{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T02:34:41Z","timestamp":1772937281589,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,4,10]],"date-time":"2010-04-10T00:00:00Z","timestamp":1270857600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,10]]},"DOI":"10.1145\/1753326.1753390","type":"proceedings-article","created":{"date-parts":[[2010,4,12]],"date-time":"2010-04-12T18:13:40Z","timestamp":1271096020000},"page":"423-432","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":61,"title":["The infrastructure problem in HCI"],"prefix":"10.1145","author":[{"given":"W. Keith","family":"Edwards","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Mark W.","family":"Newman","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Erika Shehan","family":"Poole","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,4,10]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI1523_5"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124835"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/267213.267289"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/383034.383037"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125571"},{"key":"e_1_3_2_2_6_1","unstructured":"Calvert K.L. Edwards W.K. and Grinter R.E.: Moving Toward the Middle: The Case Against the End-to-End Argument in Home Networking. ACM HotNets--VI (2007) Calvert K.L. Edwards W.K. and Grinter R.E.: Moving Toward the Middle: The Case Against the End-to-End Argument in Home Networking. ACM HotNets--VI (2007)"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143124"},{"key":"e_1_3_2_2_8_1","volume-title":"The Psychology of Human-Computer Interaction","author":"Card S.K.","year":"1983","unstructured":"Card , S.K. , Moran , T.P. and Newell , A .: The Psychology of Human-Computer Interaction . Erlbaum ( 1983 ) Card, S.K., Moran, T.P. and Newell, A.: The Psychology of Human-Computer Interaction. Erlbaum (1983)"},{"key":"e_1_3_2_2_9_1","first-page":"127","volume":"2007","author":"Chetty M.","unstructured":"Chetty , M. , Sung , J.-Y. and Grinter , R.E .: How Smart Homes Learn: The Evolution of the Networked Home and Household. Ubicomp 2007 127 -- 144 Chetty, M., Sung, J.-Y. and Grinter, R.E.: How Smart Homes Learn: The Evolution of the Networked Home and Household. Ubicomp 2007 127--144","journal-title":"Ubicomp"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/634067.634255"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI16234_02"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518832"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/200968.200970"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Dourish P.: Accounting for System Behaviour. Computers and Design in Context (1997) 145--170 Dourish P.: Accounting for System Behaviour. Computers and Design in Context (1997) 145--170","DOI":"10.7551\/mitpress\/1966.003.0007"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/348751.348758"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642664"},{"key":"e_1_3_2_2_18_1","first-page":"256","volume":"2001","author":"Edwards W.K.","unstructured":"Edwards , W.K. and Grinter , R.E .: At Home With Ubiquitous Computing: Seven Challenges. Ubicomp 2001 256 -- 272 Edwards, W.K. and Grinter, R.E.: At Home With Ubiquitous Computing: Seven Challenges. Ubicomp 2001 256--272","journal-title":"At Home With Ubiquitous Computing: Seven Challenges. Ubicomp"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1502800.1502803"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587114"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","DOI":"10.4324\/9780203979600","volume-title":"Introduction to Environmental Impact Assessment","author":"Glasson J.","year":"2005","unstructured":"Glasson , J. : Introduction to Environmental Impact Assessment . Routledge ( 2005 ) Glasson, J.: Introduction to Environmental Impact Assessment. Routledge (2005)"},{"key":"e_1_3_2_2_22_1","volume-title":"ECSCW 2005 469--488","author":"Grinter R.E.","unstructured":"Grinter , R.E. , : The Work to Make a Home Network Work . ECSCW 2005 469--488 Grinter, R.E., et al.: The Work to Make a Home Network Work. ECSCW 2005 469--488"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990087"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/354401.354412"},{"key":"e_1_3_2_2_25_1","volume-title":"Home Broadband Adoption","author":"Horrigan J.","year":"2009","unstructured":"Horrigan , J. : Home Broadband Adoption 2009 . Pew Internet & American Life , Washington, DC, USA (2009) Horrigan, J.: Home Broadband Adoption 2009. Pew Internet & American Life, Washington, DC, USA (2009)"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00054-2"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/11431879_1"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1405.001.0001","volume-title":"The Art of the Meta-Object Protocol","author":"Kiczales G.","year":"1991","unstructured":"Kiczales , G. , des Rivieres , J. and Bobrow , D .: The Art of the Meta-Object Protocol . MIT Press , Cambridge ( 1991 ) Kiczales, G., des Rivieres, J. and Bobrow, D.: The Art of the Meta-Object Protocol. MIT Press, Cambridge (1991)"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985743"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/775265.775268"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180950"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Leopold L.B. etal: A Procedure for Evaluating Environmental Impact. U.S. Geological Survey (1971) Leopold L.B. et al.: A Procedure for Evaluating Environmental Impact. U.S. Geological Survey (1971)","DOI":"10.3133\/cir645"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519023"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/258368.258383"},{"key":"e_1_3_2_2_35_1","first-page":"418","volume":"2004","author":"Mainwaring S.D.","unstructured":"Mainwaring , S.D. , Chang , M.F. and Anderson , K .: Infrastructures and Their Discontents: Implications for Ubicomp. Ubicomp 2004 418 -- 432 Mainwaring, S.D., Chang, M.F. and Anderson, K.: Infrastructures and Their Discontents: Implications for Ubicomp. Ubicomp 2004 418--432","journal-title":"Infrastructures and Their Discontents: Implications for Ubicomp. Ubicomp"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.009"},{"key":"e_1_3_2_2_37_1","volume-title":"ACM CSCW 2008 Designing for Families Workshop","author":"McDonald D.W.","unstructured":"McDonald , D.W. , Smith , K.A. and Karlova , N .: Problem Solving Probes: A Method for Discovering Conceptual Disconnects with Digital Living Technologies . ACM CSCW 2008 Designing for Families Workshop McDonald, D.W., Smith, K.A. and Karlova, N.: Problem Solving Probes: A Method for Discovering Conceptual Disconnects with Digital Living Technologies. ACM CSCW 2008 Designing for Families Workshop"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.968819"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1476589.1476628"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/344949.344959"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/263552.263615"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/571985.572008"},{"key":"e_1_3_2_2_43_1","volume-title":": The Design of Everyday Things","author":"Norman D.A.","year":"2002","unstructured":"Norman , D.A. : The Design of Everyday Things . Basic Books ( 2002 ) Norman, D.A.: The Design of Everyday Things. Basic Books (2002)"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294211.1294256"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/354401.354764"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1057073"},{"key":"e_1_3_2_2_47_1","unstructured":"Oppenheimer P.: Top-down network design. Cisco (1998) Oppenheimer P.: Top-down network design. Cisco (1998)"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642615"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303126"},{"issue":"9","key":"e_1_3_2_2_51_1","first-page":"40","article-title":"Access control","volume":"32","author":"Sandhu R.","year":"1994","unstructured":"Sandhu , R. and Samarati , P .: Access control : Principle and Practice. IEEE Communications , 32 ( 9 ): 40 -- 48 , ( 1994 ) Sandhu, R. and Samarati, P.: Access control: Principle and Practice. IEEE Communications, 32(9):40--48, (1994)","journal-title":"Principle and Practice. IEEE Communications"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240712"},{"key":"e_1_3_2_2_53_1","unstructured":"Stankovic J. and Ramamritham K.: A Reflective Architecture for Real-Time Operating Systems. Advances in Real-Time Systems:23--38 (1995) Stankovic J. and Ramamritham K.: A Reflective Architecture for Real-Time Operating Systems. Advances in Real-Time Systems:23--38 (1995)"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1177\/00027649921955326"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/192844.193021"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.101"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/503376.503448"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124806"},{"key":"e_1_3_2_2_59_1","volume-title":"Impact Assessment, and Environmental Planning","author":"Westman W.E.","year":"1985","unstructured":"Westman , W.E. : Ecology , Impact Assessment, and Environmental Planning . Wiley ( 1985 ) Westman, W.E.: Ecology, Impact Assessment, and Environmental Planning. Wiley (1985)"},{"key":"e_1_3_2_2_60_1","volume-title":"USENIX Security Symposium (1999)","author":"Whitten A.","unstructured":"Whitten , A. and Tygar , J.D .: Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 . USENIX Security Symposium (1999) Whitten, A. and Tygar, J.D.: Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. USENIX Security Symposium (1999)"}],"event":{"name":"CHI '10: CHI Conference on Human Factors in Computing Systems","location":"Atlanta Georgia USA","acronym":"CHI '10","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1753326.1753390","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1753326.1753390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:23:27Z","timestamp":1750245807000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1753326.1753390"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,10]]},"references-count":60,"alternative-id":["10.1145\/1753326.1753390","10.1145\/1753326"],"URL":"https:\/\/doi.org\/10.1145\/1753326.1753390","relation":{},"subject":[],"published":{"date-parts":[[2010,4,10]]},"assertion":[{"value":"2010-04-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}