{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:31Z","timestamp":1750307491169,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,11,12]],"date-time":"2010-11-12T00:00:00Z","timestamp":1289520000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,11,12]]},"DOI":"10.1145\/1873561.1873563","type":"proceedings-article","created":{"date-parts":[[2010,11,16]],"date-time":"2010-11-16T14:07:20Z","timestamp":1289916440000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Principles for applying social navigation to collaborative systems"],"prefix":"10.1145","author":[{"given":"Min","family":"Wu","sequence":"first","affiliation":[{"name":"Oracle Corporation, Redwood Shores, CA"}]},{"given":"C. Travis","family":"Bowles","sequence":"additional","affiliation":[{"name":"UXellence, San Carlos, CA"}]}],"member":"320","published-online":{"date-parts":[[2010,11,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Besnard D. and Arief B. 2004. Computer security impaired by legitimate users. Computer &amp; Security. Volumn 23 (February 2004) 253--264.  Besnard D. and Arief B. 2004. Computer security impaired by legitimate users. Computer &amp; Security. Volumn 23 (February 2004) 253--264.","DOI":"10.1016\/j.cose.2003.09.002"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753846.1754012"},{"volume-title":"Workshop on the Social Navigation and Community-Based Adaption Technologies.","year":"2006","author":"Birukou A.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/352580.352587"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073011"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572539"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1234772.1234786"},{"key":"e_1_3_2_1_8_1","unstructured":"Henry R. 2009. Universal Collaboration. The Future of Unified Communication and Collaboration. Advaiya Inc.  Henry R. 2009. Universal Collaboration. The Future of Unified Communication and Collaboration. Advaiya Inc."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1234772.1234787"},{"volume":"2347","volume-title":"Proceedings of the Second International Conference on Adaptive Hypermedia and Adaptive Web-Based Systems Lecture Notes In Computer Science;","author":"Kurhila J.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","unstructured":"Lamont S. and Lokesh D. 2010. Assessing the State of Collaboration. Return to Essential. All Collaboration.  Lamont S. and Lokesh D. 2010. Assessing the State of Collaboration. Return to Essential. All Collaboration."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Ling K. Beenen G. Ludford P. J. Wang X. Chang K. Li X. Cosley D. Frankowski D. Terveen L. Rashid A. M. Resnick P. and Kraut R. E. Using Social Psychology to Motivate Contribution to Online Comments. 2005. Journal of Computer-Mediated Communication. 10(4) (2005).  Ling K. Beenen G. Ludford P. J. Wang X. Chang K. Li X. Cosley D. Frankowski D. Terveen L. Rashid A. M. Resnick P. and Kraut R. E. Using Social Psychology to Motivate Contribution to Online Comments. 2005. Journal of Computer-Mediated Communication. 10(4) (2005).","DOI":"10.1111\/j.1083-6101.2005.tb00273.x"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.009"},{"issue":"3","key":"e_1_3_2_1_14_1","volume":"47","author":"McAfee P. A.","journal-title":"MIT Sloan Management Review"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1149941.1149950"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124792"},{"volume-title":"Enterprise: Challenges and Opportunities. In Current Trends in Information Technology","year":"2009","author":"Onyechi G. C.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124915"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/359784.360320"},{"key":"e_1_3_2_1_20_1","unstructured":"Robertson J. 2007. Successful collaboration requires support. Step Two Designs (November 2007).  Robertson J. 2007. Successful collaboration requires support. Step Two Designs (November 2007)."},{"key":"e_1_3_2_1_21_1","unstructured":"Robertson J. 2007. Establish a portfolio of collaboration tools. Step Two Designs (November 2007).  Robertson J. 2007. Establish a portfolio of collaboration tools. Step Two Designs (November 2007)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/365024.365130"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/286498.286827"},{"key":"e_1_3_2_1_24_1","unstructured":"Williams A. 2009. Real-Time Collaboration Has Stalled...For Now. ReadWriteWeb (October 2009).  Williams A. 2009. Real-Time Collaboration Has Stalled...For Now. ReadWriteWeb (October 2009)."},{"key":"e_1_3_2_1_25_1","unstructured":"Young G. O. 2009. The Enterprise 2.0 Buyer Profile: 2009. Forrester Research (May 2009).  Young G. O. 2009. The Enterprise 2.0 Buyer Profile: 2009. Forrester Research (May 2009)."}],"event":{"name":"CHiMiT '10: Computer Human Interaction for the Management of Information Technology","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","USENIX Assoc USENIX Assoc"],"location":"San Jose California","acronym":"CHiMiT '10"},"container-title":["Proceedings of the 4th Symposium on Computer Human Interaction for the Management of Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1873561.1873563","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1873561.1873563","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:33Z","timestamp":1750249053000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1873561.1873563"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,12]]},"references-count":25,"alternative-id":["10.1145\/1873561.1873563","10.1145\/1873561"],"URL":"https:\/\/doi.org\/10.1145\/1873561.1873563","relation":{},"subject":[],"published":{"date-parts":[[2010,11,12]]},"assertion":[{"value":"2010-11-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}