{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T13:48:15Z","timestamp":1765806495796,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,4,2]],"date-time":"2005-04-02T00:00:00Z","timestamp":1112400000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,4,2]]},"DOI":"10.1145\/1054972.1055097","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"889-898","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Assessing differential usage of usenet social accounting meta-data"],"prefix":"10.1145","author":[{"given":"A.J. Bernheim","family":"Brush","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, WA"}]},{"given":"Xiaoqing","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA"}]},{"given":"Tammara Combs","family":"Turner","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA"}]},{"given":"Marc A.","family":"Smith","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA"}]}],"member":"320","published-online":{"date-parts":[[2005,4,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.12.4.346.9703"},{"key":"e_1_3_2_1_2_1","volume-title":"Identity and Deception in the Virtual Community. Communities in Cyberspace. P. Kollock and M. Smith","author":"Donath J.","year":"1996","unstructured":"Donath , J. Identity and Deception in the Virtual Community. Communities in Cyberspace. P. Kollock and M. Smith . London, Routledge . ( 1996 ). Donath, J. Identity and Deception in the Virtual Community. Communities in Cyberspace. P. Kollock and M. Smith. London, Routledge. (1996)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/505248.505271"},{"key":"e_1_3_2_1_4_1","first-page":"4","volume":"4","author":"Donath J.","year":"1999","unstructured":"Donath , J. Visualizing Conversation . Journal of Computer-Mediated Communication , 4 , 4 ( 1999 ). Donath, J. Visualizing Conversation. Journal of Computer-Mediated Communication, 4, 4 (1999).","journal-title":"Computer-Mediated Communication"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/505248.505270"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/503376.503434"},{"key":"e_1_3_2_1_7_1","volume-title":"A Typology of Social Roles in Usenet. A thesis submitted to the Department of Linguistics","author":"Golder S.","year":"2003","unstructured":"Golder , S. A Typology of Social Roles in Usenet. A thesis submitted to the Department of Linguistics , Harvard University . ( 2003 ). Golder, S. A Typology of Social Roles in Usenet. A thesis submitted to the Department of Linguistics, Harvard University. (2003)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0023"},{"key":"e_1_3_2_1_9_1","volume-title":"Community Building on the Web: Secret Strategies for Successful Online Communities","author":"Kim A. J.","year":"2000","unstructured":"Kim , A. J. Community Building on the Web: Secret Strategies for Successful Online Communities . Berkeley, CA , Peachpit Press . ( 2000 ). Kim, A. J. Community Building on the Web: Secret Strategies for Successful Online Communities. Berkeley, CA, Peachpit Press. (2000)."},{"key":"e_1_3_2_1_10_1","volume-title":"Managing the virtual commons: Cooperation and conflict in computer communities. Computer-Mediated Communication: Linguistic, Social, and Cross-Cultural Perspectives. S. C. Herring","author":"Kollock P.","year":"1996","unstructured":"Kollock , P. and Smith M . Managing the virtual commons: Cooperation and conflict in computer communities. Computer-Mediated Communication: Linguistic, Social, and Cross-Cultural Perspectives. S. C. Herring . Amsterdam, John Benjamin : ( 1996 ), 109--128. Kollock, P. and Smith M. Managing the virtual commons: Cooperation and conflict in computer communities. Computer-Mediated Communication: Linguistic, Social, and Cross-Cultural Perspectives. S. C. Herring. Amsterdam, John Benjamin: (1996), 109--128."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985761"},{"key":"e_1_3_2_1_12_1","volume-title":"Silent Participants: Getting to Know Lurkers Better. From Usenet to Cowebs: Interacting with Social Information Spaces. C. Leug and D. Fisher","author":"Nonnecke B.","year":"2003","unstructured":"Nonnecke , B. and Preece J . Silent Participants: Getting to Know Lurkers Better. From Usenet to Cowebs: Interacting with Social Information Spaces. C. Leug and D. Fisher , Springer Verlag : Amsterdam, Holland . ( 2003 ), 110--132. Nonnecke, B. and Preece J. Silent Participants: Getting to Know Lurkers Better. From Usenet to Cowebs: Interacting with Social Information Spaces. C. Leug and D. Fisher, Springer Verlag: Amsterdam, Holland. (2003), 110--132."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"e_1_3_2_1_14_1","first-page":"3","volume":"17","author":"Sack W.","year":"2000","unstructured":"Sack , W. Conversation Map : An interface for Very Large-scale Conversations. Journal of Management Information Systems , 17 3 ( 2000 ), 73--92. Sack, W. Conversation Map: An interface for Very Large-scale Conversations. Journal of Management Information Systems, 17 3 (2000), 73--92.","journal-title":"Management Information Systems"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2003.1174576"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/505248.505272"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/365024.365073"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/302979.302981"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/765891.765963"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/289444.289500"}],"event":{"name":"CHI05: CHI 2005 Conference on Human Factors in Computing Systems","sponsor":["ACM Association for Computing Machinery","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Portland Oregon USA","acronym":"CHI05"},"container-title":["Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1054972.1055097","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1054972.1055097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:10Z","timestamp":1750262890000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1054972.1055097"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,4,2]]},"references-count":20,"alternative-id":["10.1145\/1054972.1055097","10.1145\/1054972"],"URL":"https:\/\/doi.org\/10.1145\/1054972.1055097","relation":{},"subject":[],"published":{"date-parts":[[2005,4,2]]},"assertion":[{"value":"2005-04-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}