{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:30:36Z","timestamp":1725514236760},"publisher-location":"Berlin, Heidelberg","reference-count":43,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540720362"},{"type":"electronic","value":"9783540720379"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72037-9_11","type":"book-chapter","created":{"date-parts":[[2007,6,21]],"date-time":"2007-06-21T10:15:26Z","timestamp":1182420926000},"page":"180-197","source":"Crossref","is-referenced-by-count":1,"title":["Trust, Privacy and Relationships in \u2018Pervasive Education\u2019: Families\u2019 Views on Homework and Technologies"],"prefix":"10.1007","author":[{"given":"Katie","family":"Fraser","sequence":"first","affiliation":[]},{"given":"Tom","family":"Rodden","sequence":"additional","affiliation":[]},{"given":"Claire","family":"O\u2019Malley","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/978-3-540-39653-6_17","volume-title":"UbiComp 2003: Ubiquitous Computing","author":"A. Crabtree","year":"2003","unstructured":"Crabtree, A., et al.: Finding a Place for UbiComp in the Home. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol.\u00a02864, pp. 208\u2013226. Springer, Heidelberg (2003)"},{"key":"11_CR2","volume-title":"Proceedings of DIS","author":"J. O\u2019Brien","year":"1997","unstructured":"O\u2019Brien, J., Rodden, T.: Interactive systems in domestic environments. In: Proceedings of DIS, Amsterdam, The Netherlands, ACM Press, New York (1997)"},{"key":"11_CR3","volume-title":"Proceedings of CHI","author":"M. Mateas","year":"1996","unstructured":"Mateas, M., et al.: Engineering ethnography in the home. In: Proceedings of CHI, ACM Press, New York (1996)"},{"key":"11_CR4","volume-title":"Proceedings of DIS","author":"J.I. Hong","year":"2004","unstructured":"Hong, J.I., et al.: Privacy risk models for designing privacy-sensitive ubiquitous computing systems. In: Proceedings of DIS, Cambridge, MA, USA, ACM Press, New York (2004)"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45427-6_22","volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"W.K. Edwards","year":"2001","unstructured":"Edwards, W.K., Grinter, R.E.: At home with ubiquitous computing: Seven challenges. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol.\u00a02201, Springer, Heidelberg (2001)"},{"issue":"1","key":"11_CR6","first-page":"29","volume":"7","author":"G.D. Abowd","year":"2000","unstructured":"Abowd, G.D., Mynatt, E.D.: Charting past, present, and future research in ubiquitous computing. ACM Transactions on CHI\u00a07(1), 29\u201358 (2000)","journal-title":"ACM Transactions on CHI"},{"key":"11_CR7","volume-title":"Proceedings of CHI","author":"E.D. Mynatt","year":"2001","unstructured":"Mynatt, E.D., et al.: Digital family portraits: Supporting peace of mind for extended family members. In: Proceedings of CHI, Seattle, WA, USA, ACM Press, New York (2001)"},{"key":"11_CR8","volume-title":"Proceedings of International Conference for Interaction Design and Children","author":"T. Dalsgaard","year":"2006","unstructured":"Dalsgaard, T., et al.: Mediated intimacy in families: Understanding the relation between children and parents. In: Proceedings of International Conference for Interaction Design and Children, Tampere, Finland, ACM Press, New York (2006)"},{"key":"11_CR9","volume-title":"Proceedings of CHI","author":"F. Vetere","year":"2005","unstructured":"Vetere, F., et al.: Mediating intimacy: designing technologies to support strong-tie relationships. In: Proceedings of CHI, ACM Press, New York (2005)"},{"key":"11_CR10","volume-title":"Proceedings of ACM Conference on Universal Usability","author":"E.D. Mynatt","year":"2000","unstructured":"Mynatt, E.D., Irfan, E., Rogers, W.: Increasing the opportunities for aging in place. In: Proceedings of ACM Conference on Universal Usability, Arlington, Virginia, USA, ACM Press, New York (2000)"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","first-page":"107","volume-title":"UbiComp 2004: Ubiquitous Computing","author":"A. LaMarca","year":"2004","unstructured":"LaMarca, A., Consolvo, S., Beckmann, C.: Some Assembly Required: Supporting End-User Sensor Installation in Domestic Ubiquitous Computing Environments. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, vol.\u00a03205, pp. 107\u2013124. Springer, Heidelberg (2004)"},{"key":"11_CR12","unstructured":"Green, H., et al.: Personalisation and digital technologies. Nesta Futurelab, pp. 1\u201329 (2005)"},{"key":"11_CR13","unstructured":"Taylor, J., et al.: An E-learning Research Agenda. EPSRC, ESRC and E-Science, pp. 1\u20139 (2004)"},{"key":"11_CR14","unstructured":"Ainsworth, S., et al.: Cyberinfrastructure for Education and Learning for the Future: A Vision and Research Agenda. In: Bernat, A., Smith, J., Rothschild, D. (eds.) Computing Research Association, pp. 1\u201340 (2005)"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"MacKinnon, K.A., Yoon, S., Andrews, G.: Using \u201cThinking Tags\u201d to improve understanding in science: A genetics simulation. In: Proceedings of CSCL, Boulder, CO, UK (2002)","DOI":"10.3115\/1658616.1658698"},{"key":"11_CR16","volume-title":"Proceedings of ACM Multimedia Conference","author":"A. Mazalek","year":"2002","unstructured":"Mazalek, A., Davenport, G., Ishii, H.: Tangible Viewpoints: A physical approach to multimedia stories. In: Proceedings of ACM Multimedia Conference, Juan-les-Pins, France, ACM Press, New York (2002)"},{"issue":"5","key":"11_CR17","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/s00779-004-0295-6","volume":"8","author":"T. McNerney","year":"2004","unstructured":"McNerney, T.: From Turtles to Tangible Programming Bricks: Explorations in physical language design. Personal and Ubiquitous Computing\u00a08(5), 326\u2013337 (2004)","journal-title":"Personal and Ubiquitous Computing"},{"key":"11_CR18","unstructured":"O\u2019Malley, C., Stanton Fraser, D.: Learning with Tangible Technologies. In: Literature Review Report, Nesta Futurelab, Bristol, UK (2005)"},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/S0953-5438(03)00006-7","volume":"15","author":"S. Price","year":"2003","unstructured":"Price, S., et al.: Using \u2019tangibles\u2019 to promote novel forms of playful learning. Interacting with Computers\u00a015, 169\u2013185 (2003)","journal-title":"Interacting with Computers"},{"key":"11_CR20","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/S0360-1315(99)00044-5","volume":"34","author":"M. Sharples","year":"2000","unstructured":"Sharples, M.: The design of personal mobile technologies for lifelong learning. Computers and Education\u00a034, 177\u2013193 (2000)","journal-title":"Computers and Education"},{"key":"11_CR21","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"publisher","DOI":"10.1007\/11402985_10","volume-title":"Home-Oriented Informatics and Telematics","author":"T. Proctor","year":"2005","unstructured":"Proctor, T.: Data security threats in the home environment. In: Home-Oriented Informatics and Telematics. IFIP International Federation for Information Processing, vol.\u00a0178, Springer, Boston (2005)"},{"issue":"1","key":"11_CR22","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1080\/0958517032000055974","volume":"14","author":"C. Lewin","year":"2003","unstructured":"Lewin, C., Mavers, D., Somekh, B.: Broadening access to the curriculum through using technology to link home and school. The Curriculum Journal\u00a014(1), 23\u201353 (2003)","journal-title":"The Curriculum Journal"},{"key":"11_CR23","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1111\/1467-8330.00239","volume":"34","author":"G. Valentine","year":"2002","unstructured":"Valentine, G., Holloway, S., Bingham, N.: The digital generation?: Children, ICT and the everyday nature of social exclusion. Antipode\u00a034, 296\u2013315 (2002)","journal-title":"Antipode"},{"key":"11_CR24","volume-title":"Proceedings of CHI","author":"L. Palen","year":"2003","unstructured":"Palen, L., Dourish, P.: Unpacking \u2019Privacy\u2019 for a Networked World. In: Proceedings of CHI, Ft. Lauderdale, Florida, ACM Press, New York (2003)"},{"issue":"2","key":"11_CR25","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1080\/713655340","volume":"21","author":"N. Selwyn","year":"2000","unstructured":"Selwyn, N.: The National Grid for Learning: Panacea or Panopticon? British Journal of Sociology of Education\u00a021(2), 243\u2013255 (2000)","journal-title":"British Journal of Sociology of Education"},{"key":"11_CR26","first-page":"125","volume-title":"Improving student learning using learning technology","author":"R. Land","year":"2002","unstructured":"Land, R., Bayne, S.: Screen or monitor? In: Rust, C. (ed.) Improving student learning using learning technology, pp. 125\u2013138. OCSLD, Oxford (2002)"},{"key":"11_CR27","volume-title":"Everyware: The dawning age of ubiquitous computing","author":"A. Greenfield","year":"2006","unstructured":"Greenfield, A.: Everyware: The dawning age of ubiquitous computing. New Riders, Berkeley (2006)"},{"key":"11_CR28","first-page":"1","volume":"22","author":"R. Luckin","year":"2005","unstructured":"Luckin, R., et al.: Using mobile technology to create flexible learning contexts. Journal of Interactive Media in Education\u00a022, 1\u201321 (2005)","journal-title":"Journal of Interactive Media in Education"},{"key":"11_CR29","unstructured":"Hughes, M., et al.: Exchanging knowledge between home and school to enhance children\u2019s learning in literacy and numeracy. In: Proceedings of ERNAPE Conference, Poland (2003)"},{"key":"11_CR30","volume-title":"The transparent society: Will technology force us to choose between privacy and freedom?","author":"D.G. Brin","year":"1998","unstructured":"Brin, D.G.: The transparent society: Will technology force us to choose between privacy and freedom? Perseus Books, Reading (1998)"},{"key":"11_CR31","volume-title":"Proceedings of Symposium On Usable Privacy and Security (SOUPS)","author":"G. Iachello","year":"2005","unstructured":"Iachello, G., et al.: Developing privacy guidelines for social location disclosure applications and services. In: Proceedings of Symposium On Usable Privacy and Security (SOUPS), Pittsburgh, PA, USA, ACM Press, New York (2005)"},{"key":"11_CR32","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1080\/0141192022000005850a","volume":"28","author":"Y. Solomon","year":"2002","unstructured":"Solomon, Y., Warin, J., Lewis, C.: Helping with homework? Homework as a site of tension for parents and teenagers. British Educational Research Journal\u00a028, 603\u2013622 (2002)","journal-title":"British Educational Research Journal"},{"key":"11_CR33","volume-title":"Technology and Privacy: The New Landscape","author":"S.G. Davies","year":"1997","unstructured":"Davies, S.G.: Re-engineering the right to privacy: How privacy has been transformed from a right to a commodity. In: Agre, P.E., Rotenberg, M. (eds.) Technology and Privacy: The New Landscape, The MIT Press, Cambridge (1997)"},{"key":"11_CR34","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1002\/chi.795","volume":"18","author":"E. Such","year":"2004","unstructured":"Such, E., Walker, R.: Being responsible and responsible beings: Children\u2019s understanding of responsibility. Children and Society\u00a018, 231\u2013242 (2004)","journal-title":"Children and Society"},{"issue":"2","key":"11_CR35","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1111\/j.1467-954X.2005.00516.x","volume":"53","author":"S. Williams","year":"2005","unstructured":"Williams, S., Williams, L.: Space invaders: The negotiation of teenage boundaries through the mobile phone. The Sociological Review\u00a053(2), 314 (2005)","journal-title":"The Sociological Review"},{"issue":"4","key":"11_CR36","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1177\/003803850203600409","volume":"36","author":"Y. Solomon","year":"2002","unstructured":"Solomon, Y., et al.: Intimate talk between parents and their children: Democratic Openness or Covert Control. Sociology\u00a036(4), 965\u2013983 (2002)","journal-title":"Sociology"},{"issue":"3","key":"11_CR37","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/BF00749015","volume":"2","author":"L. Suchman","year":"1994","unstructured":"Suchman, L.: Do categories have politics? Computer Supported Cooperative Work\u00a02(3), 177\u2013190 (1994)","journal-title":"Computer Supported Cooperative Work"},{"key":"11_CR38","volume-title":"Learning in doing: Social, cognitive and computational perspectives","author":"L. Suchman","year":"1987","unstructured":"Suchman, L.: Plans and situated actions: The problem of human machine communication. In: Pea, R., Brown, J.S. (eds.) Learning in doing: Social, cognitive and computational perspectives, University of Cambridge Press, Cambridge (1987)"},{"key":"11_CR39","volume-title":"Proceedings of CHI","author":"K. Boehner","year":"2006","unstructured":"Boehner, K., Hancock, J.T.: Advancing Ambiguity. In: Proceedings of CHI, Quebec, Canada, ACM Press, New York (2006)"},{"key":"11_CR40","volume-title":"Proceedings of CHI","author":"P.M. Aoki","year":"2005","unstructured":"Aoki, P.M., Woodruff, A.: Making space for stories: Ambiguity in the design of personal communication systems. In: Proceedings of CHI, Portland, Oregon, USA, ACM Press, New York (2005)"},{"key":"11_CR41","unstructured":"\u2019Student ID badges raise privacy issues\u2019. Fox News (2005), \n                    \n                      http:\/\/www.foxnews.com\/story\/0,2933,149814,00.html\n                    \n                    \n                   Access 14 November 2005"},{"issue":"2","key":"11_CR42","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1145\/1067860.1067868","volume":"12","author":"M. Boyle","year":"2005","unstructured":"Boyle, M., Greenberg, S.: The language of privacy: Learning from video media space analysis and design. ACM Transactions on Computer-Human Interaction\u00a012(2), 328\u2013370 (2005)","journal-title":"ACM Transactions on Computer-Human Interaction"},{"issue":"1","key":"11_CR43","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/291224.291235","volume":"6","author":"B. Gaver","year":"1999","unstructured":"Gaver, B., Dunne, T., Pacenti, E.: Cultural Probes. Interactions\u00a06(1), 21\u201329 (1999)","journal-title":"Interactions"}],"container-title":["Lecture Notes in Computer Science","Pervasive Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72037-9_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:28:39Z","timestamp":1605745719000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72037-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540720362","9783540720379"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72037-9_11","relation":{},"subject":[]}}