{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:34:35Z","timestamp":1776108875585,"version":"3.50.1"},"reference-count":55,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["The Information Society"],"published-print":{"date-parts":[[2021,10,20]]},"DOI":"10.1080\/01972243.2021.1949768","type":"journal-article","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T08:00:22Z","timestamp":1629792022000},"page":"287-298","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":48,"title":["Folk theories of algorithmic operations during Internet use: A mixed methods study"],"prefix":"10.1080","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2701-3402","authenticated-orcid":false,"given":"Leyla","family":"Dogruel","sequence":"first","affiliation":[{"name":"Department of Communication, Johannes Gutenberg Universit\u00e4t Mainz, Mainz, Germany"}]}],"member":"301","published-online":{"date-parts":[[2021,8,24]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa1160"},{"key":"CIT0002","doi-asserted-by":"crossref","first-page":"62","DOI":"10.3389\/frobt.2020.00062","volume":"7","author":"Banks J.","year":"2020","journal-title":"Frontiers in Robotics and AI"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819854731"},{"issue":"3","key":"CIT0004","first-page":"671","volume":"10","author":"Brayne S.","year":"2020","journal-title":"Social Problems"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812440159"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2016.1154086"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1177\/2053951715622512"},{"key":"CIT0008","doi-asserted-by":"crossref","unstructured":"Burrell, J., Z. Kahn, A. Jonas, and D. Griffin. 2019. When users control the algorithms: Values expressed in practices on Twitter. In Proceedings of the ACM on Human-Computer Interaction, 1\u201320. New York: ACM. doi:10.1145\/3359240.","DOI":"10.1145\/3359240"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.78.5.965"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1177\/2053951717718855"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818815684"},{"key":"CIT0012","first-page":"745","volume":"14","author":"Cotter K.","year":"2020","journal-title":"International Journal of Communication"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025659"},{"key":"CIT0014","first-page":"1","volume-title":"CHI EA \u201818: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems","author":"DeVito M. A.","year":"2018"},{"key":"CIT0015","author":"Dogruel L.","year":"2020","journal-title":"Information, Communication & Society"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858494"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2910571"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-anthro-081309-145822"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9780262525374.003.0009"},{"issue":"2","key":"CIT0020","first-page":"1","volume":"5","author":"Gran A.-B.","year":"2020","journal-title":"Information, Communication & Society"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2020.1713846"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1002\/rrq.301"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1207\/S15327957PSPR0502_1"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.5751\/ES-03802-160146"},{"key":"CIT0026","unstructured":"Kang, R., L. Dabbish, N. Fruchter, and S. Kiesler. 2015. \u201cMy data just goes everywhere\u201d: User mental models of the Internet and implications for privacy and security. Paper presented at the Symposium On Usable Privacy and Security, Ottawa, Canada, July. Accessed May 22, 2021. https:\/\/www.usenix.org\/system\/files\/conference\/soups2015\/soups15-paper-kang.pdf"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1177\/2050157918796859"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.5465\/annals.2018.0174"},{"issue":"4","key":"CIT0029","first-page":"1","volume":"19","author":"Kemper J.","year":"2018","journal-title":"Information, Communication & Society"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1007\/s11031-019-09779-5"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2016.1154087"},{"key":"CIT0032","first-page":"3490","volume":"12","author":"Klawitter E.","year":"2018","journal-title":"International Journal of Communication"},{"issue":"2","key":"CIT0033","doi-asserted-by":"crossref","first-page":"1","DOI":"10.14763\/2019.2.1415","volume":"8","author":"Latzer M.","year":"2019","journal-title":"Internet Policy Review"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2019.1709930"},{"key":"CIT0035","first-page":"619","volume":"5","author":"McCurdy P.","year":"2011","journal-title":"International Journal of Communication"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1444076"},{"issue":"4","key":"CIT0037","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1086\/426611","volume":"31","author":"Mukhopadhyay A.","year":"2005","journal-title":"Journal of Consumer Research"},{"issue":"1","key":"CIT0038","doi-asserted-by":"crossref","first-page":"17","DOI":"10.5944\/openpraxis.9.1.502","volume":"9","author":"Parke K.","year":"2017","journal-title":"Open Praxis"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674736061"},{"key":"CIT0040","unstructured":"Pew. 2018. Public attitudes toward computer algorithms. Accessed May 22, 2021. http:\/\/www.pewinternet.org\/wp-content\/uploads\/sites\/9\/2018\/11\/PI_2018.11.19_algorithms_FINAL.pdf"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1111\/j.1751-9004.2009.00222.x"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1177\/1541931215591336"},{"key":"CIT0043","first-page":"257","volume-title":"Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)","author":"Rader E.","year":"2017"},{"key":"CIT0044","first-page":"182","volume-title":"CHI \u201815: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems","author":"Rader E.","year":"2015"},{"key":"CIT0045","first-page":"1","volume-title":"CHI \u201818: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems","author":"Rader E.","year":"2018"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.4135\/9781526451163.n7"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2020.1718179"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvc77mp9.30"},{"key":"CIT0049","volume-title":"Television and new media audiences","author":"Seiter E.","year":"1999"},{"key":"CIT0050","author":"Sharabi L. L.","year":"2020","journal-title":"Communication Research."},{"key":"CIT0051","first-page":"499","volume":"12","author":"Siles I.","year":"2019","journal-title":"Communication, Culture and Critique"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1177\/2053951720923377"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1093\/jcmc\/zmz026"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2016.1200645"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2019.1620112"},{"key":"CIT0057","first-page":"1957","volume-title":"CSCW\u201917: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing","author":"Yao Y.","year":"2017"}],"container-title":["The Information Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972243.2021.1949768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T15:31:03Z","timestamp":1631892663000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01972243.2021.1949768"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,24]]},"references-count":55,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,10,20]]}},"alternative-id":["10.1080\/01972243.2021.1949768"],"URL":"https:\/\/doi.org\/10.1080\/01972243.2021.1949768","relation":{},"ISSN":["0197-2243","1087-6537"],"issn-type":[{"value":"0197-2243","type":"print"},{"value":"1087-6537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,24]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-04-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-09-11","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-09","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}