{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:27:01Z","timestamp":1725575221023},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/cyberc.2014.59","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T23:45:14Z","timestamp":1419983114000},"page":"290-296","source":"Crossref","is-referenced-by-count":0,"title":["A Study on the Use Contexts of Personal Computing Devices Using a Diary Study Method"],"prefix":"10.1109","author":[{"given":"Jimin","family":"Kim","sequence":"first","affiliation":[]},{"given":"Younghoon","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Siew Fan","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Myeong-Cheol","family":"Park","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/65.313011"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1007\/978-3-540-74255-5_42"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1080\/10447310801920524"},{"key":"18","first-page":"21","article-title":"Exploiting context in HCI design for mobile systems","author":"rodden","year":"1998","journal-title":"Human Computer Interaction with Mobile Devices"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1016\/j.im.2008.11.008"},{"year":"2004","author":"mccarthy","journal-title":"Technology as Experience","key":"16"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1207\/s15327590ijhc1803_2"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1006\/ijhc.2001.0486"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/MPRV.2003.1228526"},{"key":"12","article-title":"Attitudes towards user experience (UX) measurement","author":"law","year":"2013","journal-title":"International Journal of Human-Computer Studies"},{"year":"2008","author":"wackerly","journal-title":"Mathematical Statistics with Applications","key":"21"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1016\/j.chb.2010.11.008"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1109\/WMCSA.1994.16"},{"year":"2013","author":"albert","journal-title":"Measuring the User Experience Collecting Analyzing and Presenting Usability Metrics","key":"2"},{"key":"1","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1007\/3-540-48157-5_29","author":"abowd","year":"1999","journal-title":"Towards A Better Understanding of Context and Context-awareness Handheld and Ubiquitous Computing"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/2043932.2043993"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1016\/j.tele.2012.02.002"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1214\/aoms\/1177729380"},{"key":"5","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1145\/1054972.1055098","article-title":"When participants do the capturing: The role of media in diary studies","author":"carter","year":"2005","journal-title":"Proceedings of the SIGCHI conference on Human factors in computing systems"},{"key":"4","first-page":"27","article-title":"Empirical evaluation of user experience in two adaptive mobile application prototypes","author":"arhippainen","year":"2003","journal-title":"Proceedings of the 2nd International Conference on Mobile and Ubiquitous Multimedia"},{"year":"2012","author":"kim","journal-title":"An Introduction to Human Computer Interaction","key":"9"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1007\/s007790170019"}],"event":{"name":"2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","start":{"date-parts":[[2014,10,13]]},"location":"Shanghai, China","end":{"date-parts":[[2014,10,15]]}},"container-title":["2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6975797\/6984259\/06984322.pdf?arnumber=6984322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T17:18:38Z","timestamp":1650907118000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6984322\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cyberc.2014.59","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}