Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Hemphill, Libby
add a person with the name Hemphill, Libby
 

Other publications of authors with the same name

Different Voices, Similar Perspectives? Üseful" Reviews at the International Movie Database., , and . AMCIS, Association for Information Systems, (2013)How to Handle Online Risks?: Discussing Content Curation and Moderation in Social Media., , , , and . CHI Extended Abstracts, page 1271-1276. ACM, (2017)The craft and coordination of data curation: complicating "workflow" views of data science., , , , , , , and . CoRR, (2022)Human-machine reconfigurations: Plans and situated actions, 2nd ed.. J. Assoc. Inf. Sci. Technol., 58 (14): 2404-2405 (2007)Fostering cooperative community behavior with IT tools: the influence of a designed deliberative space on efforts to address collective challenges., , and . J. Community Informatics, (2013)A Just and Comprehensive Strategy for Using NLP to Address Online Abuse., , and . ACL (1), page 3658-3666. Association for Computational Linguistics, (2019)What's congress doing on twitter?, , and . CSCW, page 877-886. ACM, (2013)Tweet acts: how constituents lobby congress via Twitter., and . CSCW, page 1200-1210. ACM, (2014)Quantifying Toxicity and Verbal Violence on Twitter., , and . CSCW Companion, page 277-280. ACM, (2016)Asian American Chicago Network: A Case Study of Facebook Group Use By Immigrant Groups., and . CSCW Companion, page 381-384. ACM, (2016)