Conference Paper

Potentials of the Unexpected: Technology Appropriation Practices and Communication Needs

Loading...
Thumbnail Image

Fulltext URI

Document type

Text/Conference Paper

Additional Information

Date

Journal Title

Journal ISSN

Volume Title

Publisher

Association for Computing Machinery

Abstract

Whether in private or professional life, individuals frequently adapt the technology around them and work with what they have at hand to accomplish a certain task. In this one-day workshop, we will discuss how this form of technology appropriation is used to satisfy communication needs. Thereby, we specifically focus on technology that was not intended to facilitate communication, but which led to appropriation driven by individuals' communication needs. Our aim is to identify unexpected" communication needs, to better address these in the design of interactive systems. We focus on a variety of different contexts, ranging from not restricted contexts to environments that are characterized by strict regulations (e.g., production lines with 24/7 shift production cycles). Consequently, this workshop aims at better understanding how users adapt technology to match their individual communication purposes and how these appropriation practices interrelate with and support organizational cooperation."

Description

Tscheligi, Manfred; Krischkowsky, Alina; Neureiter, Katja; Inkpen, Kori; Muller, Michael; Stevens, Gunnar (2014): Potentials of the Unexpected: Technology Appropriation Practices and Communication Needs. Proceedings of the 2014 ACM International Conference on Supporting Group Work. DOI: 10.1145/2660398.2660427. Association for Computing Machinery. pp. 313–316. Sanibel Island, Florida, USA

Keywords

unexpected" communication needs, technology appropriation, special contexts"

Citation

URI

Collections

Endorsement

Review

Supplemented By

Referenced By


Number of citations to item: 5

  • Ju Yeon Jung, Tom Steinberger, John L. King, Mark S. Ackerman (2021): Negotiating Repairedness: How Artifacts Under Repair Become Contingently Stabilized, In: Proceedings of the ACM on Human-Computer Interaction CSCW2(5), doi:10.1145/3476069
  • Shari Trewin, Sara Basson, Michael Muller, Stacy Branham, Jutta Treviranus, Daniel Gruen, Daniel Hebert, Natalia Lyckowski, Erich Manser (2019): Considerations for AI fairness for people with disabilities, In: AI Matters 3(5), doi:10.1145/3362077.3362086
  • Martin Stein, Johanna Meurer, Alexander Boden, Volker Wulf (2017): Mobility in Later Life, In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3025453.3025672
  • Susann Wagenknecht, Matthias Korn (2016): Hacking as Transgressive Infrastructuring, In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, doi:10.1145/2818048.2820027
  • Upol Ehsan, Samir Passi, Q. Vera Liao, Larry Chan, I-Hsiang Lee, Michael Muller, Mark O Riedl (2024): The Who in XAI: How AI Background Shapes Perceptions of AI Explanations, In: Proceedings of the CHI Conference on Human Factors in Computing Systems, doi:10.1145/3613904.3642474
Please note: Providing information about citations is only possible thanks to to the open metadata APIs provided by crossref.org and opencitations.net. These lists may be incomplete due to unavailable citation data.source: opencitations.net, crossref.org