Potentials of the Unexpected: Technology Appropriation Practices and Communication Needs

dc.contributor.authorTscheligi, Manfred
dc.contributor.authorKrischkowsky, Alina
dc.contributor.authorNeureiter, Katja
dc.contributor.authorInkpen, Kori
dc.contributor.authorMuller, Michael
dc.contributor.authorStevens, Gunnar
dc.date.accessioned2023-03-17T22:48:42Z
dc.date.available2023-03-17T22:48:42Z
dc.date.issued2014
dc.description.abstractWhether in private or professional life, individuals frequently adapt the technology around them and work with what they have at hand to accomplish a certain task. In this one-day workshop, we will discuss how this form of technology appropriation is used to satisfy communication needs. Thereby, we specifically focus on technology that was not intended to facilitate communication, but which led to appropriation driven by individuals' communication needs. Our aim is to identify unexpected" communication needs, to better address these in the design of interactive systems. We focus on a variety of different contexts, ranging from not restricted contexts to environments that are characterized by strict regulations (e.g., production lines with 24/7 shift production cycles). Consequently, this workshop aims at better understanding how users adapt technology to match their individual communication purposes and how these appropriation practices interrelate with and support organizational cooperation."en
dc.identifier.doi10.1145/2660398.2660427
dc.identifier.urihttps://dl.eusset.eu/handle/20.500.12015/4498
dc.language.isoen
dc.publisherAssociation for Computing Machinery
dc.relation.ispartofProceedings of the 2014 ACM International Conference on Supporting Group Work
dc.subjectunexpected" communication needs
dc.subjecttechnology appropriation
dc.subjectspecial contexts"
dc.titlePotentials of the Unexpected: Technology Appropriation Practices and Communication Needsen
dc.typeText/Conference Paper
gi.citation.startPage313–316
gi.citations.count5
gi.citations.elementJu Yeon Jung, Tom Steinberger, John L. King, Mark S. Ackerman (2021): Negotiating Repairedness: How Artifacts Under Repair Become Contingently Stabilized, In: Proceedings of the ACM on Human-Computer Interaction CSCW2(5), doi:10.1145/3476069
gi.citations.elementShari Trewin, Sara Basson, Michael Muller, Stacy Branham, Jutta Treviranus, Daniel Gruen, Daniel Hebert, Natalia Lyckowski, Erich Manser (2019): Considerations for AI fairness for people with disabilities, In: AI Matters 3(5), doi:10.1145/3362077.3362086
gi.citations.elementMartin Stein, Johanna Meurer, Alexander Boden, Volker Wulf (2017): Mobility in Later Life, In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3025453.3025672
gi.citations.elementSusann Wagenknecht, Matthias Korn (2016): Hacking as Transgressive Infrastructuring, In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, doi:10.1145/2818048.2820027
gi.citations.elementUpol Ehsan, Samir Passi, Q. Vera Liao, Larry Chan, I-Hsiang Lee, Michael Muller, Mark O Riedl (2024): The Who in XAI: How AI Background Shapes Perceptions of AI Explanations, In: Proceedings of the CHI Conference on Human Factors in Computing Systems, doi:10.1145/3613904.3642474
gi.conference.locationSanibel Island, Florida, USA

Files

Collections