<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2007-3607</journal-id>
<journal-title><![CDATA[PAAKAT: revista de tecnología y sociedad]]></journal-title>
<abbrev-journal-title><![CDATA[PAAKAT: rev. tecnol. soc.]]></abbrev-journal-title>
<issn>2007-3607</issn>
<publisher>
<publisher-name><![CDATA[Universidad de Guadalajara, Sistema de Universidad Virtual]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2007-36072020000100003</article-id>
<article-id pub-id-type="doi">10.32870/pk.a10n18.410</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Perspectivas sobre la computación ubicua]]></article-title>
<article-title xml:lang="en"><![CDATA[Perspectives on ubiquitous computing]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ramón Rossi]]></surname>
<given-names><![CDATA[Luis Sebastián]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Nacional de Entre Ríos  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Argentina</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2020</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2020</year>
</pub-date>
<volume>10</volume>
<numero>18</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S2007-36072020000100003&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S2007-36072020000100003&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S2007-36072020000100003&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Este artículo presenta tres perspectivas analíticas sobre la relación entre computación ubicua (ubicomp) y diversas dimensiones sociales y culturales. Para ello, se reconstruyen las últimas tres décadas de producción teórica sobre el tema. En el primer apartado se analizan posiciones instrumentalistas que examinan el impacto, la aplicación y la adopción de estos desarrollos en distintas áreas, así como las tendencias que descubren su complejidad. Posteriormente, en una segunda sección se indagan los dilemas éticos y las críticas culturales que surgen ante la omnipresencia de la informática (pervasive computing). En tercer lugar se estudian las tendencias políticas que emergen ante la ubicomp. Por último, se recuperan las potencialidades abiertas al pensar estas perspectivas en conjunto]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract This paper presents three analytical perspectives on the relationship between ubiquitous computing (ubicomp) and various social and cultural dimensions. To achieve such aim, the study reconstructs the last three decades of theoretical production on the subject. Firstly, the paper analyzes instrumentalist positions about the impact, application and adoption of these developments in different areas as well as the trends that reveal their complexity. Then, in a second section, attention is turned to the ethical dilemmas and cultural criticisms that arise before pervasive computing. Thirdly, the study focuses on the political tendencies that emerge over ubicomp. Finally, conclusions about the potential of thinking these perspectives as a whole are drawn.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Informática omnipresente]]></kwd>
<kwd lng="es"><![CDATA[ambientes inteligentes]]></kwd>
<kwd lng="es"><![CDATA[instrumentalismo]]></kwd>
<kwd lng="es"><![CDATA[dilemas éticos]]></kwd>
<kwd lng="es"><![CDATA[problemas políticos]]></kwd>
<kwd lng="en"><![CDATA[Pervasive computing]]></kwd>
<kwd lng="en"><![CDATA[ambience intelligence]]></kwd>
<kwd lng="en"><![CDATA[instrumentalism]]></kwd>
<kwd lng="en"><![CDATA[ethical dilemmas]]></kwd>
<kwd lng="en"><![CDATA[political problems]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abowd]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Beyond Weiser: From ubiquitous to collective computing]]></article-title>
<source><![CDATA[Computer]]></source>
<year>2016</year>
<volume>49</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>17-23</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Adamowsky]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Smarte Götter und magische Maschinen: zur Virulenz vormoderner Argumentationsmuster in Ubiquitous-Computing-Visionen]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Mattern]]></surname>
</name>
</person-group>
<source><![CDATA[Total vernetzt]]></source>
<year>2003</year>
<page-range>231-47</page-range><publisher-loc><![CDATA[Berlín ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Anderson]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[The ethics of research into invasive technologies]]></source>
<year>1991</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[Rank Xerox EuroPARC]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Araya]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Questioning ubiquitous computing]]></source>
<year>1995</year>
<conf-name><![CDATA[ 23annual conference on Computer science]]></conf-name>
<conf-loc> </conf-loc>
<page-range>230-7</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Badiou]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[¿Existe algo así como una política deleuziana?]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Zarka]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Deleuze, político]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Nueva Visión]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barkhuus]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Grace Hopper Celebration of Women in Computing]]></source>
<year>2006</year>
<conf-name><![CDATA[ Designing ubiquitous computing technologies to motivate fitness and health]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barkhuus]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Dourish]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Everyday encounters with context-aware computing in a campus environment]]></source>
<year>2004</year>
<conf-name><![CDATA[ International Conference on Ubiquitous Computing]]></conf-name>
<conf-loc> </conf-loc>
<page-range>232-49</page-range><publisher-loc><![CDATA[Berlín ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Begole]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Ubiquitous Computing for Business]]></source>
<year>2011</year>
<publisher-loc><![CDATA[New Jersey ]]></publisher-loc>
<publisher-name><![CDATA[Ft Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bell]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Brooke]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Churchill]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Paulos]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Intimate ubiquitous computing]]></source>
<year>2003</year>
<page-range>3-6</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bohn]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Coroama]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Langheinrich]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Mattern]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Rohs]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Social, economic, and ethical implications of ambient intelligence and ubiquitous computing]]></source>
<year>2005</year>
<page-range>5-29</page-range><publisher-loc><![CDATA[Berlín ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Broek]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ubiquitous emotion-aware computing]]></article-title>
<source><![CDATA[Personal and Ubiquitous Computing]]></source>
<year>2013</year>
<volume>17</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>53-67</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cardon]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Casilli]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Qu'est-ce que le digital labor?]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Bry-sur-Marne ]]></publisher-loc>
<publisher-name><![CDATA[INA]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<collab>CEPAL</collab>
<source><![CDATA[Datos, algoritmos y políticas]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Santiago ]]></publisher-loc>
<publisher-name><![CDATA[Comisión Económica para América Latina y el Caribe]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Crabtree]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Benford]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Greenhalgh]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Tennent]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Chalmers]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Brown]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Supporting ethnographic studies of ubiquitous computing in the wild]]></source>
<year>2006</year>
<conf-name><![CDATA[ Symposium on Designing Interactive Systems]]></conf-name>
<conf-loc> </conf-loc>
<page-range>60-9</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Crary]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[24/7. Late capitalism and the Ends of Sleep]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Verso Books]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Ruyter]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Aarts]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Ambient intelligence: visualizing the future]]></source>
<year>2004</year>
<conf-name><![CDATA[ working conference on Advanced visual interfaces]]></conf-name>
<conf-loc> </conf-loc>
<page-range>203-8</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dourish]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Bell]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Divining a digital future]]></source>
<year>2011</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[MIT Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dyer-Witheford]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyber-Proletariat]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Pluto Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ekman]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Díaz]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Ubiquitous Computing, Complexity and Culture]]></source>
<year>2016</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Floridi]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[The fourth revolution]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Oxford ]]></publisher-loc>
<publisher-name><![CDATA[OUP]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fuchs]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Labour and Karl Marx]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fuller]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ekman]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
</person-group>
<source><![CDATA[Throughout: art and culture emerging with ubiquitous computing]]></source>
<year>2013</year>
<publisher-name><![CDATA[MIT Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gali&#269;]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Timan]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Koops]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bentham, Deleuze and beyond: an overview of surveillance theories from the panopticon to participation]]></article-title>
<source><![CDATA[Philosophy &amp; Technology]]></source>
<year>2017</year>
<volume>30</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>9-37</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Galloway]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Intimations of everyday life: Ubiquitous computing and the city]]></article-title>
<source><![CDATA[Cultural Studies]]></source>
<year>2004</year>
<volume>18</volume>
<numero>2-3</numero>
<issue>2-3</issue>
<page-range>384-408</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Geihs]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Leimeister]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Roßnagel]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Schmidt]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[On Socio-technical Enablers for Ubiquitous Computing Applications]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Godin]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[L'innovation sous tension]]></source>
<year>2017</year>
<publisher-loc><![CDATA[Laval ]]></publisher-loc>
<publisher-name><![CDATA[PUL]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Greenfield]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Everyware: The dawning age of ubiquitous computing]]></source>
<year>2006</year>
<publisher-loc><![CDATA[Berkeley ]]></publisher-loc>
<publisher-name><![CDATA[New Riders]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grudin]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Group dynamics and ubiquitous computing]]></article-title>
<source><![CDATA[Communications of the ACM]]></source>
<year>2002</year>
<volume>45</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>74-8</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guattari]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Líneas de fuga]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Cactus]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Howard]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Pax Technica. How Internet of things may set us free or lock us up]]></source>
<year>2015</year>
<publisher-loc><![CDATA[New Haven ]]></publisher-loc>
<publisher-name><![CDATA[Yale UP]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hui]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[On the existence of digital objects]]></source>
<year>2017</year>
<publisher-loc><![CDATA[Minnesota ]]></publisher-loc>
<publisher-name><![CDATA[UMP]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jessup]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Robey]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The relevance of social issues in ubiquitous computing environments]]></article-title>
<source><![CDATA[Communications of the ACM]]></source>
<year>2002</year>
<volume>45</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>88-91</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khosrow-Pour]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Encyclopedia of Information Science and Technology]]></source>
<year>2018</year>
<edition>4</edition>
<publisher-loc><![CDATA[Hershey ]]></publisher-loc>
<publisher-name><![CDATA[IGI Global]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kinder-Kurlanda]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Nihan]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Ubiquitous Computing in the Workplace: What Ethical Issues?]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kittler]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Short Cuts]]></source>
<year>2002</year>
<publisher-loc><![CDATA[Frankfurt am Main ]]></publisher-loc>
<publisher-name><![CDATA[Zweitausendeins]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Krumm]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Ubiquitous Computing Fundamentals]]></source>
<year>2016</year>
<publisher-loc><![CDATA[Florida ]]></publisher-loc>
<publisher-name><![CDATA[Chapman and Hall/CRC]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Langheinrich]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Coroama]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Bohn]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rohs]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[As we may live: Real-world implications of ubiquitous computing]]></source>
<year>2002</year>
<publisher-name><![CDATA[ETH Zurich]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lazzarato]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Signs and Machines]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Los Ángeles ]]></publisher-loc>
<publisher-name><![CDATA[Semiotext(e)]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Le Dantec]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Farrell]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Christensen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Bailey]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ellis]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Kellogg]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Edwards]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Publics in practice: Ubiquitous computing at a shelter for homeless mothers]]></source>
<year>2011</year>
<conf-name><![CDATA[ SIGCHI Conference]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1687-96</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mainwaring]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[M. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Anderson]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Infrastructures and their discontents: Implications for ubicomp]]></source>
<year>2004</year>
<conf-name><![CDATA[ International Conference on Ubiquitous Computing]]></conf-name>
<conf-loc> </conf-loc>
<page-range>418-32</page-range><publisher-loc><![CDATA[Berlín ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mattern]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ubiquitous Computing: Scenarios from an informatised world]]></article-title>
<source><![CDATA[E-Merging Media-Communication and the Media Economy of the Future]]></source>
<year>2005</year>
<page-range>145-63</page-range><publisher-loc><![CDATA[Heidelberg ]]></publisher-loc>
<publisher-name><![CDATA[Springer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mayer-Schönberger]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Useful void: The art of forgetting in the age of ubiquitous computing]]></source>
<year>2007</year>
<publisher-name><![CDATA[John F. Kennedy School of Government]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McChesney]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital disconnect]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[New Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McCullough]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Ambient commons]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[MIT Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mills]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Gilbert Simondon: Information, Technology &amp; Media]]></source>
<year>2016</year>
<publisher-name><![CDATA[Roman &amp; Littlefield International]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Milner]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ubiquitous computing: shall we understand it?]]></article-title>
<source><![CDATA[The Computer Journal]]></source>
<year>2006</year>
<volume>49</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>383-9</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Morozov]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Silicon Valley: i signori del silicio]]></source>
<year>2016</year>
<publisher-loc><![CDATA[Italia ]]></publisher-loc>
<publisher-name><![CDATA[Codice Edizioni]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Morris]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Lundell]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Dishman]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Catalyzing social interaction with ubiquitous computing]]></article-title>
<source><![CDATA[Human factors in computing systems]]></source>
<year>2004</year>
<page-range>1151-4</page-range><publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mosco]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Becoming digital: Toward a post-internet society]]></source>
<year>2017</year>
<publisher-loc><![CDATA[Bingley ]]></publisher-loc>
<publisher-name><![CDATA[Emerald Publishing Limited]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Parisi]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Contagious architecture: computation, aesthetics, and space]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[MIT Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Persson]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Social Ubiquitous computing]]></source>
<year>2001</year>
<publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Picard]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Affective computing]]></source>
<year>2000</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[MIT Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rogers]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Moving on from Weiser&#8217;s vision of calm computing]]></source>
<year>2006</year>
<conf-name><![CDATA[ International Conference on Ubiquitous Computing]]></conf-name>
<conf-loc> </conf-loc>
<page-range>404-21</page-range><publisher-loc><![CDATA[Berlín ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rogers]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[HCI theory: classical, modern, and contemporary]]></article-title>
<source><![CDATA[Synthesis Lectures on Human-Centered Informatics]]></source>
<year>2012</year>
<volume>5</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1-129</page-range></nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ronzani]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The battle of concepts: Ubiquitous Computing, pervasive computing and ambient intelligence in Mass Media]]></article-title>
<source><![CDATA[Ubiquitous Computing and Communication Journal]]></source>
<year>2009</year>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>9-19</page-range></nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rossi]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Agenciamientos en las sociedades de control]]></article-title>
<source><![CDATA[Revista CUHSO]]></source>
<year>2018</year>
<volume>28</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>177-206</page-range><publisher-loc><![CDATA[Chile ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rossi]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El modo de existencia de las imágenes a la luz de Simondon]]></article-title>
<source><![CDATA[Revista Reflexiones Marginales, Saberes De Frontera]]></source>
<year>2018</year>
<publisher-name><![CDATA[UNAM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rossi]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Una aproximación a la crítica stiegleriana del capitalismo contemporáneo]]></source>
<year>2018</year>
<conf-name><![CDATA[ IXJornadas Debates Actuales de la Teoría Política Contemporánea]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rouvroy]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Berns]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Gubernamentalidad algorítmica y perspectiva de emancipación]]></article-title>
<source><![CDATA[Adenda Filosófica]]></source>
<year>2016</year>
<volume>1</volume>
<page-range>88-116</page-range></nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Saha]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Mukherjee]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Pervasive computing]]></article-title>
<source><![CDATA[Computer]]></source>
<year>2003</year>
<volume>3</volume>
<page-range>25-31</page-range></nlm-citation>
</ref>
<ref id="B61">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schick]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Malmborg]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bodies, embodiment and ubiquitous computing]]></article-title>
<source><![CDATA[Digital Creativity]]></source>
<year>2010</year>
<volume>21</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>63-9</page-range></nlm-citation>
</ref>
<ref id="B62">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sengers]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Kayne]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Boehner]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Fairbank]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Culturally embedded computing]]></article-title>
<source><![CDATA[IEEE Pervasive Computing]]></source>
<year>2004</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>14-21</page-range></nlm-citation>
</ref>
<ref id="B63">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Spigel]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Designing the smart house: Posthuman domesticity and conspicuous production]]></article-title>
<source><![CDATA[European Journal of Cultural Studies]]></source>
<year>2005</year>
<volume>8</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>403-26</page-range></nlm-citation>
</ref>
<ref id="B64">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Srnicek]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Platform capitalism]]></source>
<year>2017</year>
<publisher-name><![CDATA[John Wiley &amp; Sons]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B65">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stiegler]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[La Société automatique: 1. L'avenir du travail]]></source>
<year>2015</year>
<publisher-loc><![CDATA[París ]]></publisher-loc>
<publisher-name><![CDATA[Fayard]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B66">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tennenhouse]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Proactive computing]]></article-title>
<source><![CDATA[Communications of the ACM]]></source>
<year>2000</year>
<volume>43</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>43-50</page-range></nlm-citation>
</ref>
<ref id="B67">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vercellone]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Capitalismo cognitivo]]></source>
<year>2011</year>
<publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Prometeo]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B68">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vetere]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Howard]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Gibbs]]></surname>
<given-names><![CDATA[M. R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Phatic technologies]]></source>
<year>2005</year>
<publisher-name><![CDATA[ACM CHI]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B69">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Bodily]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Gupta]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Supporting persistent social groups in ubiquitous computing environments using context-aware ephemeral group service]]></source>
<year>2004</year>
<conf-name><![CDATA[ Pervasive Computing and Communications]]></conf-name>
<conf-loc> </conf-loc>
<page-range>287-96</page-range></nlm-citation>
</ref>
<ref id="B70">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Weiser]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Computer for the 21st Century]]></article-title>
<source><![CDATA[Scientific American]]></source>
<year>1991</year>
<volume>265</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>94-105</page-range></nlm-citation>
</ref>
<ref id="B71">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Winner]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The voluntary complexity movement]]></article-title>
<source><![CDATA[Science as Culture]]></source>
<year>2000</year>
<volume>9</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>103-7</page-range></nlm-citation>
</ref>
<ref id="B72">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yoo]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Lyytinen]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social impacts of ubiquitous computing]]></article-title>
<source><![CDATA[Information and organization]]></source>
<year>2005</year>
<volume>15</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>91-4</page-range></nlm-citation>
</ref>
<ref id="B73">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zeal]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Rens]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Conceptualizing Social Influence in the Ubiquitous Computing Era]]></source>
<year>2010</year>
<page-range>261</page-range><publisher-name><![CDATA[ICIS]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B74">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zittrain]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ubiquitous human computing]]></article-title>
<source><![CDATA[Philosophical transactions of the royal society of London]]></source>
<year>2008</year>
<volume>366</volume>
<numero>1881</numero>
<issue>1881</issue>
<page-range>3813-21</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
