{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:27:41Z","timestamp":1776094061768,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":92,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T00:00:00Z","timestamp":1560124800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,10]]},"DOI":"10.1145\/3338103.3338105","type":"proceedings-article","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T12:10:59Z","timestamp":1562760659000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Breaking the Cornucopian Paradigm"],"prefix":"10.1145","author":[{"given":"Kelly","family":"Widdicks","sequence":"first","affiliation":[{"name":"School of Computing and Communications, Lancaster, University, Lancaster, UK"}]},{"given":"Daniel","family":"Pargman","sequence":"additional","affiliation":[{"name":"School of Computer Science and Communication, KTH, Royal Institute of Technology, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2019,6,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.3390\/challe6010117"},{"key":"e_1_3_2_1_2_1","unstructured":"Apple. 2018. iOS 12 introduces new features to reduce interruptions and manage Screen Time. (2018). https:\/\/www.apple.com\/uk\/newsroom\/2018\/06\/ios-12-introduces-new-features-to-reduce-interruptio ns-and-manage-screen-time\/ accessed August 2018.  Apple. 2018. iOS 12 introduces new features to reduce interruptions and manage Screen Time. (2018). https:\/\/www.apple.com\/uk\/newsroom\/2018\/06\/ios-12-introduces-new-features-to-reduce-interruptio ns-and-manage-screen-time\/ accessed August 2018."},{"key":"e_1_3_2_1_3_1","volume-title":"Electricity intensity of Internet data transmission: Untangling the estimates. Journal of Industrial Ecology","author":"Aslan Joshua","year":"2017"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025869"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Oliver Bates Carolynne Lord Bran Knowles Adrian Friday Adrian Clear and Mike Hazas. 2015. Exploring (un) sustainable growth of digital technologies in the home. (2015).  Oliver Bates Carolynne Lord Bran Knowles Adrian Friday Adrian Clear and Mike Hazas. 2015. Exploring (un) sustainable growth of digital technologies in the home. (2015).","DOI":"10.2991\/ict4s-env-15.2015.34"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466446"},{"key":"e_1_3_2_1_7_1","volume-title":"WHO: Gaming addiction 'a mental health condition'.","author":"The","year":"2018"},{"key":"e_1_3_2_1_8_1","volume-title":"Would you hand over your mobile phone for a free meal?","author":"The BBC.","year":"2018"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2017.12.239"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998237"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240705"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3080556.3080568"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173710"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208539"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174111"},{"key":"e_1_3_2_1_16_1","volume-title":"The Pomodoro Technique","author":"Cirillo Francesco","year":"2009"},{"key":"e_1_3_2_1_17_1","volume-title":"Cisco Visual Networking Index: Forecast and Trends","year":"2017"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892410"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2932206.2932216"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joule.2018.04.016"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892415"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753625"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858171.1858173"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819947"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174006"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173627"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541948.1541999"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188448"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892413"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173698"},{"key":"e_1_3_2_1_31_1","volume-title":"Social networks","author":"Granovetter Mark S"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_2_1_33_1","volume-title":"Extreme online security measures to protect your digital privacy -- a guide. (2016). https:\/\/www.theguardian.com\/technology \/2016\/jul\/03\/online-security-measures-digital-privacy-guide, accessed","author":"Guardian The","year":"2019"},{"key":"e_1_3_2_1_34_1","volume-title":"Facebook: Washington DC sues tech giant over Cambridge Analytica data use.","author":"Guardian The","year":"2018"},{"key":"e_1_3_2_1_35_1","unstructured":"The Guardian. 2018. Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. (2018). https:\/\/www.theguardian.com\/news\/2018\/mar\/17\/cambridge-analytica-facebook-influence-us-election accessed February 2019.  The Guardian. 2018. Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. (2018). https:\/\/www.theguardian.com\/news\/2018\/mar\/17\/cambridge-analytica-facebook-influence-us-election accessed February 2019."},{"key":"e_1_3_2_1_36_1","volume-title":"We don't really need phones': the French school that banned mobiles. (2018). https:\/\/www.theguardian.com\/world\/2018\/jun\/22\/mobile-phones-french-school-ban\/, accessed","author":"Guardian The","year":"2019"},{"key":"e_1_3_2_1_37_1","unstructured":"The Guardian. 2019. Instagram bans 'graphic' self-harm images after Molly Russell's death. (2019). https:\/\/www.theguardian.com\/technology\/2019\/feb\/07\/instagram-bans-graphic-self-harm-images-a fter-molly-russells-death.  The Guardian. 2019. Instagram bans 'graphic' self-harm images after Molly Russell's death. (2019). https:\/\/www.theguardian.com\/technology\/2019\/feb\/07\/instagram-bans-graphic-self-harm-images-a fter-molly-russells-death."},{"key":"e_1_3_2_1_38_1","volume-title":"Foster the \"mores\", counter the \"limits\". First Monday 20, 8","author":"Gui Xinning","year":"2015"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2926676.2926690"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858278"},{"key":"e_1_3_2_1_41_1","unstructured":"Independent. 2018. US hotel chain offers families discount if they lock their mobile phones away. (2018). https:\/\/www.independent.co.uk\/life-s tyle\/us-hotel-chain-discount-families-mobile-phones-lock-away-wyndham-hotels-reconnected-scheme-a8219136.html\/ accessed February 2019.  Independent. 2018. US hotel chain offers families discount if they lock their mobile phones away. (2018). https:\/\/www.independent.co.uk\/life-s tyle\/us-hotel-chain-discount-families-mobile-phones-lock-away-wyndham-hotels-reconnected-scheme-a8219136.html\/ accessed February 2019."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3080556.3080566"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2577298"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858428"},{"key":"e_1_3_2_1_45_1","volume-title":"Deviant and guilt-ridden: Computing within psychological limits. First Monday 20, 8","author":"Knowles Bran","year":"2015"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134699"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.11.005"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858359"},{"key":"e_1_3_2_1_49_1","unstructured":"Matthew A Lapierre and Meleah N Lewis. 2016. Should it stay or should it go now? Smartphones and relational health. (2016).  Matthew A Lapierre and Meleah N Lewis. 2016. Should it stay or should it go now? Smartphones and relational health. (2016)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702162"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173754"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.3390\/su10093027"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3232617.3232618"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173666"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858437"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207754"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804292"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557381"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025735"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/0309877032000098734"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858357"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901809"},{"key":"e_1_3_2_1_63_1","volume-title":"The economic impact of broadband. (2018). https:\/\/www.ofcom.org.uk\/research-and-data\/telecoms-research\/broadband-research\/economic-impact-broadband#3\/, accessed","year":"2019"},{"key":"e_1_3_2_1_64_1","volume-title":"Good Vibrations: Designing and Evaluating a Ubiquitous Intervention for Reducing Digital Consumption.","author":"Okeke Fabian","year":"2016"},{"key":"e_1_3_2_1_65_1","volume-title":"On the limits of limits. First Monday 20, 8","author":"Pargman Daniel","year":"2015"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3080556.3084083"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858378"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2010.40"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2926676.2926678"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2926676.2926685"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018536.2018545"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173790"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3080556.3080559"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173626"},{"key":"e_1_3_2_1_76_1","volume-title":"ICT Innovations for Sustainability","author":"Schien Daniel"},{"key":"e_1_3_2_1_77_1","unstructured":"Dan Schien Chris Preist and Jigna Chandaria. {n. d.}. Estimating the carbon footprint of watching video from the BBC. ({n. d.}).  Dan Schien Chris Preist and Jigna Chandaria. {n. d.}. Estimating the carbon footprint of watching video from the BBC. ({n. d.})."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488485"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556983"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030151"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858443"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173774"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.05.078"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025579"},{"key":"e_1_3_2_1_85_1","unstructured":"Sherry Turkle. 2017. Alone together: Why we expect more from technology and less from each other. Hachette UK.   Sherry Turkle. 2017. Alone together: Why we expect more from technology and less from each other. Hachette UK."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173967"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173624"},{"key":"e_1_3_2_1_88_1","unstructured":"The Next Web. 2019. Extreme online security measures to protect your digital privacy -- a guide. (2019). https:\/\/thenextweb.com\/contributors\/2019\/02\/15\/15-strategies-everyone-should-know-to-protect-their-online-information\/ accessed February 2019.  The Next Web. 2019. Extreme online security measures to protect your digital privacy -- a guide. (2019). https:\/\/thenextweb.com\/contributors\/2019\/02\/15\/15-strategies-everyone-should-know-to-protect-their-online-information\/ accessed February 2019."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025730"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300696"},{"key":"e_1_3_2_1_91_1","unstructured":"Kelly Victoria Widdicks Tina Ringenson Daniel Pargman Vishnupriya Kuppusamy and Patricia Lago. 2018. Undesigning the Internet: An exploratory study of reducing everyday Internet connectivity. (2018).  Kelly Victoria Widdicks Tina Ringenson Daniel Pargman Vishnupriya Kuppusamy and Patricia Lago. 2018. Undesigning the Internet: An exploratory study of reducing everyday Internet connectivity. (2018)."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173842"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025590"}],"event":{"name":"LIMITS '19: Fifth Workshop on Computing within Limits","location":"Lappeenranta Finland","acronym":"LIMITS '19"},"container-title":["Proceedings of the Fifth Workshop on Computing within Limits"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338103.3338105","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338103.3338105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:02Z","timestamp":1750204442000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338103.3338105"}},"subtitle":["Towards Moderate Internet Use in Everyday Life"],"short-title":[],"issued":{"date-parts":[[2019,6,10]]},"references-count":92,"alternative-id":["10.1145\/3338103.3338105","10.1145\/3338103"],"URL":"https:\/\/doi.org\/10.1145\/3338103.3338105","relation":{},"subject":[],"published":{"date-parts":[[2019,6,10]]},"assertion":[{"value":"2019-06-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}