{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T05:05:01Z","timestamp":1768453501246,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,2,11]],"date-time":"2024-02-11T00:00:00Z","timestamp":1707609600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"UKRI","award":["EP\/T022582\/1"],"award-info":[{"award-number":["EP\/T022582\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,2,11]]},"DOI":"10.1145\/3623509.3633357","type":"proceedings-article","created":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T18:17:01Z","timestamp":1706120221000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["The Router of All Evil: Designerly Hacking a Network of One\u2019s Own"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5248-5642","authenticated-orcid":false,"given":"David","family":"Chatting","sequence":"first","affiliation":[{"name":"Open Lab, Newcastle University, United Kingdom and Department of Design, Goldsmiths, University of London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,2,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511571169"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581540"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.2307\/990971"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.21428\/7f2e5f08"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3583127"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025630"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/0142-694X(82)90040-0"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073943.1073944"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196709.3196781"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300581"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858261"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2341007"},{"key":"e_1_3_2_1_13_1","volume-title":"Big ball of mud. Pattern languages of program design217","author":"Foote Brian","year":"1997","unstructured":"Brian Foote and Joseph Yoder. 1997. Big ball of mud. Pattern languages of program design217 (1997), 244\u20134695. http:\/\/www.laputan.org\/mud\/mud.html"},{"key":"e_1_3_2_1_14_1","unstructured":"Joakim Formo. 2012. Ericsson\u2019s UX Lab & BERG explores the Internetworks of Things. https:\/\/web.archive.org\/web\/20130605052549http:\/\/www.ericsson.com\/uxblog\/2012\/05\/ux-lab-x-berg-explores-iot\/"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395426"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0002-2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208538"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3532106.3533524"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/332040.332433"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2838739.2838802"},{"key":"e_1_3_2_1_21_1","unstructured":"Dan Hill. 2003. iPod and adaptive design. https:\/\/www.cityofsound.com\/blog\/2003\/11\/ipod_and_adapti.html"},{"key":"e_1_3_2_1_22_1","unstructured":"Kashmir Hill and Surya Mattu. 2018. The House That Spied on Me. https:\/\/gizmodo.com\/the-house-that-spied-on-me-1822429852"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-67322-2_5"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2317956.2318034"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858447"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501901"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2540930.2540966"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901908"},{"key":"e_1_3_2_1_29_1","unstructured":"Tijmen Schep. 2019. Candle - privacy friendly smart home. https:\/\/www.candlesmarthome.com\/"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 21st International Symposium on Electronic Art.","author":"Shaw Tim","year":"2015","unstructured":"Tim Shaw and John Bowers. 2015. Public Making: Artistic Strategies for Working with Museum Collections, Technologies and Publics. In Proceedings of the 21st International Symposium on Electronic Art. (Vancouver, Canada) (ISEA \u201915)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173746"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3596012"},{"key":"e_1_3_2_1_33_1","volume-title":"A Room of One","author":"Woolf Virginia","unstructured":"Virginia Woolf. 1929. A Room of One\u2019 s Own. Hogarth Press, London. ISSN: 01406736."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Shoshana Zuboff. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. Profile.","DOI":"10.1177\/0049085719872928"}],"event":{"name":"TEI '24: Eighteenth International Conference on Tangible, Embedded, and Embodied Interaction","location":"Cork Ireland","acronym":"TEI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the Eighteenth International Conference on Tangible, Embedded, and Embodied Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3623509.3633357","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3623509.3633357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T17:38:45Z","timestamp":1768412325000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3623509.3633357"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,11]]},"references-count":34,"alternative-id":["10.1145\/3623509.3633357","10.1145\/3623509"],"URL":"https:\/\/doi.org\/10.1145\/3623509.3633357","relation":{},"subject":[],"published":{"date-parts":[[2024,2,11]]},"assertion":[{"value":"2024-02-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}