{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T02:01:30Z","timestamp":1760061690055,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T00:00:00Z","timestamp":1328572800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,2,7]]},"DOI":"10.1145\/2132176.2132186","type":"proceedings-article","created":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T15:39:28Z","timestamp":1328629168000},"page":"72-79","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Exploring the character of participation in social media"],"prefix":"10.1145","author":[{"given":"Nassim","family":"Jafarinaimi","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2012,2,7]]},"reference":[{"unstructured":"Google. Available at http:\/\/images.google.com\/imagelabeler\/.  Google. Available at http:\/\/images.google.com\/imagelabeler\/.","key":"e_1_3_2_1_1_1"},{"unstructured":"Open Mind Initiative. Available at http:\/\/www.openmind.org\/.  Open Mind Initiative. Available at http:\/\/www.openmind.org\/.","key":"e_1_3_2_1_2_1"},{"unstructured":"Bogost I. Persuasive Games: Exploitationware May 2011. Available at http:\/\/www.gamasutra.com\/view\/feature\/6366\/persuasive_games_exploitationware.phpv.  Bogost I. Persuasive Games: Exploitationware May 2011. Available at http:\/\/www.gamasutra.com\/view\/feature\/6366\/persuasive_games_exploitationware.phpv.","key":"e_1_3_2_1_3_1"},{"volume-title":"Sage Publications","year":"2006","author":"Charmaz K.","key":"e_1_3_2_1_4_1"},{"volume-title":"University of California Press","year":"1986","author":"Clifford J.","key":"e_1_3_2_1_5_1"},{"volume-title":"Cosimo Classics","year":"2005","author":"Dewey J.","key":"e_1_3_2_1_6_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1124772.1124834"},{"volume-title":"Harvard University Press","year":"1995","author":"Geertz C.","key":"e_1_3_2_1_8_1"},{"volume-title":"Aldine Publishing Co.","year":"1967","author":"Glaser B.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1868914.1868998"},{"volume-title":"UK","year":"1997","author":"Grint K.","key":"e_1_3_2_1_11_1"},{"volume-title":"Crown Business","year":"2008","author":"Howe J.","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/358916.361990"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.5555\/517690"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/1520340.1520597"},{"volume-title":"Penguin Press","year":"2008","author":"Shirky C.","key":"e_1_3_2_1_16_1"},{"volume-title":"Peter Lang","year":"2009","author":"Song F. W.","key":"e_1_3_2_1_17_1"},{"volume-title":"Doubleday","year":"2004","author":"Surowiecki J.","key":"e_1_3_2_1_18_1"},{"volume-title":"University of Chicago Press","year":"2006","author":"Turner F.","key":"e_1_3_2_1_19_1"},{"volume-title":"University of Chicago Press","year":"1988","author":"Van Maanen J.","key":"e_1_3_2_1_20_1"},{"volume-title":"46th Annual Design Automation Conference","year":"2009","author":"von Ahn L.","key":"e_1_3_2_1_21_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/985692.985733"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/1378704.1378719"},{"key":"e_1_3_2_1_24_1","first-page":"102","article-title":"Configuring the User: the case of usability trials. In J. Law, A Sociology of Monsters, Routledge","volume":"57","author":"Woolgar S","year":"1991","journal-title":"London"},{"unstructured":"Zittrain J. The future of the Internet and how to stop it. Yale University Press New Haven Connecticut 2008.   Zittrain J. The future of the Internet and how to stop it . Yale University Press New Haven Connecticut 2008.","key":"e_1_3_2_1_25_1"},{"unstructured":"Zittrain J. Minds for Sale. March 2010. Available at http:\/\/cyber.law.harvard.edu\/events\/2010\/02\/zittrain.  Zittrain J. Minds for Sale. March 2010. Available at http:\/\/cyber.law.harvard.edu\/events\/2010\/02\/zittrain.","key":"e_1_3_2_1_26_1"}],"event":{"acronym":"iConference '12","name":"iConference '12: iConference 2012","location":"Toronto Ontario Canada"},"container-title":["Proceedings of the 2012 iConference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2132176.2132186","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2132176.2132186","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:07:38Z","timestamp":1750273658000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2132176.2132186"}},"subtitle":["the case of Google Image Labeler"],"short-title":[],"issued":{"date-parts":[[2012,2,7]]},"references-count":26,"alternative-id":["10.1145\/2132176.2132186","10.1145\/2132176"],"URL":"https:\/\/doi.org\/10.1145\/2132176.2132186","relation":{},"subject":[],"published":{"date-parts":[[2012,2,7]]},"assertion":[{"value":"2012-02-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}