141 research outputs found

    "Mothers as Candy Wrappers": Critical Infrastructure Supporting the Transition into Motherhood

    Get PDF
    Copyright Š ACM. The transition into motherhood is a complicated and often unsupported major life disruption. To alleviate mental health issues and to support identity re-negotiation, mothers are increasingly turning to online mothers\u27 groups, particularly private and secret Facebook groups; these can provide a complex system of social, emotional, and practical support for new mothers. In this paper we present findings from an exploratory interview study of how new mothers create, find, use, and participate in ICTs, specifically online mothers\u27 groups, to combat the lack of formal support systems by developing substitute networks. Utilizing a framework of critical infrastructures, we found that these online substitute networks were created by women, for women, in an effort to fill much needed social, political, and medical gaps that fail to see \u27woman and mother\u27 as a whole being, rather than simply as a \u27discarded candy wrapper\u27. Our study contributes to the growing literature on ICT use by mothers for supporting and negotiating new identities, by illustrating how these infrastructures can be re-designed and appropriated in use, for critical utilization

    Interactive Performance as a Means of Civic Dialogue

    Get PDF

    Internet Ecologies of New Mothers: Trust, Variety and Strategies for Managing Diverse Information Sources

    Get PDF
    New parents are faced with the challenge of quickly acquiring a new base of knowledge, while simultaneously navigating a significant life change. While both new mothers and fathers experience new and unique parental demands, their early caregiving challenges differ and new mothers often search for different types of support and information online. We here present findings from an exploratory interview study of how new first-time mothers navigate online resources as they transition into parenthood. We find that many parenting tasks are supported by a variety of resources, which are often used in combination to accomplish a task. We also found that variety in sources was often valued over general source credibility, and new mothers relied on their own ability to filter information to assess how much to trust information. We also provide more general insight into the methods individuals used to gain domain knowledge in a completely new area

    Picking pockets on the lawn: the development of tactics and strategies in a mobile game

    Get PDF
    This paper presents Treasure, an outdoor mobile multiplayer game inspired by Weiser’s notion of seams, gaps and breaks in different media. Playing Treasure involves movement in and out of a wi-fi network, using PDAs to pick up virtual ’coins’ that may be scattered outside network coverage. Coins have to be uploaded to a server to gain game points, and players can collaborate with teammates to double the points given for an upload. Players can also steal coins from opponents. As they move around, players’ PDAs sample network signal strength and update coverage maps. Reporting on a study of players taking part in multiple games, we discuss how their tactics and strategies developed as their experience grew with successive games. We suggest that meaningful play arises in just this way, and that repeated play is vital when evaluating such games

    Domino: exploring mobile collaborative software adaptation

    Get PDF
    Social Proximity Applications (SPAs) are a promising new area for ubicomp software that exploits the everyday changes in the proximity of mobile users. While a number of applications facilitate simple file sharing between co–present users, this paper explores opportunities for recommending and sharing software between users. We describe an architecture that allows the recommendation of new system components from systems with similar histories of use. Software components and usage histories are exchanged between mobile users who are in proximity with each other. We apply this architecture in a mobile strategy game in which players adapt and upgrade their game using components from other players, progressing through the game through sharing tools and history. More broadly, we discuss the general application of this technique as well as the security and privacy challenges to such an approach
    • …
    corecore