{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:05:24Z","timestamp":1777655124752,"version":"3.51.4"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1007\/s00779-010-0342-4","type":"journal-article","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T21:35:09Z","timestamp":1291152909000},"page":"629-639","source":"Crossref","is-referenced-by-count":111,"title":["Empowerment through seamfulness: smart phones in everyday life"],"prefix":"10.1007","volume":"15","author":[{"given":"Louise","family":"Barkhuus","sequence":"first","affiliation":[]},{"given":"Valerie E.","family":"Polichar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,12,2]]},"reference":[{"issue":"1","key":"342_CR1","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/344949.344988","volume":"7","author":"G Abowd","year":"2000","unstructured":"Abowd G, Mynatt E (2000) Charting past, present, and future research in ubiquitous computing. ACM Trans Comput Hum Interact (TOCHI) 7(1):29\u201358","journal-title":"ACM Trans Comput Hum Interact (TOCHI)"},{"key":"342_CR2","doi-asserted-by":"crossref","unstructured":"Barkhuus L, Brown B, Bell M, Sherwood S, Hall M, Chalmers M (2008) From awareness to repartee: sharing location within social groups. In: Proceedings of CHI 2008, ACM Press, New York, pp 497\u2013506","DOI":"10.1145\/1357054.1357134"},{"key":"342_CR3","doi-asserted-by":"crossref","unstructured":"Barkhuus L, Chalmers M, Tennent P, Bell M, Hall M, Sherwood S, Brown B (2005) Picking pockets on the lawn: the development of tactics and strategies in a mobile game, In: Proceedings of Ubicomp, Springer, pp 358\u2013374","DOI":"10.1007\/11551201_21"},{"key":"342_CR4","unstructured":"Barkhuus L, Dey A (2003) Location-based services for mobile telephony: a study of users\u2019 privacy concerns. In: Proceedings of Interact 2003, pp 207\u2013212"},{"key":"342_CR5","doi-asserted-by":"crossref","unstructured":"Bell G, Dourish P (2007) Yesterday\u2019s tomorrows: notes on ubiquitous computing\u2019s dominant vision. Personal Ubiquitous Computing 11(2):133\u2013143","DOI":"10.1007\/s00779-006-0071-x"},{"key":"342_CR6","doi-asserted-by":"crossref","unstructured":"Chalmers M, Galani A (2004) Seamful Interweaving: Heterogeneity in the theory and design of interactive systems. In: Proceedings of DIS 2004, ACM Press, pp 243\u2013252","DOI":"10.1145\/1013115.1013149"},{"key":"342_CR7","unstructured":"ComScore. Tapulous\u2019 Tap Tap Revenge Has Been Downloaded by 1 our of 3 iTunes Application Users. http:\/\/www.comscore.com\/press\/release.asp?press=2768"},{"key":"342_CR8","doi-asserted-by":"crossref","unstructured":"Cowan L, Griswold WG, Barkhuus L, Hollan JD (2010) Engaging the periphery for visual communication on mobile phones. In: Proceedings of the 43rd IEEE Hawaii international conference on systems sciences (HICSS 2010), Hawaii","DOI":"10.1109\/HICSS.2010.184"},{"issue":"4","key":"342_CR9","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1006\/ijhc.1996.0099","volume":"46","author":"M El-Shinnawy","year":"1997","unstructured":"El-Shinnawy M, Markus ML (1997) The poverty of media richness theory: explaining people\u2019s choice of electronic mail vs voice mail. Int J Hum Comput Stud 46(4):443\u2013468","journal-title":"Int J Hum Comput Stud"},{"key":"342_CR10","volume-title":"The discovery of grounded theory","author":"BG Glaser","year":"1967","unstructured":"Glaser BG, Strauss AL (1967) The discovery of grounded theory. Aldine, Chicago"},{"key":"342_CR11","doi-asserted-by":"crossref","unstructured":"Grinter R, Eldridge M (2003) Wan2tlk?: everyday text messaging. In: Proceedings of CHI \u201903. ACM, New York, pp 441\u2013448","DOI":"10.1145\/642611.642688"},{"key":"342_CR12","unstructured":"Hughes, JA, Sharrock WW, Rodden T, O\u2019Brien J, Rouncefield M, Calvey D(1994) Perspectives on the social organization of work, field studies and CSCW, COMIC Deliverable 2.2, pp 129\u2013160, Esprit Basic research Project 6225: Lancaster University"},{"key":"342_CR13","volume-title":"Personal, portable, pedestrian: mobile phones in Japanese life","year":"2005","unstructured":"Ito M, Okabe D, Matsuda M (eds) (2005) Personal, portable, pedestrian: mobile phones in Japanese life. MIT Press, Cambridge"},{"issue":"1\u20132","key":"342_CR14","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.ijhcs.2005.04.019","volume":"63","author":"C Jensen","year":"2005","unstructured":"Jensen C, Potts C, Jensen C (2005) Privacy practices of internet users: self-reports versus observed behavior. Int J Hum Comput Stud 63(1\u20132):203\u2013227","journal-title":"Int J Hum Comput Stud"},{"key":"342_CR15","doi-asserted-by":"crossref","unstructured":"Karlson AK, Brush AB, Schechter S (2009) Can i borrow your phone?: Understanding concerns when sharing mobile phones. In: Proceedings of CHI \u201909. ACM, New York, pp 1647\u20131650","DOI":"10.1145\/1518701.1518953"},{"key":"342_CR16","doi-asserted-by":"crossref","unstructured":"Khalil A, Connelly K (2006) Context-aware telephony: privacy preferences and sharing patterns. In: Proceedings of CSCW \u201906, ACM Press, New York, pp 469\u2013478","DOI":"10.1145\/1180875.1180947"},{"key":"342_CR17","volume-title":"Mobile usability","author":"H Kiljander","year":"2003","unstructured":"Kiljander H, Lindholm C, Keinonen T (2003) Mobile usability. McGraw-Hill, New York"},{"key":"342_CR18","doi-asserted-by":"crossref","unstructured":"Kindberg T, Spasojevic M, Fleck R, Sellen A (2005) I saw this and thought of you: some social uses of camera phones. In: Proceedings of CHI\u201905. ACM, New York, pp 1545\u20131548","DOI":"10.1145\/1056808.1056962"},{"key":"342_CR19","doi-asserted-by":"crossref","unstructured":"Lambourne R, Feiz K, Rigot B (1997) Social trends and product opportunities: philips vision of the future project. Report accessed from: http:\/\/sigchi.org\/chi97\/proceedings\/briefing\/rl.htm","DOI":"10.1145\/258549.259001"},{"issue":"2","key":"342_CR20","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MPRV.2009.29","volume":"8","author":"JA Landay","year":"2009","unstructured":"Landay JA, Joseph AD, Reynolds F (2009) Guest editors\u2019 introduction: smarter phones. Pervasive Comput 8(2):12\u201313 IEEE","journal-title":"Pervasive Comput"},{"key":"342_CR21","doi-asserted-by":"crossref","unstructured":"Lederer S, Mankoff J, Dey AK (2003) who wants to know what when? Privacy preference determinants in ubiquitous computing. In: CHI \u201903 extended abstracts. ACM, New York, pp 724\u2013725","DOI":"10.1145\/765891.765952"},{"key":"342_CR22","volume-title":"The mobile connection: the cell phone\u2019s impact on society","author":"R Ling","year":"2004","unstructured":"Ling R (2004) The mobile connection: the cell phone\u2019s impact on society. Morgan Kaufmann, Boston"},{"key":"342_CR23","doi-asserted-by":"crossref","unstructured":"Mazmanian M, Yates J, Orlikowski W (2006) Ubiquitous email: individual experiences and organizational consequences of Blackberry use. In: Proceedings of the 65th annual meeting of the academy of management. Atlanta, GA","DOI":"10.5465\/ambpp.2006.27169074"},{"issue":"3","key":"342_CR24","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1057\/palgrave.ejis.3000614","volume":"15","author":"C Middleton","year":"2006","unstructured":"Middleton C, Cukier W (2006) Is mobile email functional or dysfunctional? Two perspectives on mobile email usage. Eur J Inf Syst 15(3):252\u2013260","journal-title":"Eur J Inf Syst"},{"key":"342_CR25","volume-title":"Home and work\u2013negotiating boundaries through everyday life","author":"CE Nippert-Eng","year":"1995","unstructured":"Nippert-Eng CE (1995) Home and work\u2013negotiating boundaries through everyday life. The University of Chicago Press, Chicago"},{"key":"342_CR26","volume-title":"The invisible computer","author":"D Norman","year":"1999","unstructured":"Norman D (1999) The invisible computer. MIT Press, Cambridge"},{"key":"342_CR27","doi-asserted-by":"crossref","unstructured":"Nylander S, Lundquist T, Br\u00e4nnstr\u00f6m A (2009) At home and with computer access: why and where people use cell phones to access the internet. In: Proceedings of CHI \u201909. ACM Press, New York, pp 1639\u20131642","DOI":"10.1145\/1518701.1518951"},{"key":"342_CR28","doi-asserted-by":"crossref","unstructured":"O\u2019Hara K, Mitchell AS, Vorbau A (2007) Consuming video on mobile devices. In: Proceedings of CHI \u201907. ACM, New York, pp 857\u2013866","DOI":"10.1145\/1240624.1240754"},{"key":"342_CR29","doi-asserted-by":"crossref","unstructured":"Palen L, Salzman M, Youngs E (2000) Going wireless: behavior & practice of new mobile users. In: Proceedings of CSCW, ACM (2000), NY, pp 201\u2013210","DOI":"10.1145\/358916.358991"},{"key":"342_CR30","doi-asserted-by":"crossref","unstructured":"Palen L, Salzman M (2002) Beyond the handset: designing for wireless communication usability. ACM ToCHI, 9(2):125\u2013151","DOI":"10.1145\/513665.513669"},{"key":"342_CR31","doi-asserted-by":"crossref","unstructured":"Poole ES, Le Dantec CA, Eagan JR, Edwards WK (2008) Reflecting on the invisible: understanding end-user perceptions of ubiquitous computing. In: Proceedings of UbiComp \u201908, vol 344. ACM, New York, pp 192\u2013201","DOI":"10.1145\/1409635.1409662"},{"key":"342_CR32","volume-title":"Vision: coding and efficiency","author":"VS Ramachandran","year":"1993","unstructured":"Ramachandran VS (1993) Interactions between motion, depth, color and form: the utilitarian theory of perception. In: Blakemore C (ed) Vision: coding and efficiency. Cambridge University Press, Cambridge"},{"key":"342_CR33","doi-asserted-by":"crossref","unstructured":"Rattenbury T, Nafus D, Anderson K (2008) Plastic: a metaphor for integrated technologies. In: Proceedings of UbiComp \u201908, vol 344. ACM, New York, pp 232\u2013241","DOI":"10.1145\/1409635.1409667"},{"key":"342_CR34","doi-asserted-by":"crossref","unstructured":"Rogers Y (2006) Moving on from Weiser\u2019s vision of calm computing: engaging UbiComp experiences. In: Proceedings of UbiComp 2005. Springer, NY, pp 404\u2013421","DOI":"10.1007\/11853565_24"},{"key":"342_CR35","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1002\/job.146","volume":"23","author":"FK Schlosser","year":"2002","unstructured":"Schlosser FK (2002) So, how do people really use their handheld devices? An interactive study of wireless technology use. J Organ Behav 23:401\u2013423 John Wiley and Sons","journal-title":"J Organ Behav"},{"key":"342_CR36","doi-asserted-by":"crossref","unstructured":"Sherry J, Mainwaring S, Burrell J, Beckwith R, Salvador T (2004) \u2018This all together, hon?\u2019 UbiComp in non-office work environments. In: Proceedings of UbiComp 2004. Springer, NY, pp 179\u2013195","DOI":"10.1007\/978-3-540-30119-6_11"},{"key":"342_CR37","volume-title":"The Sciences of the artificial","author":"H Simon","year":"1969","unstructured":"Simon H (1969) The Sciences of the artificial, 1st edn. MIT Press, Cambridge","edition":"1"},{"key":"342_CR38","doi-asserted-by":"crossref","unstructured":"Sohn T, Li KA, Griswold WG, Hollan JD (2008) A diary study of mobile information needs. In: Proceeding of CHI \u201908. ACM, New York, pp 433\u2013442","DOI":"10.1145\/1357054.1357125"},{"key":"342_CR39","doi-asserted-by":"crossref","unstructured":"Want R, Pering T, Borriollo G, Farkas K (2002) Disappearing Hardware. IEEE Pervasive. January\u2013March 2002, pp 36\u201347. IEEE","DOI":"10.1109\/MPRV.2002.993143"},{"key":"342_CR40","doi-asserted-by":"crossref","unstructured":"Weiser M (1991) The Computer for the 21st century. Sci Am 265(3):94\u2013104","DOI":"10.1038\/scientificamerican0991-94"},{"issue":"4","key":"342_CR41","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1023\/A:1026331016172","volume":"26","author":"T-A Wilksa","year":"2003","unstructured":"Wilksa T-A (2003) Mobile phone use as part of young people\u2019s consumption styles. J Consum Policy 26(4):441\u2013463","journal-title":"J Consum Policy"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.springerlink.com\/index\/pdf\/10.1007\/s00779-010-0342-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T14:02:03Z","timestamp":1559829723000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-010-0342-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,2]]},"references-count":41,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2011,8]]}},"alternative-id":["342"],"URL":"https:\/\/doi.org\/10.1007\/s00779-010-0342-4","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,12,2]]}}}