{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:38:28Z","timestamp":1761007108703,"version":"build-2065373602"},"reference-count":94,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T00:00:00Z","timestamp":1358985600000},"content-version":"vor","delay-in-days":389,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2012,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Private crises, by their very nature, pressure individuals to manage the uncontrollable on their own. Public responses devolve from multiple layers of organizational responsibility and, often antithetical, values. Information engagements weave through and across the resultant unstructured relationships. Using a critical theory lens and an intimate partner violence context, this paper posits a situational model of the dynamics information engagements within private crises and public responses.<\/jats:p>","DOI":"10.1002\/meet.14504901125","type":"journal-article","created":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T10:49:23Z","timestamp":1359024563000},"page":"1-12","source":"Crossref","is-referenced-by-count":0,"title":["Private crises\/public reponses: A nascent model"],"prefix":"10.1002","volume":"49","author":[{"given":"Lynn Westbrook","family":"Private Crises\/Public Reponses: A Nascent Model","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2013,1,24]]},"reference":[{"key":"e_1_2_5_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10896-008-9213-4"},{"key":"e_1_2_5_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2010.07.005"},{"issue":"3","key":"e_1_2_5_4_1","first-page":"933","article-title":"Friend request or foe? Confirming the misuse of internet and social networking sites by domestic violence perpetrators","volume":"19","author":"Baughman L. L.","year":"2010","journal-title":"Widener Law Journal"},{"key":"e_1_2_5_5_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551508095781"},{"key":"e_1_2_5_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/casp.985"},{"volume-title":"Practical Reason: On the Theory of Action","year":"1998","author":"Bourdieu P.","key":"e_1_2_5_7_1"},{"key":"e_1_2_5_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886260505278530"},{"key":"e_1_2_5_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2005.04.006"},{"key":"e_1_2_5_10_1","doi-asserted-by":"publisher","DOI":"10.1089\/jwh.2009.1568"},{"key":"e_1_2_5_11_1","first-page":"281","article-title":"Channels to a larger social world: Older women staying in contact with the great society","volume":"13","author":"Chatman E. A.","year":"1991","journal-title":"Library & Information Science Research"},{"key":"e_1_2_5_12_1","doi-asserted-by":"publisher","DOI":"10.1353\/ils.2010.0003"},{"key":"e_1_2_5_13_1","first-page":"93","article-title":"What criteria do Child Protective Services investigators use to substantiate exposure to domestic violence?","volume":"86","author":"Coohey C.","year":"2007","journal-title":"Child Welfare"},{"key":"e_1_2_5_14_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9906.2009.00475.x"},{"key":"e_1_2_5_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/1367549411412203"},{"key":"e_1_2_5_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20787"},{"key":"e_1_2_5_17_1","first-page":"S74","article-title":"Libraries reaching out with health information to vulnerable populations: Guidance from research on information seeking and use","volume":"93","author":"Dervin B.","year":"2005","journal-title":"Journal of the Medical Library Association"},{"key":"e_1_2_5_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.04.006"},{"key":"e_1_2_5_19_1","first-page":"62","article-title":"Development of a conceptual model for studying engineers' information behavior","volume":"28","author":"Du Preez M.","year":"2010","journal-title":"Mousaion"},{"key":"e_1_2_5_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0740-8188(02)00132-9"},{"key":"e_1_2_5_21_1","doi-asserted-by":"publisher","DOI":"10.1300\/J508v06n03_04"},{"key":"e_1_2_5_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/003335490612100405"},{"key":"e_1_2_5_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886260506290200"},{"key":"e_1_2_5_24_1","doi-asserted-by":"publisher","DOI":"10.1097\/00003727-200701001-00014"},{"key":"e_1_2_5_25_1","doi-asserted-by":"publisher","DOI":"10.3928\/08910162-20080401-04"},{"key":"e_1_2_5_26_1","doi-asserted-by":"publisher","DOI":"10.1108\/00220411111183537"},{"key":"e_1_2_5_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/0891241609342104"},{"key":"e_1_2_5_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/01616840903562976"},{"key":"e_1_2_5_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/10683160802190863"},{"key":"e_1_2_5_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/1524838009339754"},{"key":"e_1_2_5_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10896-008-9211-6"},{"key":"e_1_2_5_32_1","doi-asserted-by":"publisher","DOI":"10.1891\/0886-6708.21.5.611"},{"key":"e_1_2_5_33_1","doi-asserted-by":"publisher","DOI":"10.1353\/lib.2012.0001"},{"key":"e_1_2_5_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077801204270555"},{"key":"e_1_2_5_35_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6237.2010.00725.x"},{"key":"e_1_2_5_36_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21685"},{"key":"e_1_2_5_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/14649360802441432"},{"key":"e_1_2_5_38_1","first-page":"130","article-title":"\u201cBut is it education?\u201d The challenges of creating effective learning for survivors of trauma","volume":"32","author":"Horsman J.","year":"2004","journal-title":"Women's Studies Quarterly"},{"key":"e_1_2_5_39_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21245"},{"key":"e_1_2_5_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/01616846.2011.575699"},{"key":"e_1_2_5_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/0192513X11412037"},{"key":"e_1_2_5_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10896-009-9231-x"},{"key":"e_1_2_5_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2008.11.004"},{"key":"e_1_2_5_44_1","first-page":"131","article-title":"Teens, technology, and cyberstalking: The domestic violence wave of the future?","volume":"20","author":"King\u2010Ries A.","year":"2011","journal-title":"Texas Journal of Women & the Law"},{"key":"e_1_2_5_45_1","first-page":"109","article-title":"Border crossings: Understanding the civil, criminal, and immigration implications for battered women fleeing across state lines with their children","volume":"39","author":"Klein C. F.","year":"2005","journal-title":"Family Law Quarterly"},{"key":"e_1_2_5_46_1","doi-asserted-by":"publisher","DOI":"10.1002\/jts.20288"},{"key":"e_1_2_5_47_1","doi-asserted-by":"publisher","DOI":"10.1002\/bult.2007.1720330511"},{"key":"e_1_2_5_48_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077801212437137"},{"key":"e_1_2_5_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10896-010-9330-8"},{"key":"e_1_2_5_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2011.11.004"},{"key":"e_1_2_5_51_1","doi-asserted-by":"publisher","DOI":"10.1080\/13691180902998639"},{"key":"e_1_2_5_52_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886260506291653"},{"key":"e_1_2_5_53_1","doi-asserted-by":"publisher","DOI":"10.1093\/swr\/29.3.137"},{"key":"e_1_2_5_54_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886260504268762"},{"key":"e_1_2_5_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11606-007-0199-z"},{"key":"e_1_2_5_56_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0026122"},{"key":"e_1_2_5_57_1","doi-asserted-by":"publisher","DOI":"10.1891\/0886-6708.25.2.165"},{"key":"e_1_2_5_58_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886260504269687"},{"key":"e_1_2_5_59_1","first-page":"140","article-title":"Domestic trauma and adult education on the United States\u2010Mexico border","volume":"4","author":"Muro A.","year":"2010","journal-title":"Adult Basic Education & Literacy Journal"},{"key":"e_1_2_5_60_1","first-page":"5","article-title":"Ontology of time: Expressions of time in information systems","volume":"17","author":"Neelameghan A. A.","year":"2011","journal-title":"Information Studies"},{"key":"e_1_2_5_61_1","doi-asserted-by":"publisher","DOI":"10.1606\/1044-3894.3590"},{"key":"e_1_2_5_62_1","doi-asserted-by":"publisher","DOI":"10.1177\/0961000610361556"},{"key":"e_1_2_5_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10896-009-9225-8"},{"key":"e_1_2_5_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10896-008-9180-9"},{"key":"e_1_2_5_65_1","doi-asserted-by":"publisher","DOI":"10.1080\/10826080801914360"},{"key":"e_1_2_5_66_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886260511421669"},{"key":"e_1_2_5_67_1","article-title":"Intimate partner violence and age of victim, 1993\u20131999","volume":"2007","author":"Rennison C. M.","year":"2001","journal-title":"Bureau of Justice Statistics Special Report, 1\u201312. Retrieved May 3"},{"key":"e_1_2_5_68_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.32.061604.123110"},{"key":"e_1_2_5_69_1","first-page":"309","article-title":"Factors affecting patient\u2010physician communication for abused Latina and Asian immigrant women","volume":"47","author":"Rodriguez M.","year":"1998","journal-title":"Journal of Family Practice"},{"key":"e_1_2_5_70_1","doi-asserted-by":"publisher","DOI":"10.1093\/hsw\/33.3.221"},{"key":"e_1_2_5_71_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886109907302261"},{"key":"e_1_2_5_72_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551506077418"},{"key":"e_1_2_5_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lisr.2008.10.007"},{"key":"e_1_2_5_74_1","first-page":"44","article-title":"Information behaviors of deaf artists","volume":"29","author":"Schiff D.","year":"2010","journal-title":"Art Documentation"},{"key":"e_1_2_5_75_1","doi-asserted-by":"publisher","DOI":"10.1177\/096100060303500102"},{"key":"e_1_2_5_76_1","doi-asserted-by":"publisher","DOI":"10.1080\/19349630802081046"},{"key":"e_1_2_5_77_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886260506295388"},{"key":"e_1_2_5_78_1","doi-asserted-by":"publisher","DOI":"10.1515\/libr.2010.017"},{"key":"e_1_2_5_79_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886260506295379"},{"key":"e_1_2_5_80_1","doi-asserted-by":"publisher","DOI":"10.1177\/1557085111430826"},{"key":"e_1_2_5_81_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077801209354374"},{"key":"e_1_2_5_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10464-009-9232-1"},{"key":"e_1_2_5_83_1","doi-asserted-by":"publisher","DOI":"10.1080\/10510970309363277"},{"key":"e_1_2_5_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10896-010-9309-5"},{"key":"e_1_2_5_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2009.12.004"},{"key":"e_1_2_5_86_1","doi-asserted-by":"publisher","DOI":"10.1089\/jwh.2007.0530"},{"key":"e_1_2_5_87_1","doi-asserted-by":"publisher","DOI":"10.1086\/588443"},{"key":"e_1_2_5_88_1","doi-asserted-by":"publisher","DOI":"10.1080\/01616846.2011.575709"},{"key":"e_1_2_5_89_1","doi-asserted-by":"publisher","DOI":"10.1080\/15614260500206285"},{"key":"e_1_2_5_90_1","doi-asserted-by":"publisher","DOI":"10.1086\/662946"},{"key":"e_1_2_5_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(99)00029-1"},{"key":"e_1_2_5_92_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886260505278531"},{"key":"e_1_2_5_93_1","doi-asserted-by":"publisher","DOI":"10.1080\/15367960902908599"},{"key":"e_1_2_5_94_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20915"},{"key":"e_1_2_5_95_1","doi-asserted-by":"publisher","DOI":"10.1177\/0886260505282564"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14504901125","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.14504901125","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.14504901125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T11:33:14Z","timestamp":1760959994000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.14504901125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":94,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["10.1002\/meet.14504901125"],"URL":"https:\/\/doi.org\/10.1002\/meet.14504901125","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2012,1]]}}}