{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T08:00:47Z","timestamp":1776412847740,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540229551","type":"print"},{"value":"9783540301196","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30119-6_25","type":"book-chapter","created":{"date-parts":[[2010,9,18]],"date-time":"2010-09-18T02:30:25Z","timestamp":1284777025000},"page":"418-432","source":"Crossref","is-referenced-by-count":30,"title":["Infrastructures and Their Discontents: Implications for Ubicomp"],"prefix":"10.1007","author":[{"given":"Scott D.","family":"Mainwaring","sequence":"first","affiliation":[]},{"given":"Michele F.","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Ken","family":"Anderson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"25_CR1","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M. Weiser","year":"1991","unstructured":"Weiser, M.: The computer for the 21st century. Scientific American\u00a0265(3), 66\u201375 (1991)","journal-title":"Scientific American"},{"issue":"1","key":"25_CR2","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MPRV.2002.993142","volume":"1","author":"N. Davies","year":"2002","unstructured":"Davies, N., Gellersen, H.-W.: Beyond prototypes: Challenges in deploying ubiquitous systems. IEEE Pervasive Computing\u00a01(1), 26\u201335 (2002)","journal-title":"IEEE Pervasive Computing"},{"issue":"4","key":"25_CR3","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/98.943998","volume":"8","author":"M. Satyanarayanan","year":"2001","unstructured":"Satyanarayanan, M.: Pervasive computing: Vision and challenges. IEEE Personal Communications\u00a08(4), 10\u201317 (2001)","journal-title":"IEEE Personal Communications"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Tolmie, P., Pycock, J., Diggins, T., MacLean, A., Karsenty, A.: Ubiquity: Unremarkable computing. In: Proceedings of the CHI (2002)","DOI":"10.1145\/503447.503448"},{"issue":"5","key":"25_CR5","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/203356.203368","volume":"38","author":"F. Brun-Cottan","year":"1995","unstructured":"Brun-Cottan, F., Wall, P.: Using video to re-present the user. Communications of the ACM\u00a038(5), 61\u201371 (1995)","journal-title":"Communications of the ACM"},{"key":"25_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-540-39653-6_17","volume-title":"UbiComp 2003: Ubiquitous Computing","author":"A. Crabtree","year":"2003","unstructured":"Crabtree, A., Rodden, T., Hemmings, T., Benford, S.: Finding a place for UbiComp in the home. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol.\u00a02864, pp. 208\u2013226. Springer, Heidelberg (2003)"},{"key":"25_CR7","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1037\/h0061470","volume":"51","author":"J.C. Flanagan","year":"1954","unstructured":"Flanagan, J.C.: The critical incident technique. Psychological Bulletin\u00a051, 327\u2013358 (1954)","journal-title":"Psychological Bulletin"},{"issue":"3","key":"25_CR8","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1177\/00027649921955326","volume":"43","author":"S.L. Star","year":"1999","unstructured":"Star, S.L.: The ethnography of infrastructure. American Behavioral Scientist\u00a043(3), 377\u2013391 (1999)","journal-title":"American Behavioral Scientist"},{"issue":"2","key":"25_CR9","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s007790170014","volume":"5","author":"L. Palen","year":"2001","unstructured":"Palen, L., Salzman, M., Youngs, E.: Discovery and integration of mobile communications in everyday life. Personal and Ubiquitous Computing\u00a05(2), 109\u2013122 (2001)","journal-title":"Personal and Ubiquitous Computing"},{"key":"25_CR10","unstructured":"Lally, E.: At home with computers. Berg (2002)"},{"key":"25_CR11","unstructured":"Bielick, S., Chandler, K., Broughman, S.: Homeschooling in the United States: 1999. National Center for Education Statistics (2001)"},{"key":"25_CR12","doi-asserted-by":"crossref","DOI":"10.1515\/9781400824809","volume-title":"Kingdom of children: Culture and controversy in the homeschooling movement","author":"M. Stevens","year":"2001","unstructured":"Stevens, M.: Kingdom of children: Culture and controversy in the homeschooling movement. Princeton University Press, Princeton (2001)"},{"key":"25_CR13","volume-title":"Behind the gates: Life, security and the pursuit of happiness in fortress America","author":"S.M. Low","year":"2003","unstructured":"Low, S.M.: Behind the gates: Life, security and the pursuit of happiness in fortress America. Routledge, New York (2003)"},{"key":"25_CR14","unstructured":"Blakely, E.J., Snyder, M.G.: Fortress America: Gated communities in the United States. The Brookings Institution (1997)"},{"key":"25_CR15","volume-title":"Homeowner associations and the rise of residential private government","author":"E.P. McKenzie","year":"1996","unstructured":"McKenzie, E.P.: Homeowner associations and the rise of residential private government. Yale University Press, New Haven (1996)"},{"key":"25_CR16","unstructured":"Elgin, D.: Voluntary simplicity: Toward a way of life that is outwardly simple, inwardly rich. Quill (1998)"},{"key":"25_CR17","unstructured":"Giddens, A.: The consequences of modernity. Polity Press\/Stanford University Press (1990)"},{"key":"25_CR18","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/6352.001.0001","volume-title":"Sorting things out: Classification and its consequences","author":"G.C. Bowker","year":"1999","unstructured":"Bowker, G.C., Star, S.L.: Sorting things out: Classification and its consequences. MIT Press, Cambridge (1999)"},{"issue":"1","key":"25_CR19","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1287\/isre.7.1.111","volume":"7","author":"S.L. Star","year":"1996","unstructured":"Star, S.L., Ruhleder, K.: Steps toward an ecology of infrastructure: Design and access for large information spaces. Information Systems Research\u00a07(1), 111\u2013134 (1996)","journal-title":"Information Systems Research"},{"key":"25_CR20","first-page":"125","volume-title":"Modernity and self-identity: Self and society in the late modern age","author":"A. Giddens","year":"1991","unstructured":"Giddens, A.: Modernity and self-identity: Self and society in the late modern age, p. 125. Stanford University Press, Stanford (1991)"},{"key":"25_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/3-540-45427-6_22","volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"W.K. Edwards","year":"2001","unstructured":"Edwards, W.K., Grinter, R.E.: At home with ubiquitous computing: Seven challenges. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol.\u00a02201, pp. 256\u2013272. Springer, Heidelberg (2001)"},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Rodden, T., Benford, S.: Domesticated design: The evolution of buildings and implications for the design of ubiquitous domestic environments. In: Proceedings of CHI 2003 (2003)","DOI":"10.1145\/642611.642615"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Schilit, B., LaMarca, A., Borriello, B., Griswold, W., McDonald, D., Lazowska, E., Bala-chandran, A., Hong, J., Iverson, V.: Challenge: Ubiquitous location-aware computing and the Place Lab initiative. In: Proceedings of The First ACM International Workshop on Wireless Mobile Applications and Services on WLAN, WMASH 2003 (2003)","DOI":"10.1145\/941326.941331"},{"issue":"5","key":"25_CR24","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1145\/769800.769825","volume":"46","author":"T. Schmidt","year":"2003","unstructured":"Schmidt, T., Townsend, A.: Why Wi-Fi wants to be free. CACM\u00a046(5), 47\u201352 (2003)","journal-title":"CACM"},{"key":"25_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-540-39653-6_18","volume-title":"UbiComp 2003: Ubiquitous Computing","author":"M. Morris","year":"2003","unstructured":"Morris, M., Lundell, J., Dishman, E., Needham, B.: New perspectives on ubiquitous computing from ethnographic study of elders with cognitive decline. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol.\u00a02864, pp. 227\u2013242. Springer, Heidelberg (2003)"},{"key":"25_CR26","unstructured":"Hirsch, T., Csikszentmih\u00e1lyi, C.: Sensible Cities Project, http:\/\/www.media.mit.edu\/research\/ResearchPubWeb.pl?ID=55"},{"key":"25_CR27","doi-asserted-by":"crossref","unstructured":"Palen, L., Dourish, P.: Unpacking \u201cprivacy\u201d for a networked world. In: Proceedings of CHI 2003 (2003)","DOI":"10.1145\/642611.642635"},{"key":"25_CR28","doi-asserted-by":"crossref","unstructured":"Bellotti, V., Back, M., Edwards, W.K., Grinter, R.E., Henderson, A., Lopes, C.: Making sense of sensing systems: Five questions for designers and researchers. In: Proceedings of the CHI 2002 (2002)","DOI":"10.1145\/503376.503450"},{"key":"25_CR29","doi-asserted-by":"crossref","unstructured":"Weiser, M., Brown, J.S.: The coming age of calm technology. In: Beyond calculation: The next fixty years (1997)","DOI":"10.1007\/978-1-4612-0685-9_6"},{"key":"25_CR30","unstructured":"Garfinkle, H.: The conception of, and experiments with, \u201ctrust\u201d as a condition of stable and concerted actions. In: Harvey, O.J. (ed.) Motivation and social interaction, Ronald Press (1963)"}],"container-title":["Lecture Notes in Computer Science","UbiComp 2004: Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30119-6_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T22:22:37Z","timestamp":1740522157000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30119-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540229551","9783540301196"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30119-6_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}