{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:33:40Z","timestamp":1761060820471,"version":"3.41.0"},"reference-count":50,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T00:00:00Z","timestamp":1561075200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2019,6,21]]},"abstract":"<jats:p>Smart devices such as mobile phones, tablets, and smart watches are designed under the assumption that they will be used by a single user. In contrast, many other devices, such as smart thermostats and smart speakers, are inherently sharable. This paper presents results from a diary study that we conducted with 20 participants to gain a nuanced understanding of the purposes, motivators, and constraints involved in the sharing of smart devices, which are cumulatively referred to as the Internet of Things. We also report on users' practices of coordinating their shared use with sharees\/co-users, the impact of not understanding a smart device's behavior and the context of shared use, the differences between sharing personal and inherently sharable devices in terms of content that is available and accessible, trust between sharees, and measures taken to ensure accountable use. Finally, we discuss the implications of our findings and provide guidelines for the design of future smart devices.<\/jats:p>","DOI":"10.1145\/3328915","type":"journal-article","created":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T13:45:01Z","timestamp":1561383901000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Understanding Motivators, Constraints, and Practices of Sharing Internet of Things"],"prefix":"10.1145","volume":"3","author":[{"given":"Radhika","family":"Garg","sequence":"first","affiliation":[{"name":"School of Information Studies, Syracuse University"}]},{"given":"Christopher","family":"Moreno","sequence":"additional","affiliation":[{"name":"University of Washington"}]}],"member":"320","published-online":{"date-parts":[[2019,6,21]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.603331"},{"key":"e_1_2_1_2_1","unstructured":"Amazon Mechanical Turk. 2014. Acceptable Use Policy. https:\/\/www.mturk.com\/acceptable-use-policy. Accessed January-2018.  Amazon Mechanical Turk. 2014. Acceptable Use Policy. https:\/\/www.mturk.com\/acceptable-use-policy. Accessed January-2018."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732508"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264901"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3057858"},{"volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Workshop on Technology for Today's Family.","year":"2012","author":"Bernheim Brush AJ","key":"e_1_2_1_6_1"},{"volume-title":"International Conference on Ubiquitous Computing. Springer, 109--126","year":"2007","author":"Bernheim Brush AJ","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","unstructured":"Marta E Cecchinato and Daniel Harrison. 2017. Degrees of Agency in Owners & Users of Home IoT Devices. In ACM CHI.  Marta E Cecchinato and Daniel Harrison. 2017. Degrees of Agency in Owners & Users of Home IoT Devices. In ACM CHI."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1771592.1771600"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025797"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132031"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1203750"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_2"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078072.3084330"},{"key":"e_1_2_1_15_1","unstructured":"Bob Evans. 2014. PACO. https:\/\/www.pacoapp.com\/. Accessed September-2018.  Bob Evans. 2014. PACO. https:\/\/www.pacoapp.com\/. Accessed September-2018."},{"volume-title":"An Exploratory Study for Understanding Reasons of (Not-) Using Internet of Things. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, LBW024","year":"2018","author":"Garg Radhika","key":"e_1_2_1_16_1"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858154"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/09613218.2017.1286882"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290310001592587"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2957276.2957296"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139937.3139941"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173578"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208541"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518953"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804288"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519023"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555819"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858288"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858051"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31205-2_10"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/827987.828005"},{"key":"e_1_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Janice M Morse. 1995. The significance of saturation.  Janice M Morse. 1995. The significance of saturation.","DOI":"10.1177\/104973239500500201"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2371574.2371576"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/097185241101500101"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/647987.741326"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-016-0998-5"},{"key":"e_1_2_1_37_1","unstructured":"Don Norman. 2013. The design of everyday things: Revised and expanded edition. Constellation.   Don Norman. 2013. The design of everyday things: Revised and expanded edition. Constellation."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174214"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174033"},{"volume-title":"Inside the smart home","author":"Randall Dave","key":"e_1_2_1_40_1"},{"volume-title":"Event-sampling and other methods for studying everyday experience. Handbook of research methods in social and personality psychology","year":"2000","author":"Reis Harry T","key":"e_1_2_1_41_1"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196709.3196772"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126594.3126633"},{"volume-title":"Beyond the personal and private: Modes of mobile phone sharing in urban India. The reconstruction of space and time: Mobile communication practices 1","year":"2009","author":"Steenson Molly","key":"e_1_2_1_44_1"},{"volume-title":"Basics of qualitative research: Grounded theory procedures and techniques","author":"Strauss Anselm","key":"e_1_2_1_45_1"},{"volume-title":"Human-machine reconfigurations: Plans and situated actions","author":"Suchman Lucy","key":"e_1_2_1_46_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511808418"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998228"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466255"},{"volume-title":"Readings in Human--Computer Interaction","author":"Weiser Mark","key":"e_1_2_1_49_1"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493489"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3328915","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3328915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:40Z","timestamp":1750204480000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3328915"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,21]]},"references-count":50,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,6,21]]}},"alternative-id":["10.1145\/3328915"],"URL":"https:\/\/doi.org\/10.1145\/3328915","relation":{},"ISSN":["2474-9567"],"issn-type":[{"type":"electronic","value":"2474-9567"}],"subject":[],"published":{"date-parts":[[2019,6,21]]},"assertion":[{"value":"2018-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}