{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:38:21Z","timestamp":1761007101009,"version":"build-2065373602"},"reference-count":59,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T00:00:00Z","timestamp":1358985600000},"content-version":"vor","delay-in-days":389,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2012,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This paper seeks to critique the theoretical components of everyday life information seeking through an exogenous incorporation of the sociology of everyday life. In particular, it focuses on the way in which everyday life spaces are increasingly being produced and sustained by practices of surveillance in order to structure information users into geo\u2010demographic typologies of information consumers. The argument advanced is that an analysis of the production of space can enable a more theoretically solid groundwork for understanding the relationship between information users and the social contexts of everyday information seeking.<\/jats:p>","DOI":"10.1002\/meet.14504901106","type":"journal-article","created":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T10:49:23Z","timestamp":1359024563000},"page":"1-11","source":"Crossref","is-referenced-by-count":2,"title":["Information as exclusion: Towards a critical understanding of everyday life"],"prefix":"10.1002","volume":"49","author":[{"given":"Harrison","family":"Smith","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2013,1,24]]},"reference":[{"key":"e_1_2_5_2_1","doi-asserted-by":"publisher","DOI":"10.1177\/0263276405053723"},{"volume-title":"The Individualized Society","year":"2001","author":"Bauman Z.","key":"e_1_2_5_3_1"},{"key":"e_1_2_5_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lisr.2003.11.003"},{"volume-title":"World Risk Society","year":"1999","author":"Beck U.","key":"e_1_2_5_5_1"},{"volume-title":"Theorizing Surveillance: the panopticon and beyond","year":"2006","author":"Bogard W.","key":"e_1_2_5_6_1"},{"key":"e_1_2_5_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21656"},{"volume-title":"The Laws of the Markets","year":"1998","author":"Callon M.","key":"e_1_2_5_8_1"},{"key":"e_1_2_5_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/0170840605056393"},{"key":"e_1_2_5_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/03085140220123126"},{"key":"e_1_2_5_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0740-8188(01)00092-5"},{"volume-title":"Rise of the Network Society: The Information Age: Economy, Society, and Culture (Volume 1)","year":"1996","author":"Castells M.","key":"e_1_2_5_12_1"},{"volume-title":"The Power of Identity: The Information Age: Economy, Society, and Culture","year":"2004","author":"Castells M.","key":"e_1_2_5_13_1"},{"key":"e_1_2_5_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199603)47:3<193::AID-ASI3>3.0.CO;2-T"},{"key":"e_1_2_5_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/aris.2010.1440440119"},{"key":"e_1_2_5_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21422"},{"volume-title":"Negotiations, 1972\u20131990","year":"1995","author":"Deleuze G.","key":"e_1_2_5_17_1"},{"key":"e_1_2_5_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(99)00023-0"},{"key":"e_1_2_5_19_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8306.2005.00454.x"},{"volume-title":"Code\/Space: Software and Everyday Life","year":"2011","author":"Dodge M.","key":"e_1_2_5_20_1"},{"volume-title":"Discipline and Punish: The Birth of the Prison","year":"1977","author":"Foucualt M.","key":"e_1_2_5_21_1"},{"key":"e_1_2_5_22_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/5658.001.0001"},{"volume-title":"The Panoptic Sort: A Political Economy of Personal Information","year":"1993","author":"Gandy O. H.","key":"e_1_2_5_23_1"},{"key":"e_1_2_5_24_1","doi-asserted-by":"publisher","DOI":"10.1057\/9780230584020"},{"volume-title":"The Presentation of Self in Everyday Life","year":"1959","author":"Goffman E.","key":"e_1_2_5_25_1"},{"key":"e_1_2_5_26_1","unstructured":"Graham S.&Marvin S.(1997).Telecommunications and the city: electronic spaces urban places. London. Routledge."},{"key":"e_1_2_5_27_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203452202"},{"key":"e_1_2_5_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/0261018303023002006"},{"key":"e_1_2_5_29_1","first-page":"324","volume-title":"The Cybercities Reader","author":"Graham S.","year":"2004"},{"volume-title":"Everyware: The dawning age of ubiquitous computing","year":"2006","author":"Greenfield A.","key":"e_1_2_5_30_1"},{"volume-title":"Making Digital Cultures: Access, Interactivity and Authenticity","year":"2008","author":"Hand M.","key":"e_1_2_5_31_1"},{"volume-title":"Empire","year":"2000","author":"Hardt M.","key":"e_1_2_5_32_1"},{"issue":"3","key":"e_1_2_5_33_1","first-page":"228","article-title":"\u201cThe serious leisure frontier in library and information science: hobby domains","volume":"30","author":"Hartel J.","year":"2003","journal-title":"Knowledge Organization"},{"key":"e_1_2_5_34_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781446217283"},{"volume-title":"Global Culture Industry: The Mediation of Things","year":"2007","author":"Lash S.","key":"e_1_2_5_35_1"},{"volume-title":"Shaping Technology\/Building Society","year":"1992","author":"Latour B.","key":"e_1_2_5_36_1"},{"volume-title":"Critique of Everyday Life, Volume 1: Introduction","year":"1991","author":"Lefebvre H.","key":"e_1_2_5_37_1"},{"volume-title":"Consumer Culture, 2nd edition","year":"2011","author":"Lury C.","key":"e_1_2_5_38_1"},{"volume-title":"Surveillance Studies: An Overview","year":"2007","author":"Lyon D.","key":"e_1_2_5_39_1"},{"key":"e_1_2_5_40_1","doi-asserted-by":"publisher","DOI":"10.1086\/599125"},{"key":"e_1_2_5_41_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-954X.1999.tb03483.x"},{"key":"e_1_2_5_42_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/2433.001.0001"},{"key":"e_1_2_5_43_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781446279946"},{"volume-title":"\u201cTowards Spatial Protocol: The Topologies of the Pervasive Surveillance Society\u201d sourced in Augmented Urban Spaces: Articulating the Physical and Electronic City","year":"2008","author":"Murakami Wood D.","key":"e_1_2_5_44_1"},{"volume-title":"American Technological Sublime","year":"1994","author":"Nye D. E.","key":"e_1_2_5_45_1"},{"volume-title":"The Mode of Information: Poststructuralism and Social Context","year":"1990","author":"Poster M.","key":"e_1_2_5_46_1"},{"key":"e_1_2_5_47_1","doi-asserted-by":"publisher","DOI":"10.1108\/00220410710723902"},{"volume-title":"Everyday Information Practices: A Social Phenomenological Perspective","year":"2008","author":"Savolainen R.","key":"e_1_2_5_48_1"},{"volume-title":"Encyclopedia of Library and Information Sciences","year":"2010","author":"Savolainen R.","key":"e_1_2_5_49_1"},{"key":"e_1_2_5_50_1","doi-asserted-by":"publisher","DOI":"10.1068\/d324t"},{"key":"e_1_2_5_51_1","doi-asserted-by":"publisher","DOI":"10.1068\/a37268"},{"key":"e_1_2_5_52_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/2415.001.0001"},{"key":"e_1_2_5_53_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20249"},{"key":"e_1_2_5_54_1","doi-asserted-by":"publisher","DOI":"10.1108\/00220410510578023"},{"key":"e_1_2_5_55_1","doi-asserted-by":"publisher","DOI":"10.1068\/d321t"},{"key":"e_1_2_5_56_1","doi-asserted-by":"publisher","DOI":"10.1111\/1475-5661.00057"},{"volume-title":"Return of the Actor: Social Theory in Postindustrial Society","year":"1988","author":"Touraine A.","key":"e_1_2_5_57_1"},{"key":"e_1_2_5_58_1","doi-asserted-by":"publisher","DOI":"10.1086\/497311"},{"key":"e_1_2_5_59_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-4446.2000.00185.x"},{"key":"e_1_2_5_60_1","doi-asserted-by":"publisher","DOI":"10.1177\/0263276405057201"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14504901106","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14504901106","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.14504901106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T11:37:01Z","timestamp":1760960221000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.14504901106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":59,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["10.1002\/meet.14504901106"],"URL":"https:\/\/doi.org\/10.1002\/meet.14504901106","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2012,1]]}}}