{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T09:27:13Z","timestamp":1775899633038,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,6]]},"DOI":"10.1145\/3411764.3445136","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T04:19:40Z","timestamp":1620447580000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Making Un-Use: When Humans Disengage with Technology"],"prefix":"10.1145","author":[{"given":"Alina","family":"Krischkowsky","sequence":"first","affiliation":[{"name":"University of Salzburg, Austria"}]},{"given":"Verena","family":"Fuchsberger","sequence":"additional","affiliation":[{"name":"University of Salzburg, Austria"}]},{"given":"Manfred","family":"Tscheligi","sequence":"additional","affiliation":[{"name":"University of Salzburg, Austria"}]}],"member":"320","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702147"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979275"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174190"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025740"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274292"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2399016.2399085"},{"key":"e_1_3_2_2_7_1","unstructured":"Nellie Bowles. 2018. Is the Answer to Phone Addiction a Worse Phone?https:\/\/www.nytimes.com\/2018\/01\/12\/technology\/grayscale-phone.html  Nellie Bowles. 2018. Is the Answer to Phone Addiction a Worse Phone?https:\/\/www.nytimes.com\/2018\/01\/12\/technology\/grayscale-phone.html"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814542311"},{"key":"e_1_3_2_2_9_1","volume-title":"Discovering design \u2013 explorations in design studies","author":"Buchanan Richard","unstructured":"Richard Buchanan . 1995. Discovering design \u2013 explorations in design studies . The University of Chigaco Press , Chapter Rhetoric , humanism and design., 23\u201366. Richard Buchanan. 1995. Discovering design \u2013 explorations in design studies. The University of Chigaco Press, Chapter Rhetoric, humanism and design., 23\u201366."},{"key":"e_1_3_2_2_10_1","volume-title":"ECIS 2004 Proceedings(2004)","author":"Carroll Jennie","year":"2004","unstructured":"Jennie Carroll . 2004 . Completing design in use: closing the appropriation cycle . ECIS 2004 Proceedings(2004) , 44. Jennie Carroll. 2004. Completing design in use: closing the appropriation cycle. ECIS 2004 Proceedings(2004), 44."},{"key":"e_1_3_2_2_11_1","volume-title":"Situating","author":"Ciolfi Luigina","unstructured":"Luigina Ciolfi . 2004. Situating \u201d place\u201d in interaction design: enhancing the user experience in interactive environments. Ph.D. Dissertation. University of Limerick , Limerick. Luigina Ciolfi. 2004. Situating\u201d place\u201d in interaction design: enhancing the user experience in interactive environments. Ph.D. Dissertation. University of Limerick, Limerick."},{"key":"e_1_3_2_2_12_1","volume-title":"Use matters: an alternative history of architecture","author":"Cupers Kenny","unstructured":"Kenny Cupers . 2013. Use matters: an alternative history of architecture . Routledge . Kenny Cupers. 2013. Use matters: an alternative history of architecture. Routledge."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0099212"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1531407.1531415"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901905"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781003085188-19"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/PL00000019"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466134"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.903170"},{"key":"e_1_3_2_2_20_1","unstructured":"Heather Horst Sarah Pink John Postill Larissa Hjorth Tania Lewis and Jo Tacchi. 2016. Ethnography in a Digital World. In Digital Ethnography: Principles and Practices.  Heather Horst Sarah Pink John Postill Larissa Hjorth Tania Lewis and Jo Tacchi. 2016. Ethnography in a Digital World. In Digital Ethnography: Principles and Practices."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1093\/cje\/bep042"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557111"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979077"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196709.3196731"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207754"},{"key":"e_1_3_2_2_26_1","unstructured":"Davide Nicolini. 2013. Practice Theory Work and Organization. An Introduction (First chapter).  Davide Nicolini. 2013. Practice Theory Work and Organization. An Introduction (First chapter)."},{"key":"e_1_3_2_2_27_1","volume-title":"Oudshoorn and Trevor Pinch","author":"Nelly","year":"2003","unstructured":"Nelly E.J. Oudshoorn and Trevor Pinch . 2003 . How users matter: The co-construction of users and technologies. MIT Press , United States. Nelly E.J. Oudshoorn and Trevor Pinch. 2003. How users matter: The co-construction of users and technologies. MIT Press, United States."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2598522"},{"key":"e_1_3_2_2_29_1","unstructured":"Antoni Rayzhekov. 2020. BOREOUT. https:\/\/digitalspring.at\/20\/timetable\/event\/antoni-rayzhekov-boreout\/  Antoni Rayzhekov. 2020. BOREOUT. https:\/\/digitalspring.at\/20\/timetable\/event\/antoni-rayzhekov-boreout\/"},{"key":"e_1_3_2_2_30_1","volume-title":"Towards user design? On the shift from object to user as the subject of design. Design studies 27, 2","author":"Redstr\u00f6m Johan","year":"2006","unstructured":"Johan Redstr\u00f6m . 2006. Towards user design? On the shift from object to user as the subject of design. Design studies 27, 2 ( 2006 ), 123\u2013139. Johan Redstr\u00f6m. 2006. Towards user design? On the shift from object to user as the subject of design. Design studies 27, 2 (2006), 123\u2013139."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.destud.2008.05.001"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1738826.1738829"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094562.1094569"},{"key":"e_1_3_2_2_34_1","unstructured":"Ashkan Soltani and Timothy\u00a0B. Lee. [n.d.]. Research shows how MacBook Webcams can spy on their users without warning. https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2013\/12\/18\/research-shows-how-macbook-webcams-can-spy-on-their-users-without-warning\/  Ashkan Soltani and Timothy\u00a0B. Lee. [n.d.]. Research shows how MacBook Webcams can spy on their users without warning. https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2013\/12\/18\/research-shows-how-macbook-webcams-can-spy-on-their-users-without-warning\/"},{"key":"e_1_3_2_2_35_1","unstructured":"Brad Soroka. [n.d.]. How To Kill Your Phone Addiction with 4 Settings 1 Hair Band and a Post-It Note. https:\/\/www.dtelepathy.com\/blog\/productivity\/how-to-kill-your-phone-addiction-with-4-settings-1-hair-band-and-a-post-it-note  Brad Soroka. [n.d.]. How To Kill Your Phone Addiction with 4 Settings 1 Hair Band and a Post-It Note. https:\/\/www.dtelepathy.com\/blog\/productivity\/how-to-kill-your-phone-addiction-with-4-settings-1-hair-band-and-a-post-it-note"},{"key":"e_1_3_2_2_36_1","volume-title":"Human-machine reconfigurations: Plans and situated actions","author":"Suchman Lucy","unstructured":"Lucy Suchman and Lucy\u00a0 A Suchman . 2007. Human-machine reconfigurations: Plans and situated actions . Cambridge university press . Lucy Suchman and Lucy\u00a0A Suchman. 2007. Human-machine reconfigurations: Plans and situated actions. Cambridge university press."},{"key":"e_1_3_2_2_37_1","volume-title":"Plans and situated actions: The problem of human-machine communication","author":"Suchman A","unstructured":"Lucy\u00a0 A Suchman . 1987. Plans and situated actions: The problem of human-machine communication . Cambridge university press . Lucy\u00a0A Suchman. 1987. Plans and situated actions: The problem of human-machine communication. Cambridge university press."},{"key":"e_1_3_2_2_38_1","unstructured":"T Sutton. [n.d.]. Disconnect to reconnect: The food\/technology metaphor in digital detoxing. First Monday 22 6 ([n.\u00a0d.]).  T Sutton. [n.d.]. Disconnect to reconnect: The food\/technology metaphor in digital detoxing. First Monday 22 6 ([n.\u00a0d.])."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1177\/1354856519847325"},{"key":"e_1_3_2_2_40_1","volume-title":"What is beautiful is usable. Interacting with computers 13, 2","author":"Tractinsky Noam","year":"2000","unstructured":"Noam Tractinsky , Adi\u00a0 S Katz , and Dror Ikar . 2000. What is beautiful is usable. Interacting with computers 13, 2 ( 2000 ), 127\u2013145. Noam Tractinsky, Adi\u00a0S Katz, and Dror Ikar. 2000. What is beautiful is usable. Interacting with computers 13, 2 (2000), 127\u2013145."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.destud.2015.08.002"},{"key":"e_1_3_2_2_42_1","volume-title":"Non-users also matter: The construction of users and non-users of the Internet. Now users matter: The co-construction of users and technology","author":"Wyatt ME","year":"2003","unstructured":"Sally\u00a0 ME Wyatt . 2003. Non-users also matter: The construction of users and non-users of the Internet. Now users matter: The co-construction of users and technology ( 2003 ), 67\u201379. Sally\u00a0ME Wyatt. 2003. Non-users also matter: The construction of users and non-users of the Internet. Now users matter: The co-construction of users and technology (2003), 67\u201379."}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445136","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445136","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:30Z","timestamp":1750195710000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445136"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":42,"alternative-id":["10.1145\/3411764.3445136","10.1145\/3411764"],"URL":"https:\/\/doi.org\/10.1145\/3411764.3445136","relation":{},"subject":[],"published":{"date-parts":[[2021,5,6]]},"assertion":[{"value":"2021-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}