{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:50:21Z","timestamp":1760043021783},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,1,16]],"date-time":"2010-01-16T00:00:00Z","timestamp":1263600000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1007\/s00779-009-0257-0","type":"journal-article","created":{"date-parts":[[2010,1,15]],"date-time":"2010-01-15T12:19:19Z","timestamp":1263557959000},"page":"227-236","source":"Crossref","is-referenced-by-count":4,"title":["Designing for social interaction with mundane technologies: issues of security and trust"],"prefix":"10.1007","volume":"14","author":[{"given":"Sara","family":"Bury","sequence":"first","affiliation":[]},{"given":"Johnathan","family":"Ishmael","sequence":"additional","affiliation":[]},{"given":"Nicholas J. P.","family":"Race","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Smith","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,1,16]]},"reference":[{"key":"257_CR1","unstructured":"Agre P (1999) Rethinking networks and communities in a wired society. American Society for Information Science, Pasadena, May 1999"},{"key":"257_CR2","doi-asserted-by":"crossref","unstructured":"Alberts C, Behrens S, Pethia R, Wilson W (1999) Operationally critical threat, asset, and vulnerability evaluation framework, version 1.0. Technical Report CMU\/SEI-99-TR-017, Carnegie Mellon University, June 1999","DOI":"10.21236\/ADA367718"},{"key":"257_CR3","unstructured":"Anderson J (2008) What is the LocustWorld Meshbox? http:\/\/www.locustworld.com\/overview.php"},{"key":"257_CR4","unstructured":"Annison L (2006) JFDI Community broadband: Wennington. Digital Dales Ltd, November 2006"},{"key":"257_CR5","unstructured":"Bauman Z (2001) Community: seeking safety in an insecure world. Polity, London"},{"key":"257_CR6","first-page":"235","volume":"59","author":"H Becker","year":"1953","unstructured":"Becker H (1953) Becoming a marihuana user\u2019. J Sociol 59:235\u2013242","journal-title":"J Sociol"},{"key":"257_CR7","doi-asserted-by":"crossref","unstructured":"Besnard D, Arief B (2004) Computer security impaired by legitimate users. Comput Secur 23(3):253\u2013264","DOI":"10.1016\/j.cose.2003.09.002"},{"key":"257_CR8","volume-title":"Technology and the character of contemporary life","author":"A Borgmann","year":"1984","unstructured":"Borgmann A (1984) Technology and the character of contemporary life. University of Chicago Press, Chicago"},{"key":"257_CR9","volume-title":"The information age: economy, society and culture","author":"M Castells","year":"2000","unstructured":"Castells M (2000) The information age: economy, society and culture. Blackwell, Oxford"},{"issue":"1","key":"257_CR10","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1080\/000713100358408","volume":"51","author":"M Castells","year":"2000","unstructured":"Castells M (2000) Materials for an exploratory theory of the network society. Br J Sociol 51(1):5\u201324","journal-title":"Br J Sociol"},{"key":"257_CR11","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1207\/s15327051hci2103_2","volume":"21","author":"P Dourish","year":"2006","unstructured":"Dourish P, Anderson K (2006) Collective information practice: exploring privacy and security as social and cultural phenomena. Hum Comput Interact 21:319\u2013342","journal-title":"Hum Comput Interact"},{"issue":"6","key":"257_CR12","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s00779-003-0253-8","volume":"8","author":"P Dourish","year":"2004","unstructured":"Dourish P, Grinter R, Delgado de la Flor J, Jospeh M (2004) Security in the wild: user strategies for managing security as an everyday, practical problem. Pers Ubiquitous Comput 8(6):19\u201330","journal-title":"Pers Ubiquitous Comput"},{"key":"257_CR13","doi-asserted-by":"crossref","unstructured":"Edwards W, Poole E, Stoll J (2007) Security automation considered harmful? In: Proceedings of the IEEE new security paradigms workshop (NSPW 2007), White Mountain, New Hampshire, September 18\u201321, 2007","DOI":"10.1145\/1600176.1600182"},{"key":"257_CR14","unstructured":"Fleck J (1988) Innofusion or diffusation? The nature of technological development in robotics. Edinburgh PICT working paper no. 7. Edinburgh University, Edinburgh"},{"key":"257_CR15","unstructured":"Fleck J (1988) Innofusion or diffusation: the nature of technological development in robotics. Edinburgh PICT working paper no. 4. Edinburgh University, Edinburgh"},{"key":"257_CR16","doi-asserted-by":"crossref","unstructured":"Friedman B, Hurley D, Howe DC, Felten E, Nissenbaum H (2002) Users\u2019 conceptions of web security: a comparative study. In: Proceedings of CHI 2002, Minneapolis, Minnesota, 2002, pp 746\u2013747","DOI":"10.1145\/506443.506577"},{"key":"257_CR17","doi-asserted-by":"crossref","unstructured":"Harrison S, Dourish P (1996) Re-place-ing space: the roles of place and space in collaborative systems. In: Proceedings of CSCW \u201996, pp 67\u201376","DOI":"10.1145\/240080.240193"},{"key":"257_CR18","doi-asserted-by":"crossref","unstructured":"Kindberg T, Sellen A, Geelhoed E (2004) Security and trust in mobile interactions: a study of users' perceptions and reasoning UBICOMP 2004, Nottingham, UK, September 2004","DOI":"10.1007\/978-3-540-30119-6_12"},{"key":"257_CR19","volume-title":"Economies of signs and space","author":"S Lash","year":"1994","unstructured":"Lash S, Urry J (1994) Economies of signs and space. Sage, London"},{"key":"257_CR20","unstructured":"Luhmann N (1990) Familiarity, confidence, trust: problems and Alternatives. In: Gambetta D (ed) Trust: making and breaking co-operative relations, electronic edition. Department of Sociology, University of Oxford, chap 6, pp 94\u2013107. http:\/\/www.sociology.ox.ac.uk\/papers\/luhmann94-107.pdf"},{"key":"257_CR21","unstructured":"Mackenzie A (2008) Wirelessness as experience of convergence Fibreculture Issue 13 http:\/\/journal.fibreculture.org\/issue13\/issue13_mackenzie_print.html"},{"key":"257_CR22","doi-asserted-by":"crossref","unstructured":"Mynatt E, O\u2019Day V, Adler A, Ito M (1998) Network communities: something old, something new, something borrowed \u2026. Comput Support Coop Work 7(1\u20132):123\u2013156","DOI":"10.1023\/A:1008688205872"},{"issue":"1","key":"257_CR23","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1177\/1354856507072859","volume":"13","author":"SM Petersen","year":"2007","unstructured":"Petersen SM (2007) Mundane cyborg practice: material aspects of broadband Internet use. Convergence: Int J Res New Media Technol 13(1):79\u201391","journal-title":"Convergence: Int J Res New Media Technol"},{"key":"257_CR24","doi-asserted-by":"crossref","unstructured":"Silverstone R, Haddon L (1996) Design and the domestication of information and communication technologies: technical change and everyday life. In: Silverstone R, Mansell R (eds) Communication by design: the politics of information and communication technologies. Oxford University Press, Oxford","DOI":"10.1093\/oso\/9780198289418.003.0003"},{"key":"257_CR25","doi-asserted-by":"crossref","unstructured":"Silverstone R, Hirsch E, Morley D (1992) Information and communication technologies and the moral economy of the household. In: Silverstone R, Hirsch E (eds) Consuming technologies. Media and information in domestic spaces. Routledge, London","DOI":"10.4324\/9780203401491_chapter_1"},{"key":"257_CR26","unstructured":"Silverstone R (1994) Television and everyday life. Routledge, London"},{"key":"257_CR27","doi-asserted-by":"crossref","unstructured":"Stewart J, Williams R (2005) The wrong trousers? Beyond the design fallacy: social learning and the user. Reprinted in Howcroft et al (eds) Critical IT handbook. Edward Elgar, Cheltenham, pp 195\u2013221","DOI":"10.4337\/9781845426743.00017"},{"key":"257_CR28","doi-asserted-by":"crossref","unstructured":"Taylor N, Cheverst K. Fitton D, Race N, Rouncefield M, Graham C (2007) \u2018Probing communities: study of a village photo display. In: Proceedings of OzCHI 2007, pp 17\u201324","DOI":"10.1145\/1324892.1324896"},{"key":"257_CR29","volume-title":"Community & society: gemeinschaft and gesellschaft","author":"F T\u00f6nnies","year":"1988","unstructured":"T\u00f6nnies F (1988) Community & society: gemeinschaft and gesellschaft. Transaction Publishers, Edison"},{"key":"257_CR30","unstructured":"Wellman B (1999) From little boxes to loosely-bounded networks: the privatization and domestication of community. In: Abu-Lughod J (ed) Sociology for the 21st century: continuities and cutting edges. University of Chicago Press, Chicago"},{"issue":"3","key":"257_CR31","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1177\/00027640121957286","volume":"45","author":"B Wellman","year":"2001","unstructured":"Wellman B, Haase AQ, Witte J, Hampton K (2001) Does the Internet increase, decrease, or supplement social capital? Social networks, participation, and community commitment. Am Behav Sci 45(3):436\u2013455","journal-title":"Am Behav Sci"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-009-0257-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-009-0257-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-009-0257-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,22]],"date-time":"2024-03-22T22:03:14Z","timestamp":1711144994000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-009-0257-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,16]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,4]]}},"alternative-id":["257"],"URL":"https:\/\/doi.org\/10.1007\/s00779-009-0257-0","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,1,16]]}}}