{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T22:28:20Z","timestamp":1777933700025,"version":"3.51.4"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,3,8]],"date-time":"2014-03-08T00:00:00Z","timestamp":1394236800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1007\/s00779-014-0771-6","type":"journal-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T14:59:12Z","timestamp":1394204352000},"page":"203-215","source":"Crossref","is-referenced-by-count":12,"title":["House rules: the collaborative nature of policy in domestic networks"],"prefix":"10.1007","volume":"19","author":[{"given":"Andy","family":"Crabtree","sequence":"first","affiliation":[]},{"given":"Tom","family":"Rodden","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Tolmie","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Mortier","sequence":"additional","affiliation":[]},{"given":"Tom","family":"Lodge","sequence":"additional","affiliation":[]},{"given":"Pat","family":"Brundell","sequence":"additional","affiliation":[]},{"given":"Nadia","family":"Pantidi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,8]]},"reference":[{"key":"771_CR1","first-page":"64","volume-title":"Lessons learned from the deployment of a smartphone-based access-control system, Proc. of SOUPS","author":"L Bauer","year":"2007","unstructured":"Bauer L, Cranor L, Reiter M, Vaniea K (2007) Lessons learned from the deployment of a smartphone-based access-control system, Proc. of SOUPS. ACM, Pittsburgh, pp 64\u201375"},{"key":"771_CR2","first-page":"230","volume":"32","author":"E Bittner","year":"1965","unstructured":"Bittner E (1965) The concept of organisation. Social Research 32:230\u2013255","journal-title":"Social Research"},{"key":"771_CR3","first-page":"1","volume-title":"The network from above and below, Proc. of SIGCOMM W-MUST","author":"P Brundell","year":"2011","unstructured":"Brundell P et al (2011) The network from above and below, Proc. of SIGCOMM W-MUST. ACM, Toronto, pp 1\u20136"},{"key":"771_CR4","first-page":"659","volume-title":"Who\u2019s hogging the bandwidth? Proc. of CHI","author":"M Chetty","year":"2010","unstructured":"Chetty M et al (2010) Who\u2019s hogging the bandwidth? Proc. of CHI. ACM, Atlanta, pp 659\u2013668"},{"key":"771_CR5","first-page":"554","volume-title":"Unremarkable networking, Proc. of DIS","author":"A Crabtree","year":"2012","unstructured":"Crabtree A et al (2012) Unremarkable networking, Proc. of DIS. ACM, Newcastle, pp 554\u2013563"},{"key":"771_CR6","volume-title":"The division of labour in society","author":"E Durkheim","year":"1933","unstructured":"Durkheim E (1933) The division of labour in society. Free Press, New York"},{"key":"771_CR7","first-page":"43","volume-title":"Detecting BGP configuration faults with static analysis, Proc. of the 2nd NSDI Symposium","author":"N Feamster","year":"2005","unstructured":"Feamster N, Balakrishnan H (2005) Detecting BGP configuration faults with static analysis, Proc. of the 2nd NSDI Symposium. USENIX, Boston, pp 43\u201356"},{"key":"771_CR8","doi-asserted-by":"crossref","unstructured":"Grinter R, et al. (2009) The ins and outs of home networking, ACM ToCHI, 16 (2), Article No. 8","DOI":"10.1145\/1534903.1534905"},{"key":"771_CR9","first-page":"27","volume-title":"The status of rules in moral life, the classical roots of ethnomethodology","author":"R Hilbert","year":"1992","unstructured":"Hilbert R (1992) The status of rules in moral life, the classical roots of ethnomethodology. University of North Carolina Press, North Carolina, pp 27\u201345"},{"key":"771_CR10","first-page":"429","volume-title":"Moving out of the control room, Proc. of CSCW","author":"J Hughes","year":"1994","unstructured":"Hughes J et al (1994) Moving out of the control room, Proc. of CSCW. ACM, Chapel Hill, pp 429\u2013438"},{"key":"771_CR11","first-page":"17","volume-title":"Technology probes: inspiring design for and with families, Proc. of CHI","author":"H Hutchinson","year":"2003","unstructured":"Hutchinson H et al (2003) Technology probes: inspiring design for and with families, Proc. of CHI. ACM, Fort Lauderdale, pp 17\u201324"},{"key":"771_CR12","first-page":"197","volume-title":"Homework: putting interaction into the infrastructure, Proc. of UIST","author":"R Mortier","year":"2012","unstructured":"Mortier R et al (2012) Homework: putting interaction into the infrastructure, Proc. of UIST. ACM, Cambridge, pp 197\u2013206"},{"key":"771_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84628-768-8","volume-title":"Fieldwork for design: theory and practice","author":"D Randall","year":"2007","unstructured":"Randall D, Harper R, Rouncefield M (2007) Fieldwork for design: theory and practice. Springer, Berlin"},{"key":"771_CR14","first-page":"1","volume-title":"Editor\u2019s introduction, ethnomethodology\u2019s program","author":"A Rawls","year":"2002","unstructured":"Rawls A (2002) Editor\u2019s introduction, ethnomethodology\u2019s program. Rowman & Littlefield, New York, pp 1\u201364"},{"key":"771_CR15","volume-title":"Homebase, Proc. of CHI, Workshop on home behaviour datasets","author":"T Rodden","year":"2009","unstructured":"Rodden T et al (2009) Homebase, Proc. of CHI, Workshop on home behaviour datasets. ACM, Boston"},{"key":"771_CR16","first-page":"331","volume-title":"Digital housekeeping, Proc. of ECSCW","author":"P Tolmie","year":"2007","unstructured":"Tolmie P et al (2007) Digital housekeeping, Proc. of ECSCW. Springer, Limerick, pp 331\u2013350"},{"key":"771_CR17","first-page":"639","volume-title":"Deploying research technology in the home, Proc. of CSCW","author":"P Tolmie","year":"2008","unstructured":"Tolmie P, Crabtree A (2008) Deploying research technology in the home, Proc. of CSCW. ACM, New York, pp 639\u2013648"},{"key":"771_CR18","doi-asserted-by":"crossref","unstructured":"Wieder DL (1974) Language and social reality. Mouton & Co, The Hague","DOI":"10.1515\/9783111410999"},{"key":"771_CR19","first-page":"109","volume-title":"Eden, Proc. of UIST","author":"J Yang","year":"2010","unstructured":"Yang J, Edwards K, Haslem D (2010) Eden, Proc. of UIST. ACM, New York, pp 109\u2013118"},{"key":"771_CR20","unstructured":"W3 policy language review, www.w3.org\/Policy\/pling\/wiki\/PolicyLangReview"},{"key":"771_CR21","unstructured":"Zimmerman D (1970) The practicalities of rule use. In: Douglas JD (ed) Understanding everyday life. Aldine Publishing Co, Chicago, pp 221\u2013238"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-014-0771-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-014-0771-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-014-0771-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T06:46:29Z","timestamp":1565246789000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-014-0771-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,8]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["771"],"URL":"https:\/\/doi.org\/10.1007\/s00779-014-0771-6","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,8]]}}}