Author of the publication

The Intersection of Public Policy and Public Access: Digital Divides, Digital Literacy, Digital Inclusion, and Public Libraries

, , , , and . Public Library Quarterly, 31 (1): 1--20 (January 2012)
DOI: 10.1080/01616846.2012.654728

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The policy challenges of universally usable e-government., , , , and . DG.O, page 365-366. Digital Government Research Center, (2011)Delivering e-government services through innovative partnerships: public libraries, government agencies, and community organizations., , , , and . DG.O, page 126-134. ACM, (2012)The AT Effect: How Disability Affects the Perceived Social Acceptability of Head-Mounted Display Use., , , , and . CHI, page 4884-4895. ACM, (2016)Developing multi-method, iterative, and user-centered evaluation strategies for digital libraries: Functionality, usability, and accessibility., , , and . ASIST, volume 42 of Proc. Assoc. Inf. Sci. Technol., Wiley, (2005)Human dimensions of peer review in information science., , and . ASIST, volume 54 of Proc. Assoc. Inf. Sci. Technol., page 645-646. Wiley, (2017)Crowd-sourcing transparency: ICTs, social media, and government transparency initiatives., , and . DG.O, page 51-58. Digital Government Research Center, (2010)Responsibility Rolls Down: Public Libraries and the Social and Policy Obligations of Ensuring Access to E-government and Government Information, and . Public Library Quarterly, 30 (2): 91--116 (April 2011)The circular continuum of agencies, libraries, and users: a model of e-government in practice., , , , , and . ICEGOV, page 87-94. ACM, (2012)Promoting social inclusion through public library e-government partnerships., and . iConference, page 395-401. ACM, (2011)Identifying the security risks associated with governmental use of cloud computing., , and . Gov. Inf. Q., 27 (3): 245-253 (2010)