skip to main content
research-article
Public Access

'Routine Infrastructuring' as 'Building Everyday Resilience with Technology': When Disruption Becomes Ordinary

Published:07 November 2019Publication History
Skip Abstract Section

Abstract

Getting a divorce. Being diagnosed with a disease. Going through a relationship breakup. Living through a natural disaster. All of these events are often life disrupting and debilitating. While some disruptive events are short-lived, some can be a routine part of everyday life. This leads to the question of how people who experience prolonged disruption in their lives build resilience---that is, how do they manage and overcome such events? To explore this question, this paper utilizes a case study approach to explore the use, creation, and re-appropriation of technology across three prolonged disruptions-the Second Gulf War in Iraq, veteran transitions, and the coming out experiences of LGBTQ-identifying people. Using a conceptual frame that brings together routine dynamics and infrastructuring, we find that engaging in routine infrastructuring practices generated resilience in people's daily lives---a phenomenon we dub 'routine infrastructuring' as 'building everyday resilience with technology.' We then theorize properties of infrastructure and infrastructuring practice that enable resiliency, and conclude with how infrastructuring is a form of care work that is oriented towards individuals, communities, and society.

References

  1. Konstantin Aal, George Yerousis, Kai Schubert, Dominik Hornung, Oliver Stickel, and Volker Wulf. 2014. Come_in@Palestine: Adapting a German computer club concept to a Palestinian refugee camp. In Proceedings of the 5th ACM International Conference on Collaboration across Boundaries: Culture, Distance & Technology. ACM, 111--120.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Veterans Health Administration. [n.d.]. Review of Alleged Mismanagement at the Health Eligibility Center. http://www.va.gov/oig/publications/report-summary.asp?id=3586Google ScholarGoogle Scholar
  3. Tawfiq Ammari and Sarita Schoenebeck. 2015. Understanding and Supporting Fathers and Fatherhood on Social Media Sites. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 1905--1914.https://doi.org/10.1145/2702123.2702205Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Jeffrey Bardzell and Shaowen Bardzell. 2013. What is "Critical" about Critical Design?. In SIGCHI Conference on Human Factors in Computing Systems. ACM, 3297--3306.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Shaowen Bardzell. 2010. Feminist HCI: Taking stock and outlining an agenda for design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1301--1310. https://doi.org/10.1145/1753326.1753521Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Shaowen Bardzell, Shad Gross, Jeffrey Wain, Austin Toombs, and Jeffrey Bardzell. 2011. The significant screwdriver:care, domestic masculinity, and interaction design. In Proceedings of the 25th BCS Conference on Human-Computer Interaction. British Computer Society, 371--377.Google ScholarGoogle Scholar
  7. Geoffrey Bowker. 1994. Information mythology: The world of/as information.Information acumen: The understanding and use of knowledge in modern business(1994), 231--247.Google ScholarGoogle Scholar
  8. Geoffrey C Bowker, Karen Baker, Florence Millerand, and David Ribes. 2009. Toward information infrastructure studies:Ways of knowing in a networked environment. In International Handbook of Internet Research. Springer, 97--117.Google ScholarGoogle Scholar
  9. Moira Burke and Robert Kraut. 2013. Using Facebook after losing a job: Differential benefits of strong and weak ties. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work. ACM, 1419--1430. https://doi.org/10.1145/2441776.2441936Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Bendik Bygstad. 2010. Generative mechanisms for innovation in information infrastructures. Information and Organization 20, 3--4 (2010), 156--168.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Joseph J Collins. 1998. The complex context of American military culture: A practitioner's view. Washington Quarterly21, 4 (1998), 213--228. https://doi.org/10.1080/01636609809550359Google ScholarGoogle Scholar
  12. L Comfort. 2007. Shared risk: Complex systems in seismic response.Google ScholarGoogle Scholar
  13. Jill P Dimond, Casey Fiesler, and Amy S Bruckman. 2011. Domestic violence and information communication technologies. Interacting with Computers23, 5 (2011), 413--421. https://doi.org/10.1016/j.intcom.2011.04.006Google ScholarGoogle Scholar
  14. Michaelanne Dye, David Nemer, Josiah Mangiameli, Amy Bruckman, and Neha Kumar. 2018. The human infrastructure of El Paquete, Cuba's offline internet. Interactions 26, 1 (2018), 58--62.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Brianna Dym, Casey Fiesler, Jed R Brubaker, and Bryan Semaan. [n.d.]. "Coming out okay": Community narratives for LGBTQ identity recovery work.Google ScholarGoogle Scholar
  16. Tineke M Egyedi and Donna C Mehos. 2012.Inverse infrastructures: Disrupting networks from below. Edward Elgar Publishing. https://doi.org/10.4337/9781781952290Google ScholarGoogle Scholar
  17. Ingrid Erickson and Mohammad Hossein Jarrahi. 2016. Infrastructuring and the challenge of dynamic seams in mobile knowledge work. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 1323--1336. https://doi.org/10.1145/2818048.2820015Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Martha S Feldman. 2000. Organizational routines as a source of continuous change. Organization Science11, 6 (2000), 611--629.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Casey Fiesler. 2007. Everything I need to know I learned from fandom: How existing social norms can help shape the next generation of user-generated content. Vand. J. Ent. & Tech. L.10 (2007), 729.Google ScholarGoogle Scholar
  20. Casey Fiesler, Shannon Morrison, and Amy S Bruckman. 2016. An archive of their own: A case study of feminist HCI and values in design. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM,2574--2585. https://doi.org/10.1145/2858036.2858409Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Casey Fiesler, Shannon Morrison, R Benjamin Shapiro, and Amy S Bruckman. 2017. Growing their own: Legitimate peripheral participation for computational learning in an online fandom community. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM, 1375--1386.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Linda Garnets, Gregory M Herek, and Barrie Levy. 1990. Violence and victimization of lesbians and gay men: Mental health consequences. Journal of Interpersonal Violence5, 3 (1990), 366--383.Google ScholarGoogle ScholarCross RefCross Ref
  23. Anthony Giddens. 1991.Modernity and self-identity: Self and society in the late modern age. Stanford University Press.Google ScholarGoogle Scholar
  24. Chris Hagar and Caroline Haythornthwaite. 2005. Crisis, farming & community. The Journal of Community Informatics1, 3 (2005).Google ScholarGoogle Scholar
  25. Oliver L Haimson, Jed R Brubaker, Lynn Dombrowski, and Gillian R Hayes. 2015. Disclosure, stress, and support during gender transition on Facebook. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. ACM, 1176--1190. https://doi.org/10.1145/2675133.2675152Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Foad Hamidi, Morgan Klaus Scheuerman, and Stacy M Branham. 2018. Gender recognition or gender reductionism?: The social implications of embedded gender recognition systems. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, 8.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Ole Hanseth and Kalle Lyytinen. 2010. Design theory for dynamic complexity in information infrastructures: the case of building internet.Journal of Information Technology 25, 1 (2010), 1--19.Google ScholarGoogle Scholar
  28. Donna Haraway. 2006. A cyborg manifesto: Science, technology, and socialist-feminism in the late 20th century. In The International Handbook of Virtual Learning Environments. Springer, 117--158. https://doi.org/10.1007/978--1--4020--3803--7_4Google ScholarGoogle Scholar
  29. Erik Hollnagel, David D Woods, and Nancy Leveson. 2006. Resilience engineering: Concepts and precepts. Ashgate Publishing, Ltd.Google ScholarGoogle Scholar
  30. Herminia Ibarra and Jennifer L Petriglieri. 2010. Identity work and play. Journal of Organizational Change Management 23, 1 (2010), 10--25.Google ScholarGoogle ScholarCross RefCross Ref
  31. Steven J Jackson. 2014. Rethinking Repair. Media technologies: Essays on communication, materiality, and society(2014),221--239. https://doi.org/10.7551/mitpress/9780262525374.003.0011Google ScholarGoogle Scholar
  32. Jane Jacobs. 1992. The death and life of great American cities. 1961. New York: Vintage(1992).Google ScholarGoogle Scholar
  33. Eric Klinenberg. 2015.Heat wave: A social autopsy of disaster in Chicago. University of Chicago Press. https://doi.org/10.7208/chicago/9780226026718.001.0001Google ScholarGoogle Scholar
  34. Julie Konik and Abigail Stewart. 2004. Sexual identity development in the context of compulsory heterosexuality. Journal of Personality 72, 4 (2004), 815--844.Google ScholarGoogle ScholarCross RefCross Ref
  35. Matthias Korn and Amy Voida. 2015. Creating friction: Infrastructuring civic engagement in everyday life. In Proceedings of The Fifth Decennial Aarhus Conference on Critical Alternatives. Aarhus University Press, 145--156.https://doi.org/10.7146/aahcc.v1i1.21198Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Brian M. Landry, Eun Kyoung Choe, Stephen McCutcheon, and Julie A. Kientz. 2010. Post-traumatic stress disorder. Proceedings of the ACM International Conference on Health Informatics(2010), 780. https://doi.org/10.1145/1882992.1883110Google ScholarGoogle Scholar
  37. Christopher A Le Dantec and W Keith Edwards. 2008. Designs on dignity: Perceptions of technology among the homeless. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 627--636. https://doi.org/10.1145/1357054.1357155Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Charlotte P Lee, Paul Dourish, and Gloria Mark. 2006. The human infrastructure of cyber infrastructure. In Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work. ACM, 483--492. https://doi.org/10.1145/1180875.1180950Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Caitlin Lustig and Bonnie Nardi. 2015. Algorithmic authority: The case of Bitcoin. In2015 48th Hawaii International Conference on System Sciences. IEEE, 743--752.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Kalle Lyytinen, Carsten Sørensen, and David Tilson. 2017. Generativity in digital infrastructures: A research note. In The Routledge Companion to Management Information Systems. Routledge, 253--275.Google ScholarGoogle Scholar
  41. S F J Mak, R Williams, and J Mackness. 2010. Blogs and forums as communication and learning tools in a MOOC. Proceedings of the 7th International Conference on Networked Learning 2010(2010), 275--285. https://doi.org/10.1162/dmal.9780262524834.071Google ScholarGoogle Scholar
  42. Diane Maloney-Krichmar and Jenny Preece. 2005. A multilevel analysis of sociability, usability, and community dynamics in an online health community. ACM Transactions on Computer-Human Interaction 12, 2 (2005), 201--232.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Siambabala Bernard Manyena. 2006. The concept of resilience revisited. Disasters 30, 4 (2006), 434--450.Google ScholarGoogle ScholarCross RefCross Ref
  44. Gloria Mark and Bryan Semaan. 2008. Resilience in collaboration: Technology as a resource for new patterns of action.InProceedings of the 2008 ACM Conference on Computer supported Cooperative Work. ACM, 137--146.Google ScholarGoogle Scholar
  45. Gloria J Mark, Ban Al-Ani, and Bryan Semaan. 2009. Resilience through technology adoption: Merging the old and thenew in Iraq. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 689--698.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Michael Massimi, Jackie L Bender, Holly O Witteman, and Osman H Ahmed. 2014. Life transitions and online health communities: reflecting on adoption, use, and disengagement. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing. ACM, 1491--1501.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Michael Massimi, Jill P Dimond, and Christopher A Le Dantec. 2012. Finding a new normal: the role of technology in life disruptions. In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work. ACM, 719--728.https://doi.org/10.1145/2145204.2145314Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Tsubasa Morioka, Nicole B Ellison, and Michael Brown. 2016. Identity Work on Social Network Sites: Disadvantaged Students' College Transition Processes. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. 848--859.Google ScholarGoogle Scholar
  49. National Alliance to End Homelessness. 2015. Veterans. http://www.endhomelessness.org/pages/veteransGoogle ScholarGoogle Scholar
  50. Wanda J Orlikowski. 1992. The duality of technology: Rethinking the concept of technology in organizations. Organization science 3, 3 (1992), 398--427.Google ScholarGoogle Scholar
  51. Leysia Palen and Sophia B Liu. 2007. Citizen communications in crisis: Anticipating a future of ICT-supported public participation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 727--736.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Leysia Palen and Sarah Vieweg. 2008. The emergence of online wide scale interaction in unexpected events: Assistance, alliance & retreat. In Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work. ACM, 117--126.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Brian T Pentland, Martha S Feldman, Markus C Becker, and Peng Liu. 2012. Dynamics of organizational routines: A generative model.Journal of Management Studies 49, 8 (2012), 1484--1508.Google ScholarGoogle Scholar
  54. Volkmar Pipek and Volker Wulf. 2009. Infrastructuring: Toward an integrated perspective on the design and use of information technology.Journal of the Association for Information Systems 10, 5 (2009), 447.Google ScholarGoogle Scholar
  55. Robert D Putnam. 2000. Bowling alone: America's declining social capital. In Culture and Politics. Springer, 223--234.Google ScholarGoogle ScholarCross RefCross Ref
  56. Yan Qu, Philip Fei Wu, and Xiaoqing Wang. 2009. Online community response to major disaster: A study of Tianya forum in the 2008 Sichuan earthquake. In 42nd Hawaii International Conference on System Sciences. IEEE, 1--11.Google ScholarGoogle Scholar
  57. Linda Resnik, Daniel W Bradford, Shirley M Glynn, Alan M Jette, C Johnson Hernandez, and Sharon Wills. 2012. Issues in defining and measuring veteran community reintegration: Proceedings of the working group on community reintegration, VA rehabilitation outcomes conference, Miami, Florida. Journal of Rehabilitation Research and Development49,1 (2012), 87--100. https://search.proquest.com/docview/1011945915?accountid=14214Google ScholarGoogle ScholarCross RefCross Ref
  58. Steve Sawyer, Ingrid Erickson, and Mohammad Hossein Jarrahi. 2019. Infrastructural competence. digital STS: A FieldGuide for Science & Technology Studies(2019), 267.Google ScholarGoogle Scholar
  59. Steven L Sayers. 2011. Family reintegration difficulties and couples therapy for military veterans and their spouses.Cognitive and Behavioral Practice 18, 1 (2011), 108--119. https://doi.org/10.1016/j.cbpra.2010.03.002Google ScholarGoogle Scholar
  60. Roger C Schank and Robert P Abelson. 2013. Scripts, plans, goals, and understanding: An inquiry into human knowledge structures. Psychology Press. https://doi.org/10.1016/B978--1--4832--1446--7.50019--4Google ScholarGoogle Scholar
  61. Barry R Schlenker, Thomas W Britt, John Pennington, Rodolfo Murphy, and Kevin Doherty. 1994. The triangle modelof responsibility. Psychological Review 101, 4 (1994), 632.Google ScholarGoogle ScholarCross RefCross Ref
  62. Nancy K. Schlossberg. 2005.Counseling Adults in Transition: Linking Practice with Theory. Springer Publishing Company.Google ScholarGoogle Scholar
  63. Kai Schubert, Anne Weibert, and Volker Wulf. 2011. Locating computer clubs in multicultural neighborhoods: How collaborative project work fosters integration processes. International Journal of Human-Computer Studies 69, 10 (2011),669--678.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Bryan Semaan and Gloria Mark. 2011. Technology-mediated social arrangements to resolve breakdowns in infrastructure during ongoing disruption. ACM Transactions on Computer-Human Interaction 18, 4 (2011), 21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Bryan C Semaan, Lauren M. Britton, and Bryan Dosono. 2016. Transition resilience with ICTs: 'Identity awareness' in veteran re-integration. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 2882--2894. https://doi.org/10.1145/2858036.2858109Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Bryan C Semaan, Lauren M. Britton, and Bryan Dosono. 2017. Military masculinity and the travails of transitioning: Disclosure in social media. In Proceedings of the 20th ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM. https://doi.org/10.1145/2998181.2998221Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Irina Shklovski, Robert Kraut, and Jonathon Cummings. 2006. Routine patterns of internet use and psychological well-being: Coping with a residential move. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 969--978. https://doi.org/10.1145/1124772.1124917Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Irina Shklovski, Robert Kraut, and Jonathon Cummings. 2008. Keeping in touch by technology: Maintaining friendships after a residential move. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM,807--816. https://doi.org/10.1145/1357054.1357182Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. David Snow. 2001. Collective identity and expressive forms. Center for the Study of Democracy(2001). https://doi.org/10.1016/B0-08-043076--7/04094--8Google ScholarGoogle ScholarCross RefCross Ref
  70. Paul C Sondrol. 1992. 1984 Revisited? A Re-Examination of Uruguay's Military Dictatorship. Bulletin of Latin AmericanResearch11, 2 (1992), 187--203.Google ScholarGoogle Scholar
  71. Steven M Southwick, George A Bonanno, Ann S Masten, Catherine Panter-Brick, and Rachel Yehuda. 2014. Resilience definitions, theory, and challenges: Interdisciplinary perspectives. European Journal of Psychotraumatology5, 1 (2014),25338.Google ScholarGoogle Scholar
  72. Susan Leigh Star and Karen Ruhleder. 1996. Steps toward an ecology of infrastructure: Design and access for large information spaces. Information Systems Research 7, 1 (1996), 111--134. https://doi.org/10.1287/isre.7.1.111Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Jeannette N Sutton, Leysia Palen, and Irina Shklovski. 2008. Back channels on the front lines: Emergency uses of social media in the 2007 Southern California Wildfires. University of Colorado.Google ScholarGoogle Scholar
  74. Austin L Toombs, Shaowen Bardzell, and Jeffrey Bardzell. 2015. The proper care and feeding of hacker spaces: Careethics and cultures of making. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 629--638.Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. US Census Bureau. 2014. Facts for Feature: Veterans Day 2014: Nov. 11. http://www.census.gov/newsroom/facts-for-features/2014/cb14-ff24.htmlGoogle ScholarGoogle Scholar
  76. Susan Van Den Tillaart, Donna Kurtz, and Penny Cash. 2009. Powerlessness, marginalized identity, and silencing of health concerns: Voiced realities of women living with a mental health diagnosis. International Journal of Mental Health Nursing 18, 3 (2009), 153--163.Google ScholarGoogle ScholarCross RefCross Ref
  77. Janet Vertesi. 2014. Seamful spaces: Heterogeneous infrastructures in interaction. Science, Technology, & Human Values39, 2 (2014), 264--284. https://doi.org/10.1177/0162243913516012Google ScholarGoogle ScholarCross RefCross Ref
  78. Sarah Vieweg, Amanda L Hughes, Kate Starbird, and Leysia Palen. 2010. Microblogging during two natural hazards events: What twitter may contribute to situational awareness. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1079--1088.Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Anne Weibert and Volker Wulf. 2010. All of a sudden we had this dialogue...: Intercultural computer clubs' contribution to sustainable integration. In Proceedings of the 3rd International Conference on Intercultural Collaboration. ACM,93--102.Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Karl E Weick. 1993. The collapse of sensemaking in organizations: The Mann Gulch disaster. Administrative Science Quarterly(1993), 628--652.Google ScholarGoogle Scholar
  81. Karl E Weick. 1995. Sensemaking in organizations. Vol. 3. SAGE Publications.Google ScholarGoogle Scholar
  82. Leonard Wong, Paul Bliese, and Dennis McGurk. 2003. Military leadership: A context specific review. The Leadership Quarterly 14, 6 (2003), 657--692.Google ScholarGoogle ScholarCross RefCross Ref
  83. George Yerousis, Konstantin Aal, Thomas von Rekowski, David W Randall, Markus Rohde, and Volker Wulf. 2015. Computer-enabled project spaces: Connecting with Palestinian refugees across camp boundaries. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 3749--3758.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. 'Routine Infrastructuring' as 'Building Everyday Resilience with Technology': When Disruption Becomes Ordinary

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Proceedings of the ACM on Human-Computer Interaction
          Proceedings of the ACM on Human-Computer Interaction  Volume 3, Issue CSCW
          November 2019
          5026 pages
          EISSN:2573-0142
          DOI:10.1145/3371885
          Issue’s Table of Contents

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 7 November 2019
          Published in pacmhci Volume 3, Issue CSCW

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader