PhD HCC – Core Reading List


  1. Burrell, Gibson, and Gareth Morgan. Sociological paradigms and organisational analysis: Elements of the sociology of corporate life. Routledge, 2017. (Introduction & Section 1)


  1. Rogers, Yvonne. "HCI theory: classical, modern, and contemporary." Synthesis lectures on human-centered informatics 5.2 (2012): 1-129.
  2. Suchman, Lucy A. Plans and situated actions: The problem of human-machine communication. Cambridge university press, 1987. (Chapter 1)


  1. Olson, Judith S., and Wendy A. Kellogg, eds. Ways of Knowing in HCI. Vol. 2. New York, NY, USA:: Springer, 2014.



  1. Haraway, Donna. "Situated knowledges: The science question in feminism and the privilege of partial perspective." Feminist studies 14.3 (1988): 575-599.
  2. Kuhn, Thomas S. "The Structure of Scientific Revolutions." Chicago: University of (2012). (Chapters 2, 3, 9, & 10)
  3. Latour, Bruno and Woolgar, Steve. "Chapter 2. AN ANTHROPOLOGIST VISITS THE LABORATORY". Laboratory Life, edited by Jonas Salk, Princeton: Princeton University Press, 2013, pp. 43-104.

[Book link: ]

  1. Simon, Herbert A. The sciences of the artificial. MIT Press, 2019. (Chapters 1, 5, & 6).
  2. Bijker, Wiebe E. Of bicycles, bakelites, and bulbs: Toward a theory of sociotechnical change. MIT Press, 1997. (Chapters 1 and 2)


UNDERSTANDING ETHNOGRAPHY (see also Dourish Chapter in Ways of Knowing)

  1. Seaver, Nick. "Algorithms as culture: Some tactics for the ethnography of algorithmic systems." Big data & society 4.2 (2017): 2053951717738104.
  2. Star, Susan Leigh, and James R. Griesemer. "Institutional ecology, translations' and boundary objects: Amateurs and professionals in Berkeley's Museum of Vertebrate Zoology, 1907-39." Social studies of science 19.3 (1989): 387-420.
  3. Leigh Star, Susan. "This is not a boundary object: Reflections on the origin of a concept." Science, Technology, & Human Values 35.5 (2010): 601-617.
  4. Vertesi, Janet. "Seamful spaces: Heterogeneous infrastructures in interaction." Science, Technology, & Human Values 39.2 (2014): 264-284.


DESIGN AS METHOD (see also Zimmerman Forlizzi Chapter and Gaver Chapter in Ways of Knowing)

  1. Simonsen, Jesper, and Toni Robertson, Eds. Routledge International Handbook Of Participatory Design. Routledge, 2012 ( Chapter 2, 3, 7)
  2. Wong-Villacres, Marisol, et al. "Culture in Action: Unpacking Capacities to Inform Assets-Based Design." Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 2020.



  1. Blumenthal, Marjory S., and David D. Clark. "Rethinking the design of the internet: the end-to-end arguments vs. the brave new world." ACM Transactions on Internet Technology (TOIT)1.1 (2001): 70-109.
  2. Cowan, Ruth Schwartz. The "Industrial Revolution" In The Home: Household Technology And Social Change In The 20th Century. Technology And Culture (1976): 1-23. 


  1. Joerges, Bernward. "Do politics have artifacts?." Social studies of science 29.3 (1999): 411-431.
  2. Winner, Langdon. The Whale And The Reactor: A Search For Limits In An Age Of High Technology. University Of Chicago Press, 2010. (Chapter 2 "Do Artifacts Have Politics?")
  3. Illich, Ivan. Tools For Conviviality.1973.

[Link: ​​]


ENGAGED SCHOLARSHIP (see also Hayes chapter in Ways of Knowing)

  1. Dimond, Jill P., et al. "Hollaback! The role of storytelling online in a social movement organization." Proceedings of the 2013 conference on Computer supported cooperative work. 2013.
  2. Irani, Lilly C., And M. Six Silberman. "Turkopticon: Interrupting Worker Invisibility In Amazon Mechanical Turk." Proceedings Of The Sigchi Conference On Human Factors In Computing Systems. 2013.
  3. Le Dantec, Christopher A., and Sarah Fox. "Strangers at the gate: Gaining access, building rapport, and co-constructing community-based research." Proceedings of the 18th ACM conference on computer supported cooperative work & social computing. 2015.
  4. Patton, Desmond Upton, et al. "Stop and frisk online: Theorizing everyday racism in digital policing in the use of social media for identification of criminal conduct and associations." Social Media+ Society 3.3 (2017): 2056305117733344.



  1. Bardzell, S. (2010, April). Feminist HCI: Taking Stock And Outlining An Agenda For Design. In Proceedings Of The Sigchi Conference On Human Factors In Computing Systems (Pp. 1301-1310).
  2. Mittelstadt, Brent Daniel, Et Al. "The Ethics Of Algorithms: Mapping The Debate." Big Data & Society 3.2 (2016): 2053951716679679.
  3. Stefancic, Jean, and Richard Delgado. "Critical Race Theory: An Introduction." (2010). Pages 8-14 (Chapter 1)
  4. Brown, Kevin, and Darrell D. Jackson. "The history and conceptual elements of critical race theory." in the Handbook of critical race theory in education. Routledge, 2013.
  5. Swidler, A. (1986). Culture in action: Symbols and strategies. American sociological review, 273-286.
  6. Benjamin R. Race after technology: abolitionist tools for the new Jim code. Medford, MA: Polity, 2019. (Chapter 1 and 5) (Not sure which section to put this in politics or social theory?



  1. Bush, Vannevar. "As we may think." The Atlantic monthly 176.1 (1945): 101-108.
  2. Cowan, Ruth Schwartz. "The" industrial revolution" in the home: Household technology and social change in the 20th century." Technology and culture (1976): 1-23.


Areas Of Practice In HCC @GT


  1. Wilson, Margaret. "Six views of embodied cognition." Psychonomic bulletin & review 9.4 (2002): 625-636.
  2. Goel, Ashok K., and Jim Davies. “Artificial Intelligence” In Cambridge Handbook of Intelligence, RJ Sternberg & SB Kaufman (Editors), 2011.
  3. Goel, Ashok. "Computational design, analogy, and creativity." Computational Creativity. Springer, Cham, 2019. 141-158.
  4. Hutchins, Edwin. "How a cockpit remembers its speeds." Cognitive science 19.3 (1995): 265-288.

Lakoff, George. Women, fire, and dangerous things: What categories reveal about the mind. University of Chicago Press, 2008. (Only Chapter2  "From Wittgenstein To Rosch")  [Link: ]



  1. Ernala, Sindhu Kiranmai, et al. "Methodological gaps in predicting mental health states from social media: triangulating diagnostic signals." Proceedings of the 2019 chi conference on human factors in computing systems. 2019.
  2. Yang, Diyi, et al. "Seekers, providers, welcomers, and storytellers: Modeling social roles in online health communities." Proceedings of the 2019 CHI conference on human factors in computing systems. 2019.
  3. Saksono, Herman, et al. "Family health promotion in low-SES neighborhoods: A two-month study of wearable activity tracking." Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 2018.
  4. Veinot, Tiffany C., Hannah Mitchell, and Jessica S. Ancker. "Good intentions are not enough: how informatics interventions can worsen inequality." Journal of the American Medical Informatics Association 25.8 (2018): 1080-1088.



  1. Duncombe, Richard. "Using the livelihoods framework to analyze ICT applications for poverty reduction through microenterprise." Information Technologies & International Development 3.3 (2006): pp-81.
  2. Heeks, Richard. "ICT4D 2.0: The next phase of applying ICT for international development." Computer 41.6 (2008): 26-33.
  3. Kumar, Rajendra, and Michael L. Best. "Impact and sustainability of e-government services in developing countries: Lessons learned from Tamil Nadu, India." The Information Society 22.1 (2006): 1-12.
  4. Srinivasan, Janaki, and Jenna Burrell. "On the importance of price information to fishers and to economists: Revisiting mobile phone use among fishers in Kerala." Information Technologies & International Development 11.1 (2015): pp-57.



  1. Bransford, John D., Ann L. Brown, and Rodney R. Cocking. How people learn. Vol. 11. Washington, DC: National academy press, 2000. (Only Chapter 2: “How Experts Differ From Novices,” )


  1. Bransford, J. D., and D. L. Schwartz. "Rethinking transfer: A simple proposal with multiple implications (Vol. 24)." Washington DC: American Educational Research Association(1999). [PDF]
  2. Lave, Jean, and Etienne Wenger. Situated learning: Legitimate peripheral participation. Cambridge university press, 1991.

[Link: ]

  1. Greeno, James G., Allan M. Collins, and Lauren B. Resnick. "Cognition and learning." Handbook of educational psychology 77 (1996): 15-46.



SECURITY AND PRIVACY (we will likely add another paper next year)

  1. Acquisti, Alessandro, Laura Brandimarte, and George Loewenstein. "Privacy and human behavior in the age of information." Science 347.6221 (2015): 509-514.
  2. Herley, Cormac. "So long, and no thanks for the externalities: the rational rejection of security advice by users." Proceedings of the 2009 workshop on New security paradigms workshop. 2009.



  1. Bryant, Susan L., Andrea Forte, and Amy Bruckman. "Becoming Wikipedian: transformation of participation in a collaborative online encyclopedia." Proceedings of the 2005 international ACM SIGGROUP conference on Supporting group work. 2005.
  2. Erickson, Thomas, et al. "Social translucence: designing social infrastructures that make collective activity visible." Communications of the ACM 45.4 (2002): 40-44.
  3. Granovetter, Mark S. "The strength of weak ties." American journal of sociology 78.6 (1973): 1360-1380.
  4. Goffman, Erving. The Presentation Of Self In Everyday Life. 1959. (Only Introduction And Chapter 1)

[Link: ]



  1. Abowd, Gregory D. "What next, ubicomp? Celebrating an intellectual disappearing act." Proceedings of the 2012 ACM Conference on Ubiquitous Computing. 2012.
  2. Abowd, Gregory D., and Elizabeth D. Mynatt. "Charting past, present, and future research in ubiquitous computing." ACM Transactions on Computer-Human Interaction (TOCHI) 7.1 (2000): 29-58.
  3. Bell, Genevieve, and Paul Dourish. "Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision." Personal and ubiquitous computing 11.2 (2007): 133-143.
  4. Dourish, Paul, and Scott D. Mainwaring. "Ubicomp's colonial impulse." Proceedings of the 2012 ACM conference on ubiquitous computing. 2012.
  5. Weiser, Mark. "The Computer for the 21 st Century." Scientific American 265.3 (1991): 94-105.



  1. Fekete, Jean-Daniel, et al. "The value of information visualization." In Information Visualization: Human-Centered Issues and Perspectives. Springer, Berlin, Heidelberg, 2008. 1-18.
  2. Wall, Emily, et al. "Warning, bias may occur: A proposed approach to detecting cognitive bias in interactive visual analytics." 2017 IEEE Conference on Visual Analytics Science and Technology (VAST). IEEE, 2017.
  3. Wattenberg, Martin, and Jesse Kriss. "Designing for social data analysis." IEEE transactions on visualization and computer graphics 12.4 (2006): 549-557.