The intellectual challenge of cscw: the gap between social requirements and technical feasibility, Human-computer interaction, vol.15, issue.2, pp.179-203, 2000. ,
Managing mobile multitasking: the culture of iphones on stanford campus, Proceedings of the 2013 conference on Computer supported cooperative work, pp.1487-1498, 2013. ,
The internet of things: A survey, Computer networks, vol.54, issue.15, pp.2787-2805, 2010. ,
Limiting, leaving, and (re) lapsing: an exploration of facebook non-use practices and experiences, Proceedings of the SIGCHI conference on human factors in computing systems, pp.3257-3266, 2013. ,
On the importance and implications of studying technology non-use, interactions, vol.22, issue.2, pp.52-56, 2015. ,
Missing photos, suffering withdrawal, or finding freedom? how experiences of social media non-use influence the likelihood of reversion, Social Media+ Society, vol.1, issue.2, p.2056305115614851, 2015. ,
Comparing grounded theory and topic modeling: Extreme divergence or unlikely convergence, Journal of the Association for Information Science and Technology, vol.68, issue.6, pp.1397-1410, 2017. ,
The internet of things: Can it find a foothold with mainstream audiences today, 2014. ,
Latent dirichlet allocation, Journal of machine Learning research, vol.3, pp.993-1022, 2003. ,
Departing glances: A sociotechnical account of 'leaving' grindr, New Media & Society, vol.18, issue.3, pp.373-390, 2016. ,
, Business Insider Intelligence: Many people still see smart home voice assistants as a novelty, 2017.
Quantifying and predicting mental illness severity in online pro-eating disorder communities, Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, pp.1171-1184, 2016. ,
Topic modeling of document metadata for visualizing collaborations over time, Proceedings of the 21st International Conference on Intelligent User Interfaces, pp.108-117, 2016. ,
Products as agents: Metaphors for designing the products of the iot age, Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp.448-459, 2017. ,
Devices and data and agents, oh my: How smart home abstractions prime end-user mental models, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol.1, issue.3, p.44, 2017. ,
No longer wearing: investigating the abandonment of personal health-tracking technologies on craigslist, Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp.647-658, 2015. ,
Activity sensing in the wild: a field trial of ubifit garden, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.1797-1806, 2008. ,
Capturing the complexity in advanced technology use: Adaptive structuration theory, Organization science, vol.5, issue.2, pp.121-147, 1994. ,
Beyond abandonment to next steps: understanding and designing for life after personal informatics tool use, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp.1109-1113, 2016. ,
From nobody cares to way to go!: A design framework for social sharing in personal informatics, Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, pp.1622-1636, 2015. ,
A theory of social comparison processes, Human relations, vol.7, issue.2, pp.117-140, 1954. ,
Persuasive technology in the real world: a study of long-term use of activity sensing devices for fitness, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.487-496, 2014. ,
The discovery of grounded theory: strategies for qualitative theory, 1967. ,
The presentation of self in everyday life, 1959. ,
The strength of weak ties, Social networks, pp.347-367, 1977. ,
Regrets, i've had a few: When regretful experiences do (and don't) compel users to leave facebook, Proceedings of the 2018 ACM Conference on Supporting Groupwork, pp.166-177, 2018. ,
Whose space? differences among users and non-users of social network sites, Journal of computer-mediated communication, vol.13, issue.1, pp.276-297, 2007. ,
Activity tracking: barriers, workarounds and customisation, Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp.617-621, 2015. ,
Activity trackers, prior motivation, and perceived informational and motivational affordances. Personal and Ubiquitous Computing pp, pp.1-16, 2017. ,
Resisting consumer technology in rural america: The telephone and electrification. How users matter: The co-construction of users and technology pp, pp.51-66, 2003. ,
The strength of strong ties, Networks in the knowledge economy, vol.82, 2003. ,
Users and nonusers: Interactions between levels of adoption and social capital, Proceedings of the 2013 conference on Computer supported cooperative work, pp.809-820, 2013. ,
Why we use and abandon smart devices, Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp.635-646, 2015. ,
Inside wearables: How the science of human behavior change offers the secret to long-term engagement, Endeavour Partners, vol.200, issue.93, p.1, 2014. ,
Like having a really bad pa: the gulf between user expectation and experience of conversational agents, Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp.5286-5297, 2016. ,
Measuring tie strength, Social forces, vol.63, issue.2, pp.482-501, 1984. ,
Exploring longitudinal use of activity trackers, Healthcare Informatics (ICHI), 2016 IEEE International Conference on, pp.198-206, 2016. ,
Identification and classification of usage patterns in long-term activity tracking, Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp.667-678, 2017. ,
Privacy expectations and preferences in an iot world, Symposium on Usable Privacy and Security (SOUPS, 2017. ,
Purposeful sampling for qualitative data collection and analysis in mixed method implementation research. Administration and Policy in Mental Health and, Mental Health Services Research, vol.42, issue.5, pp.533-544, 2015. ,
Contextual influences on the use and non-use of digital technology while exercising at the gym, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp.2923-2932, 2015. ,
Stories as informal lessons about security, Proceedings of the Eighth Symposium on Usable Privacy and Security, p.6, 2012. ,
Charting design preferences on wellness wearables, Proceedings of the 7th Augmented Human International Conference, p.28, 2016. ,
Personal tracking as lived informatics, Proceedings of the 32nd annual ACM conference on Human factors in computing systems, pp.1163-1172, 2014. ,
Facilitating health behaviour change and its maintenance: Interventions based on self-determination theory, European Health Psychologist, vol.10, issue.1, pp.2-5, 2008. ,
Beyond the user: use and non-use in HCI, Proceedings of the 21st annual conference of the Australian computer-human interaction special interest group: Design: Open 24/7, pp.9-16, 2009. ,
Giving up twitter for lent: how and why we take breaks from social media, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.773-782, 2014. ,
Digital division or digital decision? a study of non-users and low-users of computers, Poetics, vol.34, issue.4-5, pp.273-292, 2006. ,
Use and adoption challenges of wearable activity trackers, Proceedings, 2015. ,
Lessons for the future: Experiences with the installation and use of today?s domestic sensors and technologies, International Conference on Pervasive Computing, pp.383-399, 2006. ,
They came, they surfed, they went back to the beach: Conceptualizing. Virtual society pp, pp.23-40, 2002. ,
Non-users also matter: The construction of users and non-users of the internet. Now Users Matter: The Co-construction of Users and Technology pp, pp.67-79, 2003. ,
Facebook is a luxury: An exploratory study of social media use in rural kenya, Proceedings of the 2013 conference on Computer supported cooperative work, pp.33-44, 2013. ,
Learning from a learning thermostat: lessons for intelligent systems for the home, Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, pp.93-102, 2013. ,