{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T13:28:56Z","timestamp":1758634136161},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2007,12,11]],"date-time":"2007-12-11T00:00:00Z","timestamp":1197331200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Poiesis Prax"],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1007\/s10202-007-0041-z","type":"journal-article","created":{"date-parts":[[2007,12,10]],"date-time":"2007-12-10T08:23:53Z","timestamp":1197275033000},"page":"265-290","source":"Crossref","is-referenced-by-count":9,"title":["Ubiquitous technologies, cultural logics and paternalism in industrial workplaces"],"prefix":"10.1007","volume":"5","author":[{"given":"Katharina E.","family":"Kinder","sequence":"first","affiliation":[]},{"given":"Linden J.","family":"Ball","sequence":"additional","affiliation":[]},{"given":"Jerry S.","family":"Busby","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,12,11]]},"reference":[{"key":"41_CR1","unstructured":"Adamowsky N (2000) Kulturelle Relevanz. Ladenburger Diskurs \u201cUbiquitous Computing\u201d, February 2000"},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"Araya A (1995) Questioning ubiquitous computing. Proceedings of the 1995 ACM 23rd annual conference on computer science, pp 230\u2013237","DOI":"10.1145\/259526.259560"},{"issue":"5","key":"41_CR3","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1080\/10807030490513793","volume":"10","author":"J Bohn","year":"2004","unstructured":"Bohn J, Coroam\u0103 V, Langheinrich M, Mattern F, Rohs M (2004) Living in a world of smart everyday objects\u2014social, economic, and ethical implications. Hum Ecol Risk Assess 10(5):763\u2013785 10.1080\/10807030490513793","journal-title":"Hum Ecol Risk Assess"},{"key":"41_CR4","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s10676-006-0005-3","volume":"7","author":"P Brey","year":"2005","unstructured":"Brey P (2005) Freedom and privacy in ambient intelligence. Ethics Inform Technol 7:157\u2013166 10.1007\/s10676-006-0005-3","journal-title":"Ethics Inform Technol"},{"key":"41_CR5","doi-asserted-by":"crossref","DOI":"10.4135\/9781446220122","volume-title":"The Disneyization of society","author":"A Bryman","year":"2004","unstructured":"Bryman A (2004) The Disneyization of society. Sage Publications, London"},{"issue":"1","key":"41_CR6","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MPRV.2004.1269130","volume":"3","author":"J Burrell","year":"2004","unstructured":"Burrell J, Brooke T, Beckwith R (2004) Vineyard computing: sensor networks in agricultural production. IEEE Pervasive Comput 3(1):38\u201345 10.1109\/MPRV.2004.1269130","journal-title":"IEEE Pervasive Comput"},{"key":"41_CR7","unstructured":"Davies N, Efstratiou C, Finney J, Hooper R, Kortuem G, Lowton M, Strohbach M (2005) Health and safety compliance in the field. Poster and Demo Abstracts, ACM MobiSys 2006, Uppsala, 19\u201322 June 2006"},{"key":"41_CR8","unstructured":"Deleuze G (1992) Postscript on the societies of control. October 59:3\u20137"},{"key":"41_CR9","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7221.001.0001","volume-title":"Where the action is: the foundations of embodied interaction","author":"P Dourish","year":"2001","unstructured":"Dourish P (2001) Where the action is: the foundations of embodied interaction. MIT Press, Cambridge"},{"key":"41_CR10","volume-title":"The machine in me. an anthropologist sits among computer engineers","author":"GL Downey","year":"1998","unstructured":"Downey GL (1998) The machine in me. an anthropologist sits among computer engineers. Routledge, London"},{"issue":"3","key":"41_CR11","first-page":"8","volume":"3","author":"M Drugge","year":"2006","unstructured":"Drugge M, Hallber J, Parnes P, Synnes K (2006) Wearable systems in nursing home care: prototyping experience. IEEE Pervasive Comput 3(3):8","journal-title":"IEEE Pervasive Comput"},{"issue":"3","key":"41_CR12","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1086\/204266","volume":"35","author":"A Escobar","year":"1994","unstructured":"Escobar A (1994) Welcome to Cyberia: notes on the anthropology of cyberculture. Current Anthropol 35(3):211\u2013223 10.1086\/204266","journal-title":"Current Anthropol"},{"key":"41_CR13","volume-title":"Das Internet der Dinge: Ubiquitous Computing und RFID in der Praxis: Visionen, Technologien, Anwendungen, Handlungsanleitungen","author":"E Fleisch","year":"2005","unstructured":"Fleisch E, Mattern F (2005) Das Internet der Dinge: Ubiquitous Computing und RFID in der Praxis: Visionen, Technologien, Anwendungen, Handlungsanleitungen. Springer, Berlin"},{"issue":"2\/3","key":"41_CR14","first-page":"383","volume":"18","author":"A Galloway","year":"2004","unstructured":"Galloway A (2004) Intimations of everyday life: ubiquitous computing and the city. Cult Stud 18(2\/3):383\u2013407","journal-title":"Cult Stud"},{"key":"41_CR15","volume-title":"Everyware: the dawning age of ubiquitous computing","author":"A Greenfield","year":"2006","unstructured":"Greenfield A (2006) Everyware: the dawning age of ubiquitous computing. New Riders, Berkeley"},{"key":"41_CR16","volume-title":"Cultural complexity: studies in the social organization of meaning","author":"U Hannerz","year":"1992","unstructured":"Hannerz U (1992) Cultural complexity: studies in the social organization of meaning. Columbia University Press, New York"},{"issue":"3","key":"41_CR17","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MPRV.2006.53","volume":"5","author":"TR Hansen","year":"2006","unstructured":"Hansen TR, Bardram JE, Soegard M (2006) Moving out of the lab: deploying pervasive technologies in a hospital. IEEE Pervasive Comput 5(3):24\u201331 10.1109\/MPRV.2006.53","journal-title":"IEEE Pervasive Comput"},{"key":"41_CR18","unstructured":"Ilyes P (2003) \u201cTechnology is driving the future\u201d. Informationstechnologie und gesellschaftliche Ver\u00e4nderung aus der Perspektive lokaler IT-Experten. FB Sprach- und Kulturwissenschaften. Dissertation, JWG University, Frankfurt"},{"key":"41_CR19","unstructured":"Introna L D (2007) What surveillance does: exploring the ethics and politics of algorithmic surveillance systems. The new surveillance\u2014a critical analysis of research and methods in surveillance studies. International Conference at the Centre for Technology and Society of the Technical University Berlin"},{"key":"41_CR20","doi-asserted-by":"crossref","unstructured":"Kortuem G, Alford D, Ball L, Busby J, Davies N, Efstratiou C, Finney J, Iszatt White M, Kinder K (2007) Sensor networks or smart artifacts? An exploration of organizational issues of an industrial health and safety monitoring system. In: Krumm J et\u00a0al (eds) UbiComp 2007: Ubiquitous Computing. 9th International Conference, Innsbruck, Austria, September 2007, Proceedings, LNCS 4717, Springer, Berlin, pp 465\u2013482","DOI":"10.1007\/978-3-540-74853-3_27"},{"issue":"4","key":"41_CR21","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MPRV.2004.3","volume":"3","author":"A Kun","year":"2004","unstructured":"Kun A, Miller TW, Lenharth W (2004) Computers in police cruisers. IEEE Pervasive Comput 3(4):34\u201341 10.1109\/MPRV.2004.3","journal-title":"IEEE Pervasive Comput"},{"key":"41_CR22","volume-title":"Flexible citizenship: the cultural logics of transnationality","author":"A Ong","year":"1999","unstructured":"Ong A (1999) Flexible citizenship: the cultural logics of transnationality. Duke University Press, Durham"},{"key":"41_CR23","doi-asserted-by":"crossref","DOI":"10.7208\/chicago\/9780226221922.001.0001","volume-title":"French DNA: trouble in purgatory","author":"P Rabinow","year":"1999","unstructured":"Rabinow P (1999) French DNA: trouble in purgatory. The University of Chicago Press, Chicago"},{"key":"41_CR24","volume-title":"The McDonaldization of society","author":"G Ritzer","year":"2004","unstructured":"Ritzer G (2004) The McDonaldization of society. Revised New Century Edition. Sage Publications, London"},{"key":"41_CR25","doi-asserted-by":"crossref","unstructured":"Roduner C, Langheinrich M, Floerkemeier C, Schwarzentrub B (2007) Operating appliances with mobile phones\u2014strengths and limits of a universal interaction device. In: LaMarca A, Langheinrich M, Truong KN (eds) Pervasive Computing. 5th International Conference, PERVASIVE 2007, Toronto, Canada, May 2007, Proceedings. Berlin, pp 198\u2013215","DOI":"10.1007\/978-3-540-72037-9_12"},{"key":"41_CR26","unstructured":"Rohs M (2002) Ubiquitous computing criticism. Seminar Ubiquitous Computing Information. Presentation at the Department of Computer Science, ETH Zurich, 6.2.2002, http:\/\/www.vs.inf.ethz.ch\/edu\/WS0102\/UI\/slides\/ui_10critique.pdf"},{"key":"41_CR27","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/s00779-004-0307-6","volume":"8","author":"G Roussos","year":"2004","unstructured":"Roussos G, Moussouri T (2004) Consumer perceptions of privacy, security and trust in ubiquitous commerce. Pers Ubiquit Comput 8:416\u2013429 10.1007\/s00779-004-0307-6","journal-title":"Pers Ubiquit Comput"},{"issue":"1","key":"41_CR28","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1007\/s10202-005-0010-3","volume":"4","author":"S Spiekermann","year":"2006","unstructured":"Spiekermann S, Pallas F (2006) Technology paternalism\u2014wider implications of ubiquitous computing. Poiesis & Praxis: Int J Technol Assess Ethics Sci 4(1):6\u201318","journal-title":"Poiesis & Praxis: Int J Technol Assess Ethics Sci"},{"key":"41_CR29","unstructured":"Stajano F (2002) Security for whom? The shifting security assumptions of pervasive computing. In: Okada M et\u00a0al (eds) Software security\u2014theories and systems. Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 2002, Revised Papers. LNCS 2609, Springer, Berlin, pp 16\u201327"},{"issue":"1","key":"41_CR30","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MPRV.2002.993139","volume":"1","author":"V Stanford","year":"2002","unstructured":"Stanford V (2002) Using pervasive computing to deliver elder care. IEEE Pervasive Comput 1(1):10\u201313 10.1109\/MPRV.2002.993139","journal-title":"IEEE Pervasive Comput"},{"key":"41_CR31","volume-title":"Health and safety law","author":"J Stranks","year":"2005","unstructured":"Stranks J (2005) Health and safety law. Prentice Hall, London"},{"key":"41_CR32","volume-title":"The social shaping of technology","year":"1998","unstructured":"Wajcman J, MacKenzie D (eds) (1998) The social shaping of technology, 2nd edn. Open University Press, Buckingham","edition":"2"},{"issue":"1","key":"41_CR33","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MPRV.2002.993143","volume":"1","author":"R Want","year":"2002","unstructured":"Want R, Pering T, Borriello G, Farkas K (2002) Disappearing hardware. IEEE Pervasive Comput 1(1):36\u201347 10.1109\/MPRV.2002.993143","journal-title":"IEEE Pervasive Comput"},{"issue":"3","key":"41_CR34","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M Weiser","year":"1991","unstructured":"Weiser M (1991) The computer fort the 21st century. Sci Am 265(3):94\u2013100 10.1038\/scientificamerican0991-94","journal-title":"Sci Am"},{"issue":"7","key":"41_CR35","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/159544.159617","volume":"36","author":"M Weiser","year":"1993","unstructured":"Weiser M (1993) Some computer science issues in ubiquitous computing. Commun ACM 36(7):75\u201384 10.1145\/159544.159617","journal-title":"Commun ACM"}],"container-title":["Poiesis &amp; Praxis"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10202-007-0041-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10202-007-0041-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10202-007-0041-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T06:44:27Z","timestamp":1684133067000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10202-007-0041-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12,11]]},"references-count":35,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2008,9]]}},"alternative-id":["41"],"URL":"https:\/\/doi.org\/10.1007\/s10202-007-0041-z","relation":{},"ISSN":["1615-6609","1615-6617"],"issn-type":[{"value":"1615-6609","type":"print"},{"value":"1615-6617","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,12,11]]}}}