisniewski:
Computer Supported Cooperative Work and Social Computing, CSCW 2023, Minneapolis, MN, USA, October 14-18, 2023. ACM 2023 [contents] - 2022
- [e1]Gary Hsieh, Anthony Tang, Morgan G. Ames, Sharon Ding, Susan R. Fussell, Vera Liao, Andrés Monroy-Hernández, Sean Munson, Irina Shklovski, John Tang:
Companion Computer Supported Cooperative Work and Social Computing, CSCW 2022, Virtual Event, Taiwan, November 8-22, 2022. ACM 2022, ISBN 978-1-4503-9190-0 [contents] - 2020
- [c20]Nora McDonald, Karla A. Badillo-Urquiola, Morgan G. Ames, Nicola Dell, Elizabeth Keneski, Manya Sleeper, Pamela J. Wisniewski:
Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations. CHI Extended Abstracts 2020: 1-8
2010 – 2019
- 2018
- [j8]Morgan G. Ames:
Deconstructing the algorithmic sublime. Big Data Soc. 5(1): 205395171877919 (2018) - [j7]Morgan G. Ames:
Hackers, Computers, and Cooperation: A Critical History of Logo and Constructionist Learning. Proc. ACM Hum. Comput. Interact. 2(CSCW): 18:1-18:19 (2018) - [c19]Michaelanne Dye, Neha Kumar, Ari Schlesinger, Marisol Wong-Villacres, Morgan G. Ames, Rajesh Veeraraghavan, Jacki O'Neill, Joyojeet Pal, Mary L. Gray:
Solidarity Across Borders: Navigating Intersections Towards Equity and Inclusion. CSCW Companion 2018: 487-494 - 2017
- [j6]Janaki Srinivasan, Megan Finn, Morgan Ames:
Information determinism: The consequences of the faith in information. Inf. Soc. 33(1): 13-22 (2017) - [c18]Morgan G. Ames, Jenna Burrell:
'Connected Learning' and the Equity Agenda: A Microsociology of Minecraft Play. CSCW 2017: 446-457 - 2016
- [j5]Morgan G. Ames:
Learning consumption: Media, literacy, and the legacy of One Laptop per Child. Inf. Soc. 32(2): 85-97 (2016) - 2015
- [j4]Eric P. S. Baumer, Morgan G. Ames, Jenna Burrell, Jed R. Brubaker, Paul Dourish:
Why study technology non-use? First Monday 20(11) (2015) - [j3]Eric P. S. Baumer, Jenna Burrell, Morgan G. Ames, Jed R. Brubaker, Paul Dourish:
On the importance and implications of studying technology non-use. Interactions 22(2): 52-56 (2015) - [c17]Morgan G. Ames:
Charismatic technology. Aarhus Conference on Critical Alternatives 2015: 109-120 - [c16]Morgan G. Ames, Barry A. T. Brown, Sidney S. Fels, Silvia Lindtner, Daniela K. Rosner, Roel Vertegaal:
10 Years of alt.chi: Reflections and Outlook. CHI Extended Abstracts 2015: 839 - [c15]Morgan G. Ames, Daniela K. Rosner, Ingrid Erickson:
Worship, Faith, and Evangelism: Religion as an Ideological Lens for Engineering Worlds. CSCW 2015: 69-81 - 2014
- [c14]Eric P. S. Baumer, Morgan G. Ames, Jed R. Brubaker, Jenna Burrell, Paul Dourish:
Refusing, limiting, departing: why we should study technology non-use. CHI Extended Abstracts 2014: 65-68 - [c13]Morgan G. Ames, Jeffrey Bardzell, Shaowen Bardzell, Silvia Lindtner, David A. Mellis, Daniela K. Rosner:
Making cultures: empowerment, participation, and democracy - or not? CHI Extended Abstracts 2014: 1087-1092 - [c12]Daniela K. Rosner, Morgan G. Ames:
Designing for repair?: infrastructures and materialities of breakdown. CSCW 2014: 319-331 - 2013
- [c11]Morgan G. Ames:
Managing mobile multitasking: the culture of iPhones on stanford campus. CSCW 2013: 1487-1498 - 2012
- [c10]Susan Wyche, Elisa Oreglia, Morgan G. Ames, Christopher Hoadley, Aditya Johri, Phoebe Sengers, Charles Steinfield:
Learning from marginalized users: reciprocity in HCI4D. CSCW (Companion) 2012: 27-28 - 2011
- [c9]Morgan G. Ames, Janet Go, Joseph Kaye, Mirjana Spasojevic:
Understanding technology choices and values through social class. CSCW 2011: 55-64 - 2010
- [j2]Rafael Ballagas, Hayes Raffle, Janet Go, Glenda Revelle, Joseph Kaye, Morgan Ames, Hiroshi Horii, Koichi Mori, Mirjana Spasojevic:
Story Time for the 21st Century. IEEE Pervasive Comput. 9(3): 28-36 (2010) - [j1]Morgan Ames, Dean Eckles, Mor Naaman, Mirjana Spasojevic, Nancy A. Van House:
Requirements for mobile photoware. Pers. Ubiquitous Comput. 14(2): 95-109 (2010) - [c8]Morgan G. Ames, Janet Go, Joseph Kaye, Mirjana Spasojevic:
Making love in the network closet: the benefits and work of family videochat. CSCW 2010: 145-154
2000 – 2009
- 2009
- [c7]Rafael Ballagas, Joseph Kaye, Morgan G. Ames, Janet Go, Hayes Raffle:
Family communication: phone conversations with children. IDC 2009: 321-324 - 2007
- [c6]Morgan Ames, Mor Naaman:
Why we tag: motivations for annotation in mobile and online media. CHI 2007: 971-980 - 2006
- [c5]Morgan Ames, Lilia Manguy:
PhotoArcs: a tool for creating and sharing photo-narratives. CHI Extended Abstracts 2006: 466-471 - [c4]Morgan Ames, Lilia Manguy:
PhotoArcs: Ludic tools for sharing photographs. ACM Multimedia 2006: 615-618 - 2005
- [c3]Nancy A. Van House, Marc Davis, Morgan Ames, Megan Finn, Vijay Viswanathan:
The uses of personal networked digital imaging: an empirical study of cameraphone photos and sharing. CHI Extended Abstracts 2005: 1853-1856 - 2004
- [c2]A. J. Bernheim Brush, Morgan Ames, Janet Davis:
A comparison of synchronous remote and local usability studies for an expert interface. CHI Extended Abstracts 2004: 1179-1182 - 2003
- [c1]Jennifer Mankoff, Anind K. Dey, Gary Hsieh, Julie A. Kientz, Scott Lederer, Morgan Ames:
Heuristic evaluation of ambient displays. CHI 2003: 169-176
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint