{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:24:26Z","timestamp":1760711066088,"version":"3.41.0"},"reference-count":124,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Vetenskapsrdet","award":["2017-04804: Skra saker: Skra sakernas Internet"],"award-info":[{"award-number":["2017-04804: Skra saker: Skra sakernas Internet"]}]},{"name":"Digital Futures"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2022,11,7]]},"abstract":"<jats:p>It is often assumed that the interests of users and developers coincide, sharing a common goal of good design. Yet users often desire functionality that goes beyond what designers, and the organisations they work in, are willing to supply. Analysing online forums, complemented with interviews, we document how users, hackers and software developers worked together to discover and apply system exploits in hardware and software. We cover four cases: users of CPAP breathing assistance machines getting access to their own sleep data, 'hacking' the Nintendo switch game console to run non-authorised software, end-users building their own insulin supply system, and farmers repairing their own agriculture equipment against suppliers terms and conditions. We propose the concept of the 'gulf of interests' to understand how differing interests can create conflicts between end-users, designers, and the organisations they work in. This points us in the direction of researching further the political and economic situations of technology development and use.<\/jats:p>","DOI":"10.1145\/3555774","type":"journal-article","created":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T22:58:54Z","timestamp":1668207534000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Why Users Hack: Conflicting Interests and the Political Economy of Software"],"prefix":"10.1145","volume":"6","author":[{"given":"Barry","family":"Brown","sequence":"first","affiliation":[{"name":"University of Copenhagen &amp; Stockholm University, Copenhagen, Denmark"}]},{"given":"Minna","family":"Vigren","sequence":"additional","affiliation":[{"name":"Stockholm University, Stockholm, Sweden"}]},{"given":"Asreen","family":"Rostami","sequence":"additional","affiliation":[{"name":"RISE Research Institutes of Sweden &amp; Stockholm University, Stockkholm, Sweden"}]},{"given":"Mareike","family":"Gl\u00f6ss","sequence":"additional","affiliation":[{"name":"Stockholm University, Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2022,11,11]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"PACIS 2018 Proceedings (June","author":"Al-Banna Mortada","year":"2018","unstructured":"Mortada Al-Banna , Boualem Benatallah , Daniel Schlagwein , Elisa Bertino , and Moshe Chai Barukh . 2018 . Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery . PACIS 2018 Proceedings (June 2018). Mortada Al-Banna, Boualem Benatallah, Daniel Schlagwein, Elisa Bertino, and Moshe Chai Barukh. 2018. Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery. PACIS 2018 Proceedings (June 2018)."},{"key":"e_1_2_1_2_1","article-title":"Making or Making Do? Challenging the Mythologies of Making and Hacking","volume":"12","author":"Ames Morgan","year":"2018","unstructured":"Morgan Ames , Silvia Lindtner , Shaowen Bardzell , Jeffrey Bardzell , Lilly Nguyen , Syed Ahmed , Nusrat Jahan , Steven Jackson , Paul Dourish , and Paul Dourish . 2018 . Making or Making Do? Challenging the Mythologies of Making and Hacking . Journal of Peer Production 12 (2018), 21 pp. Morgan Ames, Silvia Lindtner, Shaowen Bardzell, Jeffrey Bardzell, Lilly Nguyen, Syed Ahmed, Nusrat Jahan, Steven Jackson, Paul Dourish, and Paul Dourish. 2018. Making or Making Do? Challenging the Mythologies of Making and Hacking. Journal of Peer Production 12 (2018), 21 pp.","journal-title":"Journal of Peer Production"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Sinchul Back Sadhika Soor and Jennifer LaPrade. [n.d.]. Juvenile Hackers: An Empirical Test of Self-Control Theory and Social Bonding Theory. 1 ([n. d.]) 17.  Sinchul Back Sadhika Soor and Jennifer LaPrade. [n.d.]. Juvenile Hackers: An Empirical Test of Self-Control Theory and Social Bonding Theory. 1 ([n. d.]) 17.","DOI":"10.52306\/01010518VMDC9371"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557221"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2015.1118520"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359182"},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Pernille Bjorn and Carsten Osterlund. 2014. Sociomaterial-Design - Bounding Technologies in Practice.  Pernille Bjorn and Carsten Osterlund. 2014. Sociomaterial-Design - Bounding Technologies in Practice.","DOI":"10.1007\/978-3-319-12607-4"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of ECSCW '95","author":"Bowers John","year":"1995","unstructured":"John Bowers , Graham Button , and Wes Sharrock . 1995 . Workflow from within and Without . In Proceedings of ECSCW '95 . Kluwer Academic Publishers, Stockholm, Sweden. John Bowers, Graham Button, andWes Sharrock. 1995. Workflow from within and Without. In Proceedings of ECSCW '95. Kluwer Academic Publishers, Stockholm, Sweden."},{"key":"e_1_2_1_9_1","first-page":"40","article-title":"Juveniles and Computers: Should We Be Concerned","volume":"63","author":"Bowker Arthur L.","year":"1999","unstructured":"Arthur L. Bowker . 1999 . Juveniles and Computers: Should We Be Concerned . Fed. Probation 63 (1999), 40 . Arthur L. Bowker. 1999. Juveniles and Computers: Should We Be Concerned. Fed. Probation 63 (1999), 40.","journal-title":"Fed. Probation"},{"volume-title":"How Buildings Learn: What Happens after They're Built","author":"Brand Stewart","key":"e_1_2_1_10_1","unstructured":"Stewart Brand . 1995. How Buildings Learn: What Happens after They're Built . Penguin . Stewart Brand. 1995. How Buildings Learn: What Happens after They're Built. Penguin."},{"key":"e_1_2_1_11_1","unstructured":"Dr Michael Breus. 2018. Hacking Your CPAP Is A Very Bad Idea ... Here's Why. https:\/\/thesleepdoctor.com\/2018\/11\/25\/hacking-your-cpap-is-a-very-bad-idea-heres-why\/.  Dr Michael Breus. 2018. Hacking Your CPAP Is A Very Bad Idea ... Here's Why. https:\/\/thesleepdoctor.com\/2018\/11\/25\/hacking-your-cpap-is-a-very-bad-idea-heres-why\/."},{"key":"e_1_2_1_12_1","unstructured":"Harry Brignull. [n.d.]. Dark Patterns. https:\/\/darkpatterns.org\/.  Harry Brignull. [n.d.]. Dark Patterns. https:\/\/darkpatterns.org\/."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362364.2362369"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2019.0883"},{"key":"e_1_2_1_15_1","volume-title":"How Professional Hackers Understand Protected Code While Performing Attack Tasks. In 2017 IEEE\/ACM 25th International Conference on Program Comprehension (ICPC). IEEE, 154--164","author":"Ceccato Mariano","year":"2017","unstructured":"Mariano Ceccato , Paolo Tonella , Cataldo Basile , Bart Coppens , Bjorn De Sutter , Paolo Falcarin , and Marco Torchiano . 2017 . How Professional Hackers Understand Protected Code While Performing Attack Tasks. In 2017 IEEE\/ACM 25th International Conference on Program Comprehension (ICPC). IEEE, 154--164 . Mariano Ceccato, Paolo Tonella, Cataldo Basile, Bart Coppens, Bjorn De Sutter, Paolo Falcarin, and Marco Torchiano. 2017. How Professional Hackers Understand Protected Code While Performing Attack Tasks. In 2017 IEEE\/ACM 25th International Conference on Program Comprehension (ICPC). IEEE, 154--164."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3053890"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the 19th International ACM SIGACCESS Conference on Computers and Accessibility - DIS '18. ACM Press","author":"Chivukula Shruthi Sai","year":"1973","unstructured":"Shruthi Sai Chivukula , Jason Brier , and Colin M. Gray . 2018. Dark Intentions or Persuasion?: UX Designers' Activation of Stakeholder and User Values . In Proceedings of the 19th International ACM SIGACCESS Conference on Computers and Accessibility - DIS '18. ACM Press , Hong Kong, China, 87--91. https:\/\/doi.org\/10.1145\/3 1973 91.3205417 10.1145\/3197391.3205417 Shruthi Sai Chivukula, Jason Brier, and Colin M. Gray. 2018. Dark Intentions or Persuasion?: UX Designers' Activation of Stakeholder and User Values. In Proceedings of the 19th International ACM SIGACCESS Conference on Computers and Accessibility - DIS '18. ACM Press, Hong Kong, China, 87--91. https:\/\/doi.org\/10.1145\/3197391.3205417"},{"volume-title":"Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, Glasgow Scotland Uk, 1--6. https:\/\/doi.org\/10","author":"Chivukula Shruthi Sai","key":"e_1_2_1_18_1","unstructured":"Shruthi Sai Chivukula , ChrisWatkins, Lucca McKay , and Colin M. Gray . 2019. \"Nothing Comes Before Profit\": Asshole Design In the Wild . In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, Glasgow Scotland Uk, 1--6. https:\/\/doi.org\/10 .1145\/3290607.3312863 10.1145\/3290607.3312863 Shruthi Sai Chivukula, ChrisWatkins, Lucca McKay, and Colin M. Gray. 2019. \"Nothing Comes Before Profit\": Asshole Design In the Wild. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, Glasgow Scotland Uk, 1--6. https:\/\/doi.org\/10.1145\/3290607.3312863"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctt1r2gbj"},{"volume-title":"Hoaxer","author":"Coleman Gabriella","key":"e_1_2_1_20_1","unstructured":"Gabriella Coleman . 2014. Hacker , Hoaxer , Whistleblower, Spy : The Many Faces of Anonymous. Verso books. Gabriella Coleman. 2014. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous. Verso books."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v18i1.13118"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/12255.001.0001"},{"key":"e_1_2_1_23_1","volume-title":"Netnography: Range of Practices, Misperceptions, and Missed Opportunities.","author":"Costello Leesa","year":"2017","unstructured":"Leesa Costello , Marie-Louise McDermott , and Ruth Wallace . 2017 . Netnography: Range of Practices, Misperceptions, and Missed Opportunities. Leesa Costello, Marie-Louise McDermott, and Ruth Wallace. 2017. Netnography: Range of Practices, Misperceptions, and Missed Opportunities."},{"key":"e_1_2_1_24_1","unstructured":"E. Debusschere and M. McCambridge. 2012. Modern Game Console Exploitation. (2012).  E. Debusschere and M. McCambridge. 2012. Modern Game Console Exploitation. (2012)."},{"key":"e_1_2_1_25_1","unstructured":"Deere & Company. [n.d.]. Kansas HB 2122: Digital Electronic Repair Requirements. https:\/\/repair.org\/s\/Deere- Position-Paper-1--31--17-Analysis-2--7--17.doc.  Deere & Company. [n.d.]. Kansas HB 2122: Digital Electronic Repair Requirements. https:\/\/repair.org\/s\/Deere- Position-Paper-1--31--17-Analysis-2--7--17.doc."},{"key":"e_1_2_1_26_1","unstructured":"Deere Open Source Compliance Team. [n.d.]. License Agreement for John Deere Embedded Software. https:\/\/www.deere.com\/assets\/pdfs\/common\/privacy-and-data\/docs\/agreement_pdfs\/english\/2016--10--28-Embedded-Software-EULA.pdf.  Deere Open Source Compliance Team. [n.d.]. License Agreement for John Deere Embedded Software. https:\/\/www.deere.com\/assets\/pdfs\/common\/privacy-and-data\/docs\/agreement_pdfs\/english\/2016--10--28-Embedded-Software-EULA.pdf."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901861"},{"key":"e_1_2_1_28_1","volume-title":"Design Studies, and Design Exploration. Design issues 24, 3","author":"Fallman Daniel","year":"2008","unstructured":"Daniel Fallman . 2008. The Interaction Design Research Triangle of Design Practice , Design Studies, and Design Exploration. Design issues 24, 3 ( 2008 ), 4--18. Daniel Fallman. 2008. The Interaction Design Research Triangle of Design Practice, Design Studies, and Design Exploration. Design issues 24, 3 (2008), 4--18."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820018"},{"volume-title":"The Glossary of Human Computer Interaction","author":"Folmer Eelke","key":"e_1_2_1_30_1","unstructured":"Eelke Folmer . 2014. Gulf of Evaluation and Gulf of Execution . In The Glossary of Human Computer Interaction . Interaction Design Foundation . Eelke Folmer. 2014. Gulf of Evaluation and Gulf of Execution. In The Glossary of Human Computer Interaction. Interaction Design Foundation."},{"key":"e_1_2_1_31_1","first-page":"8","article-title":"Obstructive Sleep Apnea Is a Common Disorder in the Population-a Review on the Epidemiology of Sleep Apnea","volume":"7","author":"Franklin Karl A.","year":"2015","unstructured":"Karl A. Franklin and Eva Lindberg . 2015 . Obstructive Sleep Apnea Is a Common Disorder in the Population-a Review on the Epidemiology of Sleep Apnea . Journal of Thoracic Disease 7 , 8 (Aug. 2015), 1311--1322. https:\/\/doi.org\/10.3978\/j.issn.2072--1439.2015.06.11 10.3978\/j.issn.2072--1439.2015.06.11 Karl A. Franklin and Eva Lindberg. 2015. Obstructive Sleep Apnea Is a Common Disorder in the Population-a Review on the Epidemiology of Sleep Apnea. Journal of Thoracic Disease 7, 8 (Aug. 2015), 1311--1322. https:\/\/doi.org\/10.3978\/j.issn.2072--1439.2015.06.11","journal-title":"Journal of Thoracic Disease"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00412817"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/wics.106"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-005-4709-9"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395486"},{"key":"e_1_2_1_36_1","volume-title":"Toombs","author":"Gray Colin M.","year":"2018","unstructured":"Colin M. Gray , Yubo Kou , Bryan Battles , Joseph Hoggatt , and Austin L . Toombs . 2018 . The Dark (Patterns) Side of UX Design. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems - CHI '18. ACM Press , Montreal QC, Canada, 1--14. https:\/\/doi.org\/10.1145\/3173574.3174108 10.1145\/3173574.3174108 Colin M. Gray, Yubo Kou, Bryan Battles, Joseph Hoggatt, and Austin L. Toombs. 2018. The Dark (Patterns) Side of UX Design. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems - CHI '18. ACM Press, Montreal QC, Canada, 1--14. https:\/\/doi.org\/10.1145\/3173574.3174108"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/09502386.2017.1298638"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/240080.240259"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2598541"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557364"},{"key":"e_1_2_1_41_1","volume-title":"Systematic Sources of Suboptimal Interface Design in Large Product Development Organizations. Human-Computer Intraction 6, 2","author":"Grudin J","year":"1991","unstructured":"J Grudin . 1991. Systematic Sources of Suboptimal Interface Design in Large Product Development Organizations. Human-Computer Intraction 6, 2 ( 1991 ). J Grudin. 1991. Systematic Sources of Suboptimal Interface Design in Large Product Development Organizations. Human-Computer Intraction 6, 2 (1991)."},{"key":"#cr-split#-e_1_2_1_42_1.1","doi-asserted-by":"crossref","unstructured":"Susan J. Harrington. 2002. Software Piracy: Are Robin Hood and Responsibility Denial at Work? https:\/\/www.igiglobal.com\/chapter\/software-piracy-robin-hood-responsibility\/www.igi-global.com\/chapter\/software-piracy-robinhood-responsibility\/18578. 177--188 pages. https:\/\/doi.org\/10.4018\/978--1--931777--15--5.ch013 10.4018\/978--1--931777--15--5.ch013","DOI":"10.4018\/978-1-931777-15-5.ch013"},{"key":"#cr-split#-e_1_2_1_42_1.2","doi-asserted-by":"crossref","unstructured":"Susan J. Harrington. 2002. Software Piracy: Are Robin Hood and Responsibility Denial at Work? https:\/\/www.igiglobal.com\/chapter\/software-piracy-robin-hood-responsibility\/www.igi-global.com\/chapter\/software-piracy-robinhood-responsibility\/18578. 177--188 pages. https:\/\/doi.org\/10.4018\/978--1--931777--15--5.ch013","DOI":"10.4018\/978-1-931777-15-5.ch013"},{"volume-title":"Toothpicks and Logos: Design in Everyday Life","author":"Heskett John","key":"e_1_2_1_43_1","unstructured":"John Heskett . 2002. Toothpicks and Logos: Design in Everyday Life . Vol. 1 . Oxford University Press Oxford . John Heskett. 2002. Toothpicks and Logos: Design in Everyday Life. Vol. 1. Oxford University Press Oxford."},{"volume-title":"The MIT Press","author":"Hippel Eric Von","key":"e_1_2_1_44_1","unstructured":"Eric Von Hippel . 2006. Democratizing Innovation (administrao edition ed.). The MIT Press , Cambridge , Mass . Eric Von Hippel. 2006. Democratizing Innovation (administrao edition ed.). The MIT Press, Cambridge, Mass."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3083671.3083706"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243915578486"},{"volume-title":"Media Technologies Essays on Communication, Materiality, and","author":"Jackson Steven J.","key":"e_1_2_1_47_1","unstructured":"Steven J. Jackson . 2014. Rethinking Repair . In Media Technologies Essays on Communication, Materiality, and Society, Tarleton Gillespie , Pablo J. Boczkowski, and Kirsten A. Foot (Eds.). The MIT Press . Steven J. Jackson. 2014. Rethinking Repair. In Media Technologies Essays on Communication, Materiality, and Society, Tarleton Gillespie, Pablo J. Boczkowski, and Kirsten A. Foot (Eds.). The MIT Press."},{"volume-title":"Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems - CHI '14. ACM Press","author":"Steven","key":"e_1_2_1_48_1","unstructured":"Steven J. Jackson and Laewoo Kang. 2014. Breakdown, Obsolescence and Reuse: HCI and the Art of Repair . In Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems - CHI '14. ACM Press , Toronto, Ontario, Canada, 449--458. https:\/\/doi.org\/10.1145\/2556288.2557332 10.1145\/2556288.2557332 Steven J. Jackson and Laewoo Kang. 2014. Breakdown, Obsolescence and Reuse: HCI and the Art of Repair. In Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems - CHI '14. ACM Press, Toronto, Ontario, Canada, 449--458. https:\/\/doi.org\/10.1145\/2556288.2557332"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145224"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/1354856516640710"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13300-020-00831-z"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13300-020-00831-z"},{"key":"e_1_2_1_53_1","first-page":"2","article-title":"Environmental Triggers and Determinants of Type 1 Diabetes","volume":"54","author":"Knip Mikael","year":"2005","unstructured":"Mikael Knip , Riitta Veijola , Suvi M. Virtanen , Heikki Hy\u00f6ty , Outi Vaarala , and Hans K. \u00c5kerblom . 2005 . Environmental Triggers and Determinants of Type 1 Diabetes . Diabetes 54, suppl 2 (Dec. 2005), S125--S136. https:\/\/doi.org\/10.2337\/diabetes.54.suppl_2.S125 10.2337\/diabetes.54.suppl_2.S125 Mikael Knip, Riitta Veijola, Suvi M. Virtanen, Heikki Hy\u00f6ty, Outi Vaarala, and Hans K. \u00c5kerblom. 2005. Environmental Triggers and Determinants of Type 1 Diabetes. Diabetes 54, suppl 2 (Dec. 2005), S125--S136. https:\/\/doi.org\/10.2337\/diabetes.54.suppl_2.S125","journal-title":"Diabetes"},{"key":"e_1_2_1_54_1","unstructured":"Jason Koebler. 2017. Apple Tells Lawmaker That Right to Repair iPhones Will Turn Nebraska Into a ?Mecca' for Hackers. https:\/\/www.vice.com\/en_us\/article\/pgxgpg\/apple-tells-lawmaker-that-right-to-repair-iphones-will-turnnebraska-into-a-mecca-for-hackers.  Jason Koebler. 2017. Apple Tells Lawmaker That Right to Repair iPhones Will Turn Nebraska Into a ?Mecca' for Hackers. https:\/\/www.vice.com\/en_us\/article\/pgxgpg\/apple-tells-lawmaker-that-right-to-repair-iphones-will-turnnebraska-into-a-mecca-for-hackers."},{"key":"e_1_2_1_55_1","unstructured":"Jason Koebler. 2017. Why American Farmers Are Hacking Their Tractors With Ukrainian Firmware. (2017).  Jason Koebler. 2017. Why American Farmers Are Hacking Their Tractors With Ukrainian Firmware. (2017)."},{"key":"e_1_2_1_56_1","unstructured":"Jason Koebler. 2018. Why Sleep Apnea Patients Rely on a CPAP Machine Hacker. (2018).  Jason Koebler. 2018. Why Sleep Apnea Patients Rely on a CPAP Machine Hacker. (2018)."},{"key":"e_1_2_1_57_1","unstructured":"Mary Kopczynski. 2007. Robin Hood versus the Bullies: Software Piracy and Developing Countries. - Free Online Library.  Mary Kopczynski. 2007. Robin Hood versus the Bullies: Software Piracy and Developing Countries. - Free Online Library."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274369"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025529"},{"key":"e_1_2_1_60_1","unstructured":"Bruno Latour. [n.d.]. Aramis or the Love of Technology. https:\/\/www.hup.harvard.edu\/catalog.php?isbn=9780674043237.  Bruno Latour. [n.d.]. Aramis or the Love of Technology. https:\/\/www.hup.harvard.edu\/catalog.php?isbn=9780674043237."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815355"},{"key":"e_1_2_1_62_1","volume-title":"Free Culture: The Nature and Future of Creativity (reprint edition ed.)","author":"Lessig Lawrence","year":"2005","unstructured":"Lawrence Lessig . 2005 . Free Culture: The Nature and Future of Creativity (reprint edition ed.) . Penguin Books, New York , NY. Lawrence Lessig. 2005. Free Culture: The Nature and Future of Creativity (reprint edition ed.). Penguin Books, New York, NY."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359189"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134705"},{"key":"e_1_2_1_65_1","first-page":"3","article-title":"Technical Opinion","volume":"52","author":"Loo Alfred","year":"2009","unstructured":"Alfred Loo . 2009 . Technical Opinion : Security Threats of Smart Phones and Bluetooth. Commun. ACM 52 , 3 (March 2009), 150--152. https:\/\/doi.org\/10.1145\/1467247.1467282 10.1145\/1467247.1467282 Alfred Loo. 2009. Technical Opinion: Security Threats of Smart Phones and Bluetooth. Commun. ACM 52, 3 (March 2009), 150--152. https:\/\/doi.org\/10.1145\/1467247.1467282","journal-title":"Security Threats of Smart Phones and Bluetooth. Commun. ACM"},{"key":"e_1_2_1_66_1","unstructured":"Loop. 2019. LoopDocs. https:\/\/loopkit.github.io\/loopdocs\/.  Loop. 2019. LoopDocs. https:\/\/loopkit.github.io\/loopdocs\/."},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/99332.99356"},{"key":"e_1_2_1_68_1","first-page":"12","article-title":"Hacking Practices and Their Relevance for Consumer Studies: The Example of the \"Jailbreaking' of the iPhone","volume":"12","author":"Magaudda Paolo","year":"2010","unstructured":"Paolo Magaudda . 2010 . Hacking Practices and Their Relevance for Consumer Studies: The Example of the \"Jailbreaking' of the iPhone . Consumers, Commodities and Consumption 12 , 1 (2010), 12 -- 11 . Paolo Magaudda. 2010. Hacking Practices and Their Relevance for Consumer Studies: The Example of the \"Jailbreaking' of the iPhone. Consumers, Commodities and Consumption 12, 1 (2010), 12--11.","journal-title":"Consumers, Commodities and Consumption"},{"key":"e_1_2_1_69_1","volume-title":"Mining Key-Hackers on Darkweb Forums. In 2018 1st International Conference on Data Intelligence and Security (ICDIS). IEEE, South Padre Island, TX, 73--80","author":"Marin Ericsson","year":"2018","unstructured":"Ericsson Marin , Jana Shakarian , and Paulo Shakarian . 2018 . Mining Key-Hackers on Darkweb Forums. In 2018 1st International Conference on Data Intelligence and Security (ICDIS). IEEE, South Padre Island, TX, 73--80 . https:\/\/doi.org\/10.1109\/ICDIS.2018.00018 10.1109\/ICDIS.2018.00018 Ericsson Marin, Jana Shakarian, and Paulo Shakarian. 2018. Mining Key-Hackers on Darkweb Forums. In 2018 1st International Conference on Data Intelligence and Security (ICDIS). IEEE, South Padre Island, TX, 73--80. https:\/\/doi.org\/10.1109\/ICDIS.2018.00018"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858434"},{"volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14)","author":"David","key":"e_1_2_1_71_1","unstructured":"David A. Mellis and Leah Buechley. 2014. Do-It-Yourself Cellphones: An Investigation into the Possibilities and Limits of High-Tech Diy . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14) . Association for Computing Machinery, New York, NY, USA, 1723--1732. https:\/\/doi.org\/10.1145\/2556288.2557309 10.1145\/2556288.2557309 David A. Mellis and Leah Buechley. 2014. Do-It-Yourself Cellphones: An Investigation into the Possibilities and Limits of High-Tech Diy. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). Association for Computing Machinery, New York, NY, USA, 1723--1732. https:\/\/doi.org\/10.1145\/2556288.2557309"},{"key":"e_1_2_1_72_1","volume-title":"Qualitative Data Analysis: An Expanded Sourcebook","author":"Miles Matthew B.","unstructured":"Matthew B. Miles and A. Michael Huberman . 1994. Qualitative Data Analysis: An Expanded Sourcebook , 2nd Edition (2 nd edition ed.). SAGE Publications, Inc , Thousand Oaks . Matthew B. Miles and A. Michael Huberman. 1994. Qualitative Data Analysis: An Expanded Sourcebook, 2nd Edition (2nd edition ed.). SAGE Publications, Inc, Thousand Oaks.","edition":"2"},{"key":"e_1_2_1_73_1","volume-title":"Toilets, Cars, Computers and Many Other Things Come To Be As They Are","author":"Molotch Harvey","unstructured":"Harvey Molotch . 2003. Where Stuff Comes From: How Toasters , Toilets, Cars, Computers and Many Other Things Come To Be As They Are ( 1 st edition ed.). Routledge , New York . Harvey Molotch. 2003. Where Stuff Comes From: How Toasters, Toilets, Cars, Computers and Many Other Things Come To Be As They Are (1st edition ed.). Routledge, New York.","edition":"1"},{"key":"e_1_2_1_74_1","first-page":"0","article-title":"Big Data, Big Questions| This One Does Not Go Up To 11: The Quantified Self Movement as an Alternative Big Data Practice","volume":"8","author":"Nafus Dawn","year":"2014","unstructured":"Dawn Nafus and Jamie Sherman . 2014 . Big Data, Big Questions| This One Does Not Go Up To 11: The Quantified Self Movement as an Alternative Big Data Practice . International Journal of Communication 8 , 0 (June 2014), 11. Dawn Nafus and Jamie Sherman. 2014. Big Data, Big Questions| This One Does Not Go Up To 11: The Quantified Self Movement as an Alternative Big Data Practice. International Journal of Communication 8, 0 (June 2014), 11.","journal-title":"International Journal of Communication"},{"volume-title":"A Small Matter of Programming","author":"Nardi Bonnie A.","key":"e_1_2_1_75_1","unstructured":"Bonnie A. Nardi . 1996. A Small Matter of Programming . MIT Press , Cambridge, MA . Bonnie A. Nardi. 1996. A Small Matter of Programming. MIT Press, Cambridge, MA."},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816629475"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1177\/0163443718818384"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444804041445"},{"key":"e_1_2_1_79_1","volume-title":"Evil by Design: Interaction Design to Lead Us into Temptation","author":"Nodder Chris","unstructured":"Chris Nodder . 2013. Evil by Design: Interaction Design to Lead Us into Temptation ( 1 st edition ed.). Wiley, Indianapolis , IN. Chris Nodder. 2013. Evil by Design: Interaction Design to Lead Us into Temptation (1st edition ed.). Wiley, Indianapolis, IN.","edition":"1"},{"volume-title":"The Psychology of Everyday Things","author":"Norman Donald Arthur","key":"e_1_2_1_80_1","unstructured":"Donald Arthur Norman . 1987. The Psychology of Everyday Things . Basic Books . Donald Arthur Norman. 1987. The Psychology of Everyday Things. Basic Books."},{"key":"e_1_2_1_81_1","unstructured":"Donald Arthur Norman. 2013. The Design of Everyday Things: Revised and Expanded Edition.  Donald Arthur Norman. 2013. The Design of Everyday Things: Revised and Expanded Edition."},{"key":"e_1_2_1_82_1","volume-title":"The Nintendo Entertainment System and the 10NES Chip: Carving the Video Game Industry in Silicon:. Games and Culture (Aug","author":"O'Donnell Casey","year":"2010","unstructured":"Casey O'Donnell . 2010. The Nintendo Entertainment System and the 10NES Chip: Carving the Video Game Industry in Silicon:. Games and Culture (Aug . 2010 ). https:\/\/doi.org\/10.1177\/1555412010377319 10.1177\/1555412010377319 Casey O'Donnell. 2010. The Nintendo Entertainment System and the 10NES Chip: Carving the Video Game Industry in Silicon:. Games and Culture (Aug. 2010). https:\/\/doi.org\/10.1177\/1555412010377319"},{"key":"e_1_2_1_83_1","unstructured":"OpenAPS.org. [n.d.]. OpenAPS.Org -- #WeAreNotWaiting to Reduce the Burden of Type 1 Diabetes. https:\/\/openaps.org\/.  OpenAPS.org. [n.d.]. OpenAPS.Org -- #WeAreNotWaiting to Reduce the Burden of Type 1 Diabetes. https:\/\/openaps.org\/."},{"key":"e_1_2_1_84_1","unstructured":"OpenAPS.org. 2020. Welcome to OpenAPS's Documentation! https:\/\/openaps.readthedocs.io\/en\/latest\/index.html.  OpenAPS.org. 2020. Welcome to OpenAPS's Documentation! https:\/\/openaps.readthedocs.io\/en\/latest\/index.html."},{"key":"e_1_2_1_85_1","unstructured":"OpenOmni. 2016. Bounty Sourcing the Creation of an Omnipod Plugin for the Openaps Project. http:\/\/www.openomni.org\/bounty.  OpenOmni. 2016. Bounty Sourcing the Creation of an Omnipod Plugin for the Openaps Project. http:\/\/www.openomni.org\/bounty."},{"key":"e_1_2_1_86_1","unstructured":"Kyle Orland. 2018. Behind the Scenes with the Hackers Who Unlocked the Nintendo Switch. https:\/\/arstechnica.com\/gaming\/2018\/04\/behind-the-scenes-with-the-hackers-who-unlocked-the-nintendo-switch\/.  Kyle Orland. 2018. Behind the Scenes with the Hackers Who Unlocked the Nintendo Switch. https:\/\/arstechnica.com\/gaming\/2018\/04\/behind-the-scenes-with-the-hackers-who-unlocked-the-nintendo-switch\/."},{"key":"e_1_2_1_87_1","volume-title":"Brooke Erin Duffy, and Emily Hund","author":"Petre Caitlin","year":"2019","unstructured":"Caitlin Petre , Brooke Erin Duffy, and Emily Hund . 2019 . \"Gaming the System\": Platform Paternalism and the Politics of Algorithmic Visibility:. Social Media + Society (Nov . 2019). https:\/\/doi.org\/10.1177\/2056305119879995 10.1177\/2056305119879995 Caitlin Petre, Brooke Erin Duffy, and Emily Hund. 2019. \"Gaming the System\": Platform Paternalism and the Politics of Algorithmic Visibility:. Social Media + Society (Nov. 2019). https:\/\/doi.org\/10.1177\/2056305119879995"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1164\/rccm.201508-1544ED"},{"key":"e_1_2_1_89_1","volume-title":"Digital Ethnography: Principles and Practice.","author":"Pink Sarah","year":"2021","unstructured":"Sarah Pink . 2021 . Digital Ethnography: Principles and Practice. Sarah Pink. 2021. Digital Ethnography: Principles and Practice."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820026"},{"key":"e_1_2_1_91_1","unstructured":"RileyLink. [n.d.]. RileyLink 433MHz (OmniPod) to BLE Bridge Complete Kit. https:\/\/getrileylink.org\/product\/rileylink433.  RileyLink. [n.d.]. RileyLink 433MHz (OmniPod) to BLE Bridge Complete Kit. https:\/\/getrileylink.org\/product\/rileylink433."},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804261"},{"key":"e_1_2_1_93_1","volume-title":"The Dark Side of Interaction Design. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems (CHI EA '20). Association for Computing Machinery","author":"Rogers Yvonne","year":"2020","unstructured":"Yvonne Rogers , Paul Dourish , Patrick Olivier , Margot Brereton , and Jodi Forlizzi . 2020 . The Dark Side of Interaction Design. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems (CHI EA '20). Association for Computing Machinery , New York, NY, USA, 1--4. https:\/\/doi.org\/10.1145\/3334480.3381070 10.1145\/3334480.3381070 Yvonne Rogers, Paul Dourish, Patrick Olivier, Margot Brereton, and Jodi Forlizzi. 2020. The Dark Side of Interaction Design. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems (CHI EA '20). Association for Computing Machinery, New York, NY, USA, 1--4. https:\/\/doi.org\/10.1145\/3334480.3381070"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145257"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518768"},{"key":"e_1_2_1_96_1","volume-title":"Being Hacked: Understanding Victims' Experiences of IoT Hacking. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022","author":"Rostami Asreen","year":"2022","unstructured":"Asreen Rostami , Minna Vigren , Shahid Raza , and Barry Brown . 2022 . Being Hacked: Understanding Victims' Experiences of IoT Hacking. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022 ). USENIX Association, Boston, MA, 613--631. https:\/\/www.usenix.org\/conference\/soups 2022\/presentation\/rostami Asreen Rostami, Minna Vigren, Shahid Raza, and Barry Brown. 2022. Being Hacked: Understanding Victims' Experiences of IoT Hacking. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). USENIX Association, Boston, MA, 613--631. https:\/\/www.usenix.org\/conference\/soups2022\/presentation\/rostami"},{"key":"e_1_2_1_97_1","volume-title":"Methodically Defeating Nintendo Switch Security. arXiv preprint arXiv:1905.07643","author":"Henri Gabriel Roussel-Tarbouriech Gauvain Tanguy","year":"2019","unstructured":"Gauvain Tanguy Henri Gabriel Roussel-Tarbouriech , Noel Menard , Tyler True , and Tini Vi. 2019. Methodically Defeating Nintendo Switch Security. arXiv preprint arXiv:1905.07643 ( 2019 ). arXiv:1905.07643 Gauvain Tanguy Henri Gabriel Roussel-Tarbouriech, Noel Menard, Tyler True, and Tini Vi. 2019. Methodically Defeating Nintendo Switch Security. arXiv preprint arXiv:1905.07643 (2019). arXiv:1905.07643"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"e_1_2_1_99_1","first-page":"9","article-title":"Beyond the User: Use and Non-Use in HCI. In Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design","volume":"24","author":"Satchell Christine","year":"2009","unstructured":"Christine Satchell and Paul Dourish . 2009 . Beyond the User: Use and Non-Use in HCI. In Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design : Open 24\/7 . 9 -- 16 . Christine Satchell and Paul Dourish. 2009. Beyond the User: Use and Non-Use in HCI. In Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24\/7. 9--16.","journal-title":"Open"},{"key":"e_1_2_1_100_1","unstructured":"Pete Schwamb. 2019. Insulin Pumps Decapped Chips and Software Defined Radios. https:\/\/blog.usejournal.com\/insulin-pumps-decapped-chips-and-software-defined-radios-1be50f121d05.  Pete Schwamb. 2019. Insulin Pumps Decapped Chips and Software Defined Radios. https:\/\/blog.usejournal.com\/insulin-pumps-decapped-chips-and-software-defined-radios-1be50f121d05."},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240309462"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816636090"},{"key":"e_1_2_1_103_1","volume-title":"Deep Dip Teardown of Tubeless Insulin Pump. arXiv:1709.06026 [cs] (Sept","author":"Skorobogatov Sergei","year":"2017","unstructured":"Sergei Skorobogatov . 2017. Deep Dip Teardown of Tubeless Insulin Pump. arXiv:1709.06026 [cs] (Sept . 2017 ). arXiv:1709.06026 [cs] Sergei Skorobogatov. 2017. Deep Dip Teardown of Tubeless Insulin Pump. arXiv:1709.06026 [cs] (Sept. 2017). arXiv:1709.06026 [cs]"},{"key":"e_1_2_1_104_1","volume-title":"Platform Capitalism","author":"Srnicek Nick","unstructured":"Nick Srnicek . 2016. Platform Capitalism ( 1 st edition ed.). Polity , Cambridge, UK ; Malden, MA. Nick Srnicek. 2016. Platform Capitalism (1st edition ed.). Polity, Cambridge, UK ; Malden, MA.","edition":"1"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.15277\/bjd.2019.231"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1177\/1747016116650720"},{"key":"e_1_2_1_107_1","volume-title":"Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15)","author":"Sun Yuling","year":"2015","unstructured":"Yuling Sun , Silvia Lindtner , Xianghua Ding , Tun Lu , and Ning Gu . 2015 . Reliving the Past & Making a Harmonious Society Today | Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing . In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15) . Association for Computing Machinery, New York, NY, USA, 44--55. https:\/\/doi.org\/10.1145\/2675133.2675195 10.1145\/2675133.2675195 Yuling Sun, Silvia Lindtner, Xianghua Ding, Tun Lu, and Ning Gu. 2015. Reliving the Past & Making a Harmonious Society Today | Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15). Association for Computing Machinery, New York, NY, USA, 44--55. https:\/\/doi.org\/10.1145\/2675133.2675195"},{"key":"e_1_2_1_108_1","first-page":"18","article-title":"Big Data in Agriculture","volume":"19","author":"Sykuta Michael E","year":"2016","unstructured":"Michael E Sykuta . 2016 . Big Data in Agriculture : Property Rights, Privacy and Competition in Ag Data Services. 19 (2016), 18 . Michael E Sykuta. 2016. Big Data in Agriculture: Property Rights, Privacy and Competition in Ag Data Services. 19 (2016), 18.","journal-title":"Property Rights, Privacy and Competition in Ag Data Services."},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951717736335"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.54648\/ERPL2019044"},{"key":"e_1_2_1_111_1","doi-asserted-by":"crossref","unstructured":"Aaro Tupasela Karoliina Snell and Heta Tarkkala. 2020. The Nordic Data Imaginary. (2020).  Aaro Tupasela Karoliina Snell and Heta Tarkkala. 2020. The Nordic Data Imaginary. (2020).","DOI":"10.1177\/2053951720907107"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3026022"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470716"},{"key":"e_1_2_1_114_1","volume-title":"Testers: A Comparison of Software Vulnerability Discovery Processes. In 2018 IEEE Symposium on Security and Privacy (SP). 374--391","author":"Votipka Daniel","year":"2018","unstructured":"Daniel Votipka , Rock Stevens , Elissa Redmiles , Jeremy Hu , and Michelle Mazurek . 2018 . Hackers vs . Testers: A Comparison of Software Vulnerability Discovery Processes. In 2018 IEEE Symposium on Security and Privacy (SP). 374--391 . https:\/\/doi.org\/10.1109\/SP.2018.00003 10.1109\/SP.2018.00003 Daniel Votipka, Rock Stevens, Elissa Redmiles, Jeremy Hu, and Michelle Mazurek. 2018. Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes. In 2018 IEEE Symposium on Security and Privacy (SP). 374--391. https:\/\/doi.org\/10.1109\/SP.2018.00003"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820027"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/1979742.1979615"},{"volume-title":"Harvard University Press","author":"Wark McKenzie","key":"e_1_2_1_117_1","unstructured":"McKenzie Wark . 2004. A Hacker Manifesto . Harvard University Press , Cambridge, MA . McKenzie Wark. 2004. A Hacker Manifesto. Harvard University Press, Cambridge, MA."},{"key":"e_1_2_1_118_1","volume-title":"Sustainable HCI and Encouraging Retrofitting. In 8th Nordic Conference on Human-Computer Interaction (NordiCHI'14)","author":"Weeks Christopher","year":"2015","unstructured":"Christopher Weeks , Charles Delalonde , and Chris Preist . 2015 . Sustainable HCI and Encouraging Retrofitting. In 8th Nordic Conference on Human-Computer Interaction (NordiCHI'14) . Citeseer, 1--4. Christopher Weeks, Charles Delalonde, and Chris Preist. 2015. Sustainable HCI and Encouraging Retrofitting. In 8th Nordic Conference on Human-Computer Interaction (NordiCHI'14). Citeseer, 1--4."},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmjopen-2014-006204"},{"key":"e_1_2_1_120_1","volume-title":"Infrastructural Speculations: Tactics for Designing and Interrogating Lifeworlds. 1--15. https:\/\/doi.org\/10.1145\/3313831.3376515","author":"Wong Richmond","year":"2020","unstructured":"Richmond Wong , Vera Khovanskaya , Sarah Fox , Nick Merrill , and Phoebe Sengers . 2020 . Infrastructural Speculations: Tactics for Designing and Interrogating Lifeworlds. 1--15. https:\/\/doi.org\/10.1145\/3313831.3376515 10.1145\/3313831.3376515 Richmond Wong, Vera Khovanskaya, Sarah Fox, Nick Merrill, and Phoebe Sengers. 2020. Infrastructural Speculations: Tactics for Designing and Interrogating Lifeworlds. 1--15. https:\/\/doi.org\/10.1145\/3313831.3376515"},{"key":"e_1_2_1_121_1","volume-title":"Consumer Software Piracy in Virtual Communities. Internet Research 25 (April","author":"Yu Chia-Ping","year":"2015","unstructured":"Chia-Ping Yu , Mei-Lien Young , and Bao-Chan Ju. 2015. Consumer Software Piracy in Virtual Communities. Internet Research 25 (April 2015 ), 317--334. https:\/\/doi.org\/10.1108\/IntR-08--2013-0187 10.1108\/IntR-08--2013-0187 Chia-Ping Yu, Mei-Lien Young, and Bao-Chan Ju. 2015. Consumer Software Piracy in Virtual Communities. Internet Research 25 (April 2015), 317--334. https:\/\/doi.org\/10.1108\/IntR-08--2013-0187"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-015-9567-0"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555774","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3555774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:19Z","timestamp":1750182559000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555774"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":124,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2022,11,7]]}},"alternative-id":["10.1145\/3555774"],"URL":"https:\/\/doi.org\/10.1145\/3555774","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}