{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:30:18Z","timestamp":1740123018182,"version":"3.37.3"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,8,3]],"date-time":"2018-08-03T00:00:00Z","timestamp":1533254400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,8,3]],"date-time":"2018-08-03T00:00:00Z","timestamp":1533254400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s10676-018-9475-3","type":"journal-article","created":{"date-parts":[[2018,8,3]],"date-time":"2018-08-03T02:57:07Z","timestamp":1533265027000},"page":"59-62","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Where the stakeholders are: tapping into social media during value-sensitive design research"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9317-1786","authenticated-orcid":false,"given":"Annuska","family":"Zolyomi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,3]]},"reference":[{"key":"9475_CR1","doi-asserted-by":"publisher","first-page":"672","DOI":"10.1145\/2901790.2901873","volume-title":"Privacy & social media in the context of the Arab Gulf","author":"N Abokhodair","year":"2016","unstructured":"Abokhodair, N., & Vieweg, S. (2016). Privacy & social media in the context of the Arab Gulf (pp.\u00a0672\u2013683). New York: ACM Press. https:\/\/doi.org\/10.1145\/2901790.2901873."},{"issue":"1","key":"9475_CR2","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"DM Boyd","year":"2007","unstructured":"Boyd, D. M., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210\u2013230. https:\/\/doi.org\/10.1111\/j.1083-6101.2007.00393.x.","journal-title":"Journal of Computer-Mediated Communication"},{"key":"9475_CR3","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1145\/2531602.2531608","volume-title":"Understanding individuals\u2019 personal values from social media word use","author":"J Chen","year":"2014","unstructured":"Chen, J., Hsieh, G., Mahmud, J. U., & Nichols, J. (2014). Understanding individuals\u2019 personal values from social media word use (pp.\u00a0405\u2013414). New York: ACM Press. https:\/\/doi.org\/10.1145\/2531602.2531608."},{"issue":"2","key":"9475_CR4","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1561\/1100000015","volume":"11","author":"B Friedman","year":"2017","unstructured":"Friedman, B., Hendry, D. G., & Borning, A. (2017). A survey of value sensitive design methods. Foundations and Trends\u00ae in Human\u2013Computer Interaction, 11(2), 63\u2013125. https:\/\/doi.org\/10.1561\/1100000015.","journal-title":"Foundations and Trends\u00ae in Human\u2013Computer Interaction"},{"key":"9475_CR5","first-page":"348","volume-title":"Human-computer interaction in management information systems: Foundations","author":"B Friedman","year":"2006","unstructured":"Friedman, B., Kahn, P. H. Jr., & Borning, A. (2006). Value sensitive design and information systems. In P. Zhang, D. Galletta, Human-computer interaction in management information systems: Foundations (pp.\u00a0348\u2013372). New York: M.E. Sharpe"},{"issue":"1","key":"9475_CR6","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1146\/annurev-soc-071913-043145","volume":"40","author":"SA Golder","year":"2014","unstructured":"Golder, S. A., & Macy, M. W. (2014). Digital footprints: Opportunities and challenges for online social research. Annual Review of Sociology, 40(1), 129\u2013152. https:\/\/doi.org\/10.1146\/annurev-soc-071913-043145.","journal-title":"Annual Review of Sociology"},{"issue":"10","key":"9475_CR7","doi-asserted-by":"publisher","first-page":"e1001328","DOI":"10.1371\/journal.pmed.1001328","volume":"9","author":"ACJ Janssens","year":"2012","unstructured":"Janssens, A. C. J., & Kraft, P. (2012). Research conducted using data obtained through online communities: Ethical implications of methodological limitations. PLoS Medicine, 9(10), e1001328.","journal-title":"PLoS Medicine"},{"issue":"15","key":"9475_CR8","doi-asserted-by":"publisher","first-page":"5802","DOI":"10.1073\/pnas.1218772110","volume":"110","author":"M Kosinski","year":"2013","unstructured":"Kosinski, M., Stillwell, D., & Graepel, T. (2013). Private traits and attributes are predictable from digital records of human behavior. Proceedings of the National Academy of Sciences, 110(15), 5802\u20135805. https:\/\/doi.org\/10.1073\/pnas.1218772110.","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"9475_CR9","unstructured":"McCormick, T., Lee, H., Cesare, N., & Shojaie, A. (2014). Using twitter for demographic and social science research: Tools for data collection. DTIC Document. Retrieved from http:\/\/oai.dtic.mil\/oai\/oai?verb=getRecord&metadataPrefix=html&identifier=ADA622489."},{"issue":"6","key":"9475_CR10","doi-asserted-by":"publisher","first-page":"1653","DOI":"10.1037\/a0039244","volume":"100","author":"LA McFarland","year":"2015","unstructured":"McFarland, L. A., & Ployhart, R. E. (2015). Social media: A contextual framework to guide research and practice. Journal of Applied Psychology, 100(6), 1653\u20131677. https:\/\/doi.org\/10.1037\/a0039244.","journal-title":"Journal of Applied Psychology"},{"key":"9475_CR11","doi-asserted-by":"publisher","first-page":"5506","DOI":"10.1145\/2858036.2858116","volume-title":"\u201cWith most of it being pictures now, I rarely use it\u201d: Understanding Twitter\u2019s evolving accessibility to blind users","author":"MR Morris","year":"2016","unstructured":"Morris, M. R., Zolyomi, A., Yao, C., Bahram, S., Bigham, J. P., & Kane, S. K. (2016). \u201cWith most of it being pictures now, I rarely use it\u201d: Understanding Twitter\u2019s evolving accessibility to blind users (pp.\u00a05506\u20135516). New York: ACM Press. https:\/\/doi.org\/10.1145\/2858036.2858116."},{"issue":"1","key":"9475_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.ijinfomgt.2014.09.004","volume":"35","author":"EWT Ngai","year":"2015","unstructured":"Ngai, E. W. T., Tao, S. S. C., & Moon, K. K. L. (2015). Social media research: Theories, constructs, and conceptual frameworks. International Journal of Information Management, 35(1), 33\u201344. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2014.09.004.","journal-title":"International Journal of Information Management"},{"key":"9475_CR13","unstructured":"Pew Research Center. (2013, March 4). Twitter reaction to events often at odds with overall public opinion. Retrieved December 27, 2016, from http:\/\/www.pewresearch.org\/2013\/03\/04\/twitter-reaction-to-events-often-at-odds-with-overall-public-opinion\/."},{"key":"9475_CR14","unstructured":"Pew Research Center. (2018, February 5). Social Media Fact Sheet. Retrieved June 6, 2018, from http:\/\/www.pewinternet.org\/fact-sheet\/social-media\/."},{"key":"9475_CR15","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814546481","author":"SA Rains","year":"2014","unstructured":"Rains, S. A., & Brunner, S. R. (2014). What can we learn about social network sites by studying Facebook? A call and recommendations for research on social network sites. New Media & Society. https:\/\/doi.org\/10.1177\/1461444814546481.","journal-title":"New Media & Society"},{"key":"9475_CR16","doi-asserted-by":"crossref","unstructured":"Sun, M., Zhang, H., Zhao, Y., & Shang, J. (2014). From post to values: Mining Schwartz values of individuals from social media. In Chinese National Conference on Social Media Processing (pp.\u00a0206\u2013219). New York: Springer. Retrieved from http:\/\/link.springer.com\/chapter\/https:\/\/doi.org\/10.1007\/978-3-662-45558-6_19.","DOI":"10.1007\/978-3-662-45558-6_19"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9475-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-018-9475-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9475-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T17:08:02Z","timestamp":1621962482000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-018-9475-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,3]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["9475"],"URL":"https:\/\/doi.org\/10.1007\/s10676-018-9475-3","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"type":"print","value":"1388-1957"},{"type":"electronic","value":"1572-8439"}],"subject":[],"published":{"date-parts":[[2018,8,3]]},"assertion":[{"value":"3 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}