{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:38Z","timestamp":1750306058774,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research Council UK","award":["AH\/J005126\/1 and EP\/N02334X\/1"],"award-info":[{"award-number":["AH\/J005126\/1 and EP\/N02334X\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025878","type":"proceedings-article","created":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T18:37:22Z","timestamp":1493750242000},"page":"2964-2975","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Bitbarista"],"prefix":"10.1145","author":[{"given":"Larissa","family":"Pschetz","sequence":"first","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"Ella","family":"Tallyn","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"Rory","family":"Gianni","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"Chris","family":"Speed","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.86"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501613"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702210"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.2307\/25148715"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892340"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858432"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1013115.1013149"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858346"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-005-5879-y"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5040\/9781350070660"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858214"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381943"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892413"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557398"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858059"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501611"},{"key":"e_1_3_2_1_18_1","volume-title":"Visual Complexity: Mapping Patterns of Information","author":"Lima M.","year":"2013","unstructured":"M. Lima . 2013 . Visual Complexity: Mapping Patterns of Information . Princeton Architectural Press . https:\/\/books.google.co.uk\/books?id=59xlmQEACAAJ M. Lima. 2013. Visual Complexity: Mapping Patterns of Information. Princeton Architectural Press. https:\/\/books.google.co.uk\/books?id=59xlmQEACAAJ"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892475"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/191666.191729"},{"volume-title":"The Invisible Computer","author":"Norman Donald A.","key":"e_1_3_2_1_21_1","unstructured":"Donald A. Norman . 1998. The Invisible Computer . MIT Press , Cambridge, MA, USA . Donald A. Norman. 1998. The Invisible Computer. MIT Press, Cambridge, MA, USA."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2317956.2318088"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858381"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.21606\/drs.2016.442"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094562.1094569"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_3_2_1_27_1","volume-title":"Strauss and Alastair Fuad-Luke","author":"Carolyn","year":"2009","unstructured":"Carolyn F. Strauss and Alastair Fuad-Luke . 2009 . The Slow Design Principles. www.slowlab.net\/CtC_SlowDesignPrinciples.pdf. (2009). Online, Last accessed: 19.01.2014. Carolyn F. Strauss and Alastair Fuad-Luke. 2009. The Slow Design Principles. www.slowlab.net\/CtC_SlowDesignPrinciples.pdf. (2009). Online, Last accessed: 19.01.2014."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557400"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901890"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557347"}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Denver Colorado USA","acronym":"CHI '17"},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025878","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:39Z","timestamp":1750215819000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025878"}},"subtitle":["Exploring Perceptions of Data Transactions in the Internet of Things"],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":31,"alternative-id":["10.1145\/3025453.3025878","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025878","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}