Publisher
Springer International Publishing
Reference59 articles.
1. Alavi, S., et al. (2010). Building participation, reciprocity and trust: Netnography of an online community of APPLE using regression analysis for prediction. Apeejay Business Review, 11, 82–96.
2. Alexandrou, A. (2021). Cybercrime and information technology: The computer network infrastructure and computer security, cybersecurity laws, Internet of Things (IoT), and mobile devices. CRC Press (Google-Books-ID: mZhFEAAAQBAJ).
3. Ali, A. H. (2011). The power of social media in developing nations: New tools for closing the global digital divide and beyond note. Harvard Human Rights Journal, 24(1), 185–220.
4. Allmer, T. (2015). Critical theory and social media: Between emancipation and commodification. Routledge. Available from: https://www.taylorfrancis.com/books/mono/10.4324/9781315750491/critical-theory-social-media-thomas-allmer (Accessed 27 June 2022).
5. Aradau, C., et al. (2019). Acts of digital parasitism: Hacking, humanitarian apps and platformisation. New Media & Society, 21(11–12), 2548–2565.