{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T10:46:44Z","timestamp":1769856404506,"version":"3.49.0"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T00:00:00Z","timestamp":1553126400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N014243\/1"],"award-info":[{"award-number":["EP\/N014243\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/M001636\/1"],"award-info":[{"award-number":["EP\/M001636\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s00779-019-01210-7","type":"journal-article","created":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T08:18:01Z","timestamp":1553156281000},"page":"287-307","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Breaching the future: understanding human challenges of autonomous systems for the home"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8568-0062","authenticated-orcid":false,"given":"Tommy","family":"Nilsson","sequence":"first","affiliation":[]},{"given":"Andy","family":"Crabtree","sequence":"additional","affiliation":[]},{"given":"Joel","family":"Fischer","sequence":"additional","affiliation":[]},{"given":"Boriana","family":"Koleva","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,21]]},"reference":[{"key":"1210_CR1","doi-asserted-by":"publisher","first-page":"1102","DOI":"10.1145\/2370216.2370449","volume-title":"Living with an intelligent thermostat: advanced control for heating and cooling systems. Proceedings of the 2012 Conference on Ubiquitous Computing","author":"R Yang","year":"2012","unstructured":"Yang R, Newman M (2012) Living with an intelligent thermostat: advanced control for heating and cooling systems. Proceedings of the 2012 Conference on Ubiquitous Computing. ACM, Pittsburg, PA, pp 1102\u20131107. \n                    https:\/\/doi.org\/10.1145\/2370216.2370449"},{"key":"1210_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-51115-3","volume-title":"The global supply chain: how technology and circular thinking transform our future","author":"W Lehmacher","year":"2017","unstructured":"Lehmacher W (2017) The global supply chain: how technology and circular thinking transform our future. Springer International Publishing, Cham, Switzerland. \n                    https:\/\/doi.org\/10.1007\/978-3-319-51115-3"},{"key":"1210_CR3","unstructured":"Stewart B (2016) Promise of a smarter future: why the smart home is catching consumer notice. Dealerscope. \n                    https:\/\/www.dealerscope.com\/post\/promise-smarter-future-smart-home-catching-consumer-notice\n                    \n                  . Accessed 6 February 2019"},{"key":"1210_CR4","unstructured":"Smart home market by product: global forecast to 2023. Market and Markets. \n                    https:\/\/www.marketsandmarkets.com\/Market-Reports\/smart-homes-and-assisted-living-advanced-technologie-and-global-market-121.html\n                    \n                  . Accessed 6 February 2019"},{"key":"1210_CR5","doi-asserted-by":"publisher","unstructured":"Yang R, Newman M (2013) Learning from a learning thermostat: lessons for intelligent systems for the home. Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, Zurich, Switzerland, pp. 93\u2013102. \n                    https:\/\/doi.org\/10.1145\/2493432.2493489","DOI":"10.1145\/2493432.2493489"},{"key":"1210_CR6","doi-asserted-by":"publisher","unstructured":"Rodden T, Fischer JE, Pantidi N, Bachour K, Moran S (2013) At home with agents: exploring attitudes towards future smart energy infrastructure. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Paris, France, pp. 1173\u20131182. \n                    https:\/\/doi.org\/10.1145\/2470654.2466152","DOI":"10.1145\/2470654.2466152"},{"issue":"2","key":"1210_CR7","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/s00779-014-0813-0","volume":"19","author":"C Wilson","year":"2015","unstructured":"Wilson C, Hargreaves T, Hauxwell-Baldwin R (2015) Smart homes and their users: a systematic analysis and key challenges. Pers Ubiquit Comput 19(2):463\u2013476. \n                    https:\/\/doi.org\/10.1007\/s00779-014-0813-0","journal-title":"Pers Ubiquit Comput"},{"issue":"2","key":"1210_CR8","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1080\/13511610304516","volume":"16","author":"H Rohracher","year":"2003","unstructured":"Rohracher H (2003) The role of users in the social shaping of environmental technologies. Innovation: The European Journal of Social Science Research 16(2):177\u2013192. \n                    https:\/\/doi.org\/10.1080\/13511610304516","journal-title":"Innovation: The European Journal of Social Science Research"},{"key":"1210_CR9","first-page":"187","volume-title":"Motivation and social interaction: cognitive determinants","author":"H Garfinkel","year":"1963","unstructured":"Garfinkel H (1963) A conception of, and experiments with, \u2018trust\u2019 as a condition of stable concerted actions. In: Harvey OJ (ed) Motivation and social interaction: cognitive determinants. Ronald Press, New York, pp 187\u2013238"},{"issue":"3","key":"1210_CR10","doi-asserted-by":"publisher","first-page":"225","DOI":"10.2307\/798722","volume":"11","author":"H Garfinkel","year":"1964","unstructured":"Garfinkel H (1964) Studies of the routine grounds of everyday activities. Soc Probl 11(3):225\u2013250. \n                    https:\/\/doi.org\/10.2307\/798722","journal-title":"Soc Probl"},{"key":"1210_CR11","doi-asserted-by":"publisher","unstructured":"Mancini C, Rogers Y, Bandara A, Coe T, Jedrzejczyk L, Joinson A, Price B, Thomas K and Nuseibeh B (2010) Contravision: exploring users\u2019 reactions to futuristic technology Proceedings of the SIGCHI Conference on Human Factors in Computing Systems ACM, Atlanta, GA, pp 153\u2013162. \n                    https:\/\/doi.org\/10.1145\/1753326.1753350","DOI":"10.1145\/1753326.1753350"},{"key":"1210_CR12","volume-title":"Scenario-based design: envisioning work and technology in system development","year":"1995","unstructured":"Carroll JM (ed) (1995) Scenario-based design: envisioning work and technology in system development. Wiley, New York"},{"issue":"3","key":"1210_CR13","doi-asserted-by":"publisher","first-page":"331","DOI":"10.24908\/ss.v1i3.3344","volume":"1","author":"S Mann","year":"2002","unstructured":"Mann S, Nolan J, Wellman B (2002) Sousveillance: inventing and using wearable computing devices for data collection in surveillance environments. Surveill Soc 1(3):331\u2013355. \n                    https:\/\/doi.org\/10.24908\/ss.v1i3.3344","journal-title":"Surveill Soc"},{"key":"1210_CR14","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/1013115.1013125","volume-title":"Design in the absence of practice: breaching experiments. Proceedings of the 5th ACM conference on designing interactive systems","author":"A Crabtree","year":"2004","unstructured":"Crabtree A (2004) Design in the absence of practice: breaching experiments. Proceedings of the 5th ACM conference on designing interactive systems. ACM, Cambridge, MA, pp 59\u201368. \n                    https:\/\/doi.org\/10.1145\/1013115.1013125"},{"key":"1210_CR15","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1145\/1460563.1460662","volume-title":"Deploying research technology in the home. Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work","author":"P Tolmie","year":"2008","unstructured":"Tolmie P, Crabtree A (2008) Deploying research technology in the home. Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work. ACM, San Diego, CA, pp 639\u2013648. \n                    https:\/\/doi.org\/10.1145\/1460563.1460662"},{"key":"1210_CR16","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1145\/2145204.2145319","volume-title":"Interacting with infrastructure: a case for breaching experiments in home technology research. Proceedings of the Conference on Computer Supported Cooperative Work","author":"ES Poole","year":"2012","unstructured":"Poole ES (2012) Interacting with infrastructure: a case for breaching experiments in home technology research. Proceedings of the Conference on Computer Supported Cooperative Work. ACM, Seattle, WA, pp 759\u2013768. \n                    https:\/\/doi.org\/10.1145\/2145204.2145319"},{"key":"1210_CR17","volume-title":"Studies in ethnomethodology","author":"H Garfinkel","year":"1967","unstructured":"Garfinkel H (1967) Studies in ethnomethodology. Prentice-Hall Inc, Englewood Cliffs, NJ"},{"issue":"3","key":"1210_CR18","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M Weiser","year":"1991","unstructured":"Weiser M (1991) The computer for the 21st century. Sci Am 265(3):94\u2013105","journal-title":"Sci Am"},{"key":"1210_CR19","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/B978-044481862-1.50083-2","volume-title":"Handbook of human-computer interaction","author":"JM Carroll","year":"1997","unstructured":"Carroll JM (1997) Scenario-based design. In: Helander MG, Landauer TK, Prabhu PV (eds) Handbook of human-computer interaction, 2nd edn. Elsevier, Amsterdam, pp 383\u2013406","edition":"2"},{"issue":"1","key":"1210_CR20","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/S0953-5438(00)00023-0","volume":"13","author":"JM Carroll","year":"2000","unstructured":"Carroll JM (2000) Five reasons for scenario-based design. Interact Comput 13(1):43\u201360. \n                    https:\/\/doi.org\/10.1016\/S0953-5438(00)00023-0","journal-title":"Interact Comput"},{"key":"1210_CR21","doi-asserted-by":"publisher","first-page":"1573","DOI":"10.1145\/2207676.2208278","volume-title":"Envisioning ubiquitous computing. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"S Reeves","year":"2012","unstructured":"Reeves S (2012) Envisioning ubiquitous computing. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Austin, TX, pp 1573\u20131582. \n                    https:\/\/doi.org\/10.1145\/2207676.2208278"},{"key":"1210_CR22","doi-asserted-by":"publisher","first-page":"5933","DOI":"10.1145\/2858036.2858518","volume-title":"Just whack it on until it gets hot - working with IoT data in the home Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"JE Fischer","year":"2016","unstructured":"Fischer JE, Crabtree A, Rodden T, Colley J, Costanza E, Jewell M, Ramchurn SD (2016) Just whack it on until it gets hot - working with IoT data in the home Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, San Jose, CA, pp 5933\u20135944. \n                    https:\/\/doi.org\/10.1145\/2858036.2858518"},{"key":"1210_CR23","unstructured":"Ecuity (2013) Smart grids, microgeneration and storage: commercialising the benefits. \n                    https:\/\/www.ecuity.com\/wp-content\/uploads\/2013\/10\/SGrid-Report-v_final3.0.pdf. Accessed 6 February 2019"},{"issue":"4","key":"1210_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2943770","volume":"23","author":"AT Alper","year":"2016","unstructured":"Alper AT, Costanza E, Ramchurn SD, Fischer J, Rodden T, Jennings NR (2016) Tariff agent: interacting with a future smart energy system at home. ACM Transactions on Computer-Human Interaction 23(4): article no. 25):1\u201328. \n                    https:\/\/doi.org\/10.1145\/2943770","journal-title":"ACM Transactions on Computer-Human Interaction"},{"key":"1210_CR25","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/ICCE-Berlin.2016.7684756","volume-title":"IoT based intelligent system for fault detection and diagnosis in domestic appliances. Proceedings of the 6th international conference on consumer electronics","author":"JC Seabra","year":"2016","unstructured":"Seabra JC, Costa MA, Lucena MM (2016) IoT based intelligent system for fault detection and diagnosis in domestic appliances. Proceedings of the 6th international conference on consumer electronics. IEEE, Berlin, pp 205\u2013208. \n                    https:\/\/doi.org\/10.1109\/ICCE-Berlin.2016.7684756"},{"key":"1210_CR26","unstructured":"Morollo KH (2015) Smart homes provide convenience and sustainable living. Style. \n                    https:\/\/www.scmp.com\/magazines\/style\/article\/1780091\/smart-homes-provide-convenience-and-sustainable-living\n                    \n                  . Accessed 6 February 2019"},{"key":"1210_CR27","unstructured":"Absurdism. Philosophy. \n                    http:\/\/www.philosophy-index.com\/existentialism\/absurd.php\n                    \n                  . Accessed 6 February 2019"},{"key":"1210_CR28","doi-asserted-by":"publisher","first-page":"502419","DOI":"10.1155\/2014\/502419","volume":"10","author":"B Stojkoska","year":"2014","unstructured":"Stojkoska B, Avramova A, Chatzimisios P (2014) Application of wireless sensor networks for indoor temperature regulation. Int J Distrib Sensor Netw 10:502419. \n                    https:\/\/doi.org\/10.1155\/2014\/502419","journal-title":"Int J Distrib Sensor Netw"},{"key":"1210_CR29","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1145\/2030112.2030151","volume-title":"PreHeat: controlling home heating using occupancy prediction Proceedings of the 13th international conference on ubiquitous computing","author":"J Scott","year":"2011","unstructured":"Scott J, Bernheim Brush AJ, Krumm J, Meyers B, Hazas M, Hodges S, Villar N (2011) PreHeat: controlling home heating using occupancy prediction Proceedings of the 13th international conference on ubiquitous computing. ACM, Beijing, China, pp 281\u2013290. \n                    https:\/\/doi.org\/10.1145\/2030112.2030151"},{"issue":"3\u20136","key":"1210_CR30","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1007\/s10606-018-9314-4","volume":"27","author":"L Hyland","year":"2018","unstructured":"Hyland L, Crabtree A, Fischer J, Colley J, Fuentes C (2018) What do you want for dinner? Need anticipation and the design of proactive technologies for the home. Comput Supported Coop Work: J Collaborative Comput Work Pract 27(3\u20136):917\u2013946. \n                    https:\/\/doi.org\/10.1007\/s10606-018-9314-4","journal-title":"Comput Supported Coop Work: J Collaborative Comput Work Pract"},{"key":"1210_CR31","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1145\/2556288.2557167","volume-title":"Doing the laundry with agents: a field trial of a future smart energy system in the home. Proceedings of the SIGCHI conference on human factors in computing systems","author":"E Costanza","year":"2014","unstructured":"Costanza E, Fischer JE, Colley JA, Rodden T, Ramchurn SD, Jennings NR (2014) Doing the laundry with agents: a field trial of a future smart energy system in the home. Proceedings of the SIGCHI conference on human factors in computing systems. ACM, Toronto, Canada, pp 813\u2013822. \n                    https:\/\/doi.org\/10.1145\/2556288.2557167"},{"key":"1210_CR32","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-319-01583-5_41","volume-title":"Handbook of smart homes, health care and well-being","author":"S Peek","year":"2017","unstructured":"Peek S, Aarts S, Wouters E (2017) Can home technology deliver on the promise of independent living? In: van Hoof J, Demiris G, Wouters EJM (eds) Handbook of smart homes, health care and well-being. Springer International Publishing, Cham, Switzerland, pp 203\u2013214. \n                    https:\/\/doi.org\/10.1007\/978-3-319-01583-5_41"},{"key":"1210_CR33","doi-asserted-by":"publisher","unstructured":"Yang R, Newman MW, Forlizzi J (2014) Making sustainability sustainable: challenges in the design of eco-interaction technologies. Proceedings of the SIGCHI conference on human factors in computing systems, ACM, Toronto, Canada, pp. 823\u2013832. \n                    https:\/\/doi.org\/10.1145\/2556288.2557380","DOI":"10.1145\/2556288.2557380"},{"key":"1210_CR34","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/3025453.3025742","volume-title":"Implications for adoption. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"J Lindley","year":"2017","unstructured":"Lindley J, Coulton P, Sturdee M (2017) Implications for adoption. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Denver, CO, pp 265\u2013277. \n                    https:\/\/doi.org\/10.1145\/3025453.3025742"},{"key":"1210_CR35","doi-asserted-by":"publisher","unstructured":"Pollner M (1975) The very coinage of your brain: the anatomy of reality disjunctures. Philos Soc Sci 5(3):411\u2013430. \n                    https:\/\/doi.org\/10.1177\/004839317500500304","DOI":"10.1177\/004839317500500304"},{"key":"1210_CR36","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1136\/bmj.311.7000.299","volume":"311","author":"J Kitzinger","year":"1995","unstructured":"Kitzinger J (1995) Qualitative research: introducing focus groups. Br Med J 311:299\u2013302. \n                    https:\/\/doi.org\/10.1136\/bmj.311.7000.299","journal-title":"Br Med J"},{"key":"1210_CR37","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1145\/192844.193066","volume-title":"Situated evaluation for cooperative systems. Proceedings of the 1994 ACM Conference on Computer Supported Cooperative Work","author":"M Twidale","year":"1994","unstructured":"Twidale M, Randall D, Bentley R (1994) Situated evaluation for cooperative systems. Proceedings of the 1994 ACM Conference on Computer Supported Cooperative Work. ACM, Chapel Hill, NC, pp 441\u2013452. \n                    https:\/\/doi.org\/10.1145\/192844.193066"},{"issue":"2","key":"1210_CR38","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun V, Clarke V (2006) Using thematic analysis in psychology. Qual Res Psychol 3(2):77\u2013101. \n                    https:\/\/doi.org\/10.1191\/1478088706qp063oa","journal-title":"Qual Res Psychol"},{"key":"1210_CR39","volume-title":"Mundane reason: reality in everyday and sociological discourse","author":"M Pollner","year":"1987","unstructured":"Pollner M (1987) Mundane reason: reality in everyday and sociological discourse. Cambridge University Press, Cambridge"},{"key":"1210_CR40","volume-title":"Human values and the design of computer technology","author":"B Friedman","year":"1997","unstructured":"Friedman B (1997) Human values and the design of computer technology. Cambridge University Press, Cambridge"},{"issue":"2","key":"1210_CR41","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1207\/S15327051HCI16234_05","volume":"16","author":"V Bellotti","year":"2001","unstructured":"Bellotti V, Edwards K (2001) Intelligibility and accountability: human considerations in context-aware systems. Hum Comput Interact 16(2):193\u2013212. \n                    https:\/\/doi.org\/10.1207\/S15327051HCI16234_05","journal-title":"Hum Comput Interact"},{"issue":"4","key":"1210_CR42","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1207\/s15327051hci1304_2","volume":"13","author":"P Dourish","year":"1998","unstructured":"Dourish P, Button G (1998) On \u2018technomethodology\u2019 \u2013 foundational relationships between ethnomethodology and system design. Hum Comput Interact 13(4):395\u2013432. \n                    https:\/\/doi.org\/10.1207\/s15327051hci1304_2","journal-title":"Hum Comput Interact"},{"key":"1210_CR43","doi-asserted-by":"publisher","unstructured":"Crabtree A, Lodge T, Colley J, Greenhalgh C, Mortier R (2016) Building accountability into the internet of things. Soc Sci Res Netw. \n                    https:\/\/doi.org\/10.13140\/RG.2.2.27512.44803","DOI":"10.13140\/RG.2.2.27512.44803"},{"issue":"1","key":"1210_CR44","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s40860-018-0054-5","volume":"4","author":"A Crabtree","year":"2018","unstructured":"Crabtree A, Lodge T, Colley J, Greenhalgh C, Glover K, Haddadi H, Amar Y, Mortier R, Li Q, Moore J, Wang L, Yada P, Zhao J, Brown A, Urquhart L, McAuley D (2018) Building accountability into the internet of things: the IoT databox model. J Reliable Intell Environ 4(1):39\u201355. \n                    https:\/\/doi.org\/10.1007\/s40860-018-0054-5","journal-title":"J Reliable Intell Environ"},{"key":"1210_CR45","doi-asserted-by":"publisher","first-page":"2755","DOI":"10.1145\/2212776.2212713","volume-title":"End-user interactions with intelligent and autonomous systems extended abstracts on human factors in computing systems","author":"S Stumpf","year":"2012","unstructured":"Stumpf S, Burnett M, Pipek V, Wong WK (2012) End-user interactions with intelligent and autonomous systems extended abstracts on human factors in computing systems. ACM, Austin, TX, pp 2755\u20132758. \n                    https:\/\/doi.org\/10.1145\/2212776.2212713"},{"key":"1210_CR46","doi-asserted-by":"publisher","unstructured":"Lim B, Dey A, Avrahami D (2009) Why and why not explanations improve the intelligibility of context-aware intelligent systems. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, Boston, MA, pp. 2119\u20132128. \n                    https:\/\/doi.org\/10.1145\/1518701.1519023","DOI":"10.1145\/1518701.1519023"},{"key":"1210_CR47","unstructured":"Davis FD (1985) A technology acceptance model for empirically testing new end-user information systems: theory and results. Dissertation, Massachusetts Institute of Technology. \n                    https:\/\/dspace.mit.edu\/handle\/1721.1\/15192\n                    \n                  . Accessed 6 February 2019"},{"issue":"8","key":"1210_CR48","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","volume":"35","author":"FD Davis","year":"1989","unstructured":"Davis FD, Bagozzi RP, Warshaw PR (1989) User acceptance of computer technology: a comparison of two theoretical models. Manag Sci 35(8):982\u20131003. \n                    https:\/\/doi.org\/10.1287\/mnsc.35.8.982","journal-title":"Manag Sci"},{"issue":"5","key":"1210_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3127358","volume":"24","author":"K Hornb\u00e6k","year":"2017","unstructured":"Hornb\u00e6k K, Hertzum M (2017) Technology acceptance and user experience: a review of the experiential component in HCI. ACM Trans Computer-Human Interaction 24(5): article no. 33):1\u201330. \n                    https:\/\/doi.org\/10.1145\/3127358","journal-title":"ACM Trans Computer-Human Interaction"},{"issue":"2","key":"1210_CR50","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1080\/01449290500330331","volume":"25","author":"M Hassenzahl","year":"2006","unstructured":"Hassenzahl M, Tractinsky N (2006) User experience: a research agenda. Behav Inform Technol 25(2):91\u201397. \n                    https:\/\/doi.org\/10.1080\/01449290500330331","journal-title":"Behav Inform Technol"},{"issue":"2","key":"1210_CR51","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.jart.2015.06.001","volume":"13","author":"HC Kim","year":"2015","unstructured":"Kim HC (2015) Acceptability engineering: the study of user acceptance of innovative technologies. J Appl Res Technol 13(2):230\u2013237. \n                    https:\/\/doi.org\/10.1016\/j.jart.2015.06.001","journal-title":"J Appl Res Technol"},{"key":"1210_CR52","unstructured":"Pitts M (2016) We need trust to innovate. Gov.UK: Innovate UK. \n                    https:\/\/innovateuk.blog.gov.uk\/2016\/08\/17\/we-need-trust-to-innovate\n                    \n                  . Accessed 6 February 2019"},{"issue":"5","key":"1210_CR53","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1080\/01449290512331333700","volume":"24","author":"B Whitworth","year":"2005","unstructured":"Whitworth B (2005) Polite computing. Behav Inform Technol 24(5):353\u2013363. \n                    https:\/\/doi.org\/10.1080\/01449290512331333700","journal-title":"Behav Inform Technol"},{"key":"1210_CR54","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1017\/CBO9781316597873.004","volume-title":"Autonomous weapons systems: law, ethics, policy","author":"L Suchman","year":"2016","unstructured":"Suchman L, Weber J (2016) Human machine autonomies. In: Bhuta N, Beck S, Gei\u03b2 R, Liu H, Kre\u03b2 C (eds) Autonomous weapons systems: law, ethics, policy. Cambridge University Press, Cambridge, pp 75\u2013102. \n                    https:\/\/doi.org\/10.1017\/CBO9781316597873.004"},{"issue":"1","key":"1210_CR55","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s00779-003-0253-8","volume":"8","author":"P Dourish","year":"2004","unstructured":"Dourish P (2004) What we talk about when we talk about context. Pers Ubiquit Comput 8(1):19\u201330. \n                    https:\/\/doi.org\/10.1007\/s00779-003-0253-8","journal-title":"Pers Ubiquit Comput"},{"issue":"1","key":"1210_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/S0269888904000116","volume":"19","author":"SD Ramchurn","year":"2004","unstructured":"Ramchurn SD, Huynh D, Jennings NR (2004) Trust in multi-agent systems. Knowl Eng Rev 19(1):1\u201325. \n                    https:\/\/doi.org\/10.1017\/S0269888904000116","journal-title":"Knowl Eng Rev"},{"key":"1210_CR57","unstructured":"Mortier R, Haddadi H, Henderson T, McAuley D, Crowcroft J, Crabtree A (2016) Human data interaction. In: The encyclopedia of human-computer interaction. Denmark, Interaction Design Foundation, Chapter 41"},{"key":"1210_CR58","doi-asserted-by":"publisher","unstructured":"Fischer JE, Greenhalgh C, Jiang W, Ramchurn SD, Wu F, Rodden T (2017) In-the-loop or on-the-loop? Interactional arrangements to support team coordination with a planning agent. Concurrency and Computation: Practice and Experience. \n                    https:\/\/doi.org\/10.1002\/cpe.4082","DOI":"10.1002\/cpe.4082"},{"issue":"4","key":"1210_CR59","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s00779-013-0678-7","volume":"18","author":"P Dourish","year":"2014","unstructured":"Dourish P, Bell G (2014) Resistance is futile: reading science fiction alongside ubiquitous computing. Pers Ubiquit Comput 18(4):69\u2013778. \n                    https:\/\/doi.org\/10.1007\/s00779-013-0678-7","journal-title":"Pers Ubiquit Comput"},{"issue":"6","key":"1210_CR60","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/s00779-016-0939-3","volume":"20","author":"A Crabtree","year":"2016","unstructured":"Crabtree A, Lodge T, Colley J, Greenhalgh C, Mortier R, Haddadi H (2016) Enabling the new economic actor: data protection, the digital economy, and the Databox. Pers Ubiquit Comput 20(6):947\u2013957. \n                    https:\/\/doi.org\/10.1007\/s00779-016-0939-3","journal-title":"Pers Ubiquit Comput"},{"key":"1210_CR61","first-page":"109","volume-title":"Phenomenological sociology","author":"E Bittner","year":"1973","unstructured":"Bittner E (1973) Objectivity and realism in sociology. In: Psathas G (ed) Phenomenological sociology. Wiley, Ann Arbor, MI, pp 109\u2013125"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01210-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-019-01210-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01210-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,20]],"date-time":"2020-03-20T00:26:01Z","timestamp":1584663961000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-019-01210-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,21]]},"references-count":61,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["1210"],"URL":"https:\/\/doi.org\/10.1007\/s00779-019-01210-7","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,21]]},"assertion":[{"value":"26 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}