{"c2479ddae2366a3501bd67e81848a3a0droessler":{"DOI":"","ISBN":"","ISSN":"","URL":"http://www.jstor.org/stable/jj.11895528","abstract":"Algorithms have risen to become one, if not the central technology for producing, circulating, and evaluating knowledge in multiple societal arenas. In this book, scholars from the social sciences, humanities, and computer science argue that this shift has, and will continue to have, profound implications for how knowledge is produced and what and whose knowledge is valued and deemed valid. To attend to this fundamental change, the authors propose the concept of algorithmic regimes and demonstrate how they transform the epistemological, methodological, and political foundations of knowledge production, sensemaking, and decision-making in contemporary societies. Across sixteen chapters, the volume offers a diverse collection of contributions along three perspectives on algorithmic regimes: the methods necessary to research and design algorithmic regimes, the ways in which algorithmic regimes reconfigure sociotechnical interactions, and the politics engrained in algorithmic regimes.","annote":"","author":[{"family":"Jarke","given":"Juliane"},{"family":"Prietl","given":"Bianca"},{"family":"Egbert","given":"Simon"},{"family":"Boeva","given":"Yana"},{"family":"Heuer","given":"Hendrik"},{"family":"Arnold","given":"Maike"}],"citation-label":"jarke2024algorithmic","collection-editor":[],"collection-title":"","container-author":[],"container-title":"","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2024"]],"literal":"2024"},"event-place":"","id":"c2479ddae2366a3501bd67e81848a3a0droessler","interhash":"be0a94e5352aa7c8d26aa7014a9122fe","intrahash":"c2479ddae2366a3501bd67e81848a3a0","issue":"","issued":{"date-parts":[["2024"]],"literal":"2024"},"keyword":"algorithm algorithmen communication computer macht politik science","misc":{"urldate":"2024-07-08"},"note":"","number":"","page":"","page-first":"","publisher":"Amsterdam University Press","publisher-place":"","status":"","title":"Algorithmic Regimes: Methods, Interactions, and Politics","username":"droessler","version":"","volume":""},"20ed412086ede754668bc27dda71570ddroessler":{"DOI":"","ISBN":"9781484251492","ISSN":"","URL":"http://dx.doi.org/10.1007/978-1-4842-5149-2","abstract":"1: The Beginner's Guide to Markdown and Pandoc -- 2: Why Use Markdown and Pandoc -- 3: Writing Markdown -- 4: Pandoc Markdown Extensions -- 5: Translating Documents -- 6: Math and Computer Programming Languages -- 7: Cross-referencing -- 8: Metadata -- 9: Using Templates -- 10: Preprocessing -- 11: Filters -- 12: Conclusions","annote":"","author":[{"family":"Mailund","given":"Thomas"}],"citation-label":"mailund2019introducing","collection-editor":[],"collection-title":"Springer eBooks. Professional and Applied Computing","container-author":[],"container-title":"","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019"]],"literal":"2019"},"event-place":"New York","id":"20ed412086ede754668bc27dda71570ddroessler","interhash":"d29bf5bb39fc7d90398a5cb1a87497b2","intrahash":"20ed412086ede754668bc27dda71570d","issue":"","issued":{"date-parts":[["2019"]],"literal":"2019"},"keyword":"Compilers Computer Interpreters Languages Open Programming markdown pandoc programming science scientific software source writing","misc":{"isbn":"9781484251492","language":"Englisch"},"note":"1 Online-Ressource (IX, 139 Seiten)","number":"","page":"","page-first":"","publisher":"Apress","publisher-place":"New York","status":"","title":"Introducing Markdown and Pandoc: using Markup Language and Document Converter","type":"book","username":"droessler","version":"","volume":""},"775a85e41d798f3dd24162e6fc965621droessler":{"DOI":"","ISBN":"9783319237961","ISSN":"","URL":"http://swbplus.bsz-bw.de/bsz461145707cov.htm","abstract":"","annote":"","author":[{"family":"Grätzer","given":"George"}],"citation-label":"graetzer2016latex","collection-editor":[],"collection-title":"SpringerLink. Bücher","container-author":[],"container-title":"","documents":[],"edition":"5th ed. 2016","editor":[],"event-date":{"date-parts":[["2016"]],"literal":"2016"},"event-place":"Cham","id":"775a85e41d798f3dd24162e6fc965621droessler","interhash":"745b3dfa9f708b8196d855347999fe36","intrahash":"775a85e41d798f3dd24162e6fc965621","issue":"","issued":{"date-parts":[["2016"]],"literal":"2016"},"keyword":"Computer Mathematics englisch latex latex-kurs mathematik schreiben science wissenschaftliches","misc":{"isbn":"9783319237961","language":"Englisch"},"note":"Online-Ressource (XXX, 609 p. 76 illus., 23 illus. in color, online resource)","number":"","page":"","page-first":"","publisher":"Springer","publisher-place":"Cham","status":"","title":"More Math Into LaTeX","type":"book","username":"droessler","version":"","volume":""},"c88eb3ee8131d3b59ae26da22f478b81droessler":{"DOI":"","ISBN":"","ISSN":"","URL":"https://www.zeit.de/campus/2019-12/cyberangriff-giessen-justus-liebig-universitaet-internet-offline/komplettansicht?print","abstract":"","annote":"","author":[{"family":"Baum","given":"Carla"}],"citation-label":"baum2019cyberangriff","collection-editor":[],"collection-title":"","container-author":[],"container-title":"ZEIT online","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019","12","17"]],"literal":"2019"},"event-place":"","id":"c88eb3ee8131d3b59ae26da22f478b81droessler","interhash":"964355ace7a3cdd9ec57bb631ccce1e2","intrahash":"c88eb3ee8131d3b59ae26da22f478b81","issue":"","issued":{"date-parts":[["2019","12","17"]],"literal":"2019"},"keyword":"cloud computer cyberangriff cybercrime giesen gießen hacker hessenbox it-sicherheit sicherheit software uni","note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Cyberangriff: Gießen ist off","type":"article-journal","username":"droessler","version":"","volume":""},"686d595ee1375c91097b0ba2adf4ff9ddroessler":{"DOI":"","ISBN":"","ISSN":"","URL":"https://www.sueddeutsche.de/digital/sichere-passwoerter-jikaua-1.4355234","abstract":"","annote":"","author":[{"family":"Hurtz","given":"Simon"}],"citation-label":"hurtz2019itsicherheit","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Süddeutsche Zeitung","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2019","03","05"]],"literal":"2019"},"event-place":"","id":"686d595ee1375c91097b0ba2adf4ff9ddroessler","interhash":"f8ab3b2dbd8c9b582ec76e7c2d208ac5","intrahash":"686d595ee1375c91097b0ba2adf4ff9d","issue":"","issued":{"date-parts":[["2019","03","05"]],"literal":"2019"},"keyword":"computer internet it it-sicherheit passwort passwörter sicherheit verschlüsselung","note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"IT-Sicherheit: Sogar \"ji32k7au4a83\" ist ein mieses Passwort","type":"article-journal","username":"droessler","version":"","volume":""},"bef4ffe7c29508947206d8e2018b83a4droessler":{"DOI":"","ISBN":"","ISSN":"","URL":"http://www.faz.net/aktuell/feuilleton/hoch-schule/niklas-luhmann-macht-der-computer-die-gesellschaft-unsichtbar-15217893.html?printPagedArticle=true#void","abstract":"Vor zwanzig Jahren schrieb Niklas Luhmann mit „Die Gesellschaft der Gesellschaft“ das Opus Magnum der Systemtheorie. Leben wir heute noch in der funktional differenzierten Sozialform, die er dort beschrieb?","annote":"","author":[{"family":"Wagner","given":"Gerald"}],"citation-label":"wagner2018niklas","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Frankfurter Allgemeine","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2018","05","07"]],"literal":"2018"},"event-place":"","id":"bef4ffe7c29508947206d8e2018b83a4droessler","interhash":"bfc349704d3a634c25ff45f81d3adc81","intrahash":"bef4ffe7c29508947206d8e2018b83a4","issue":"","issued":{"date-parts":[["2018","05","07"]],"literal":"2018"},"keyword":"computer gesellschaft luhmann soziologie","note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Niklas Luhmanns Aktualität : Macht der Computer die Gesellschaft unsichtbar?","type":"article-journal","username":"droessler","version":"","volume":""},"3baccbb4c6821be7be734ad05c7a48dfdroessler":{"DOI":"","ISBN":"","ISSN":"","URL":"http://www.sueddeutsche.de/digital/2.220/it-sicherheit-warum-es-keine-gute-idee-ist-passwoerter-regelmaessig-zu-aendern-1.3106648","abstract":"","annote":"","author":[{"family":"Hurtz","given":"Simon"}],"citation-label":"Hurtz2016","collection-editor":[],"collection-title":"","container-author":[],"container-title":"Süddeutsche Zeitung","documents":[],"edition":"","editor":[],"event-date":{"date-parts":[["2016","08","03"]],"literal":"2016"},"event-place":"","id":"3baccbb4c6821be7be734ad05c7a48dfdroessler","interhash":"eba9b6a7301d3a60d084a379785454f5","intrahash":"3baccbb4c6821be7be734ad05c7a48df","issue":"","issued":{"date-parts":[["2016","08","03"]],"literal":"2016"},"keyword":"computer datensicherheit internet passwort passwörter sicherheit software","misc":{"timestamp":"2016-08-03 11:45:26","username":"droessler","intrahash":"3baccbb4c6821be7be734ad05c7a48df","file":":2016-08-03_passwörter.pdf:PDF","interhash":"eba9b6a7301d3a60d084a379785454f5","groups":"public"},"note":"","number":"","page":"","page-first":"","publisher":"","publisher-place":"","status":"","title":"Warum es keine gute Idee ist, Passwörter regelmäßig zu ändern","type":"article-journal","username":"droessler","version":"","volume":""}}