Potentials of the Unexpected: Technology Appropriation Practices and Communication Needs
Fulltext URI
Document type
Additional Information
Date
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
Whether in private or professional life, individuals frequently adapt the technology around them and work with what they have at hand to accomplish a certain task. In this one-day workshop, we will discuss how this form of technology appropriation is used to satisfy communication needs. Thereby, we specifically focus on technology that was not intended to facilitate communication, but which led to appropriation driven by individuals' communication needs. Our aim is to identify unexpected" communication needs, to better address these in the design of interactive systems. We focus on a variety of different contexts, ranging from not restricted contexts to environments that are characterized by strict regulations (e.g., production lines with 24/7 shift production cycles). Consequently, this workshop aims at better understanding how users adapt technology to match their individual communication purposes and how these appropriation practices interrelate with and support organizational cooperation."
Description
Keywords
Citation
URI
Collections
Endorsement
Review
Supplemented By
Referenced By
Number of citations to item: 5
- Ju Yeon Jung, Tom Steinberger, John L. King, Mark S. Ackerman (2021): Negotiating Repairedness: How Artifacts Under Repair Become Contingently Stabilized, In: Proceedings of the ACM on Human-Computer Interaction CSCW2(5), doi:10.1145/3476069
- Shari Trewin, Sara Basson, Michael Muller, Stacy Branham, Jutta Treviranus, Daniel Gruen, Daniel Hebert, Natalia Lyckowski, Erich Manser (2019): Considerations for AI fairness for people with disabilities, In: AI Matters 3(5), doi:10.1145/3362077.3362086
- Martin Stein, Johanna Meurer, Alexander Boden, Volker Wulf (2017): Mobility in Later Life, In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3025453.3025672
- Susann Wagenknecht, Matthias Korn (2016): Hacking as Transgressive Infrastructuring, In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, doi:10.1145/2818048.2820027
- Upol Ehsan, Samir Passi, Q. Vera Liao, Larry Chan, I-Hsiang Lee, Michael Muller, Mark O Riedl (2024): The Who in XAI: How AI Background Shapes Perceptions of AI Explanations, In: Proceedings of the CHI Conference on Human Factors in Computing Systems, doi:10.1145/3613904.3642474