This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Computers, Information, and Everyday Life
Oct.-Dec. 2013 (vol. 35 no. 4)
pp. 96
William Aspray, Univ. of Texas at Austin, Austin, TX, USA
One way to view the literature on the history of computing is to consider the function of the computing device that comes under historical investigation. However, new uses of computers supplement rather than supplant old uses of computers. For example, we still have scientific calculators, business database machines, and personal computers in the modern era. This article focuses on the computer as a personal machine as a device to gather information through email and Web searches, and hence the focus is on the period starting in the early 1990s and carrying forward to the present. Historians of computing are typically focused on information technology (including its uses), while information science scholars often focus instead on information and its organization, even if information technology plays an important supporting role. The particular concern in this case study is everyday information-seeking behavior, or everyday information for short.
Index Terms:
social aspects of automation,electronic mail,information management,information science,Internet,information-seeking behavior,computing history,computing device function,historical investigation,scientific calculators,business database machines,personal computers,information gathering,email,electronic mail,Web searches,information technology,information science,information organization,History,Information retrieval,Information technology,Search engines,Search methods,everyday information,History,Information retrieval,Information technology,Search engines,Search methods,information search,history of computing,information seeking,information technology,information and communications technology
Citation:
William Aspray, "Computers, Information, and Everyday Life," IEEE Annals of the History of Computing, vol. 35, no. 4, pp. 96, Oct.-Dec. 2013, doi:10.1109/MAHC.2013.46
Usage of this product signifies your acceptance of the Terms of Use.