{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T16:16:54Z","timestamp":1774196214364,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,5,5]],"date-time":"2012-05-05T00:00:00Z","timestamp":1336176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,5,5]]},"DOI":"10.1145\/2207676.2207722","type":"proceedings-article","created":{"date-parts":[[2012,5,7]],"date-time":"2012-05-07T18:47:53Z","timestamp":1336416473000},"page":"327-336","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Investigating the presence, form and behavior of virtual possessions in the context of a teen bedroom"],"prefix":"10.1145","author":[{"given":"William","family":"Odom","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, United States"}]},{"given":"John","family":"Zimmerman","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, United States"}]},{"given":"Jodi","family":"Forlizzi","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, United States"}]},{"given":"Hajin","family":"Choi","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, United States"}]},{"given":"Stephanie","family":"Meier","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, United States"}]},{"given":"Angela","family":"Park","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, Pennsylvania, United States"}]}],"member":"320","published-online":{"date-parts":[[2012,5,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Privacy issues and human-computer interaction","author":"Ackerman M."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/15710880600608230"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1086\/209154"},{"key":"e_1_3_2_1_4_1","volume-title":"danah","year":"2007"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/347642.347802"},{"key":"e_1_3_2_1_6_1","volume-title":"Place Attachment","author":"Chawla L."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1182475.1182493"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1771592.1771617"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2009.09.005"},{"key":"e_1_3_2_1_11_1","volume-title":"At Home with Ubiquitous Computing: Seven Challenges. Ubicomp '01","author":"Edwards K.","year":"2001"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/242485.242493"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642653"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","volume-title":"Modernity and Self-Identity: Self and Society in the Late Modern Age","author":"Giddens A.","DOI":"10.4324\/9781003320609-62"},{"key":"e_1_3_2_1_15_1","volume-title":"The Presentation of Self in Everyday Llife","author":"Goffman E."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/PL00000019"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/110330880701600103"},{"key":"e_1_3_2_1_18_1","volume-title":"et al","author":"Ito M.","year":"2010"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124814"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718968"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124790"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979161"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/229868.230044"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01537056"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/503376.503455"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2009.09.003"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055038"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240710"}],"event":{"name":"CHI '12: CHI Conference on Human Factors in Computing Systems","location":"Austin Texas USA","acronym":"CHI '12","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2207676.2207722","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2207676.2207722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:03Z","timestamp":1750238463000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2207676.2207722"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5,5]]},"references-count":29,"alternative-id":["10.1145\/2207676.2207722","10.1145\/2207676"],"URL":"https:\/\/doi.org\/10.1145\/2207676.2207722","relation":{},"subject":[],"published":{"date-parts":[[2012,5,5]]},"assertion":[{"value":"2012-05-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}