Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2010
DOI: 10.1145/1753326.1753719
|View full text |Cite
|
Sign up to set email alerts
|

Deliberate interactions

Abstract: We present results from a qualitative study examining how professionals living and working in Nairobi, Kenya regularly use ICT in their everyday lives. There are two contributions of this work for the HCI community. First, we provide empirical evidence demonstrating constraints our participants encountered when using technology in an infrastructure-poor setting. These constraints are limited bandwidth, high costs, differing perceptions of responsiveness, and threats to physical and virtual security. Second, we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 64 publications
(12 citation statements)
references
References 35 publications
0
10
0
Order By: Relevance
“…Indeed, it may often not be the same "internet" on the mobile, as access modes range from accessing WAP sites to running enclosed applications, such as a chat clients, to downloading premium content or games from operator websites [33]. We join other recent HCI papers to explore communicative ecologies and repertoires in resource constrained settings [34,35]. Communicative ecologies involve interactions among technologies, sociality, and discourse [36,37].…”
Section: Framing/perspectivementioning
confidence: 99%
“…Indeed, it may often not be the same "internet" on the mobile, as access modes range from accessing WAP sites to running enclosed applications, such as a chat clients, to downloading premium content or games from operator websites [33]. We join other recent HCI papers to explore communicative ecologies and repertoires in resource constrained settings [34,35]. Communicative ecologies involve interactions among technologies, sociality, and discourse [36,37].…”
Section: Framing/perspectivementioning
confidence: 99%
“…Two of these researchers then reviewed the full data set across locations. Standard thematic analysis and reflection techniques were used as in other field work of this nature (e.g., [50])…”
Section: Methodsmentioning
confidence: 99%
“…Many emergent users are very aware of the dangers they face on a daily basis [50]. Understandably, then, participants were particularly protective and cautious about valuables such as mobile phones that are a tempting target for thieves -they would never use their phone in public view.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…However, Research that focuses on constrained web search and web access is either dated [23,26] or, in the case of more recent work, is in the context of mobile devices [7,41,34,43,18,21]. While there is extensive literature about web usage in general, particularly in the WWW community [1], until very recently little effort has been directed at understanding the unique characteristics of Internet use in developing regions [13,9,40]. A few network constrained applications have been designed and implemented by splitting the application into a fully synchronous front end and an asynchronous back end [40,24,37,8].…”
Section: Introductionmentioning
confidence: 99%