{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T06:35:09Z","timestamp":1774593309697,"version":"3.50.1"},"reference-count":8,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T00:00:00Z","timestamp":1362096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["interactions"],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1145\/2427076.2427085","type":"journal-article","created":{"date-parts":[[2013,3,8]],"date-time":"2013-03-08T15:00:42Z","timestamp":1362754842000},"page":"39-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Data in the wild"],"prefix":"10.1145","volume":"20","author":[{"given":"Chee Siang","family":"Ang","sequence":"first","affiliation":[{"name":"University of Kent"}]},{"given":"Ania","family":"Bobrowicz","sequence":"additional","affiliation":[{"name":"University of Kent"}]},{"given":"Diane J.","family":"Schiano","sequence":"additional","affiliation":[{"name":"djs.ux.consulting"}]},{"given":"Bonnie","family":"Nardi","sequence":"additional","affiliation":[{"name":"University of California, Irvine"}]}],"member":"320","published-online":{"date-parts":[[2013,3]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.331"},{"key":"e_1_2_1_2_1","volume-title":"K. Six provocations for Big Data. A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society","year":"2011","unstructured":"boyd , d. and Crawford , K. Six provocations for Big Data. A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society . Oxford Internet Institute , 2011 ; http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1926431 boyd, d. and Crawford, K. Six provocations for Big Data. A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society. Oxford Internet Institute, 2011; http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1926431"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","DOI":"10.2307\/j.cttq9s20","volume-title":"Ethnography and Virtual Worlds: A Handbook of Method","author":"Boellstorff T.","year":"2012","unstructured":"Boellstorff , T. , Nardi , B. , Pearce , C. , and Taylor T.L . Ethnography and Virtual Worlds: A Handbook of Method . Princeton University Press , Princeton, NJ , 2012 . Boellstorff, T., Nardi, B., Pearce, C., and Taylor T.L. Ethnography and Virtual Worlds: A Handbook of Method. Princeton University Press, Princeton, NJ, 2012."},{"key":"e_1_2_1_4_1","unstructured":"Big Data white paper: Challenges and opportunities with Big Data. A community white paper developed by leading researchers across the United States. 2012; http:\/\/cra.org\/ccc\/docs\/init\/bigdatawhitepaper.pdf  Big Data white paper: Challenges and opportunities with Big Data. A community white paper developed by leading researchers across the United States. 2012; http:\/\/cra.org\/ccc\/docs\/init\/bigdatawhitepaper.pdf"},{"key":"e_1_2_1_5_1","volume-title":"Google's street-level maps raising privacy concerns","author":"Mills E.","year":"2007","unstructured":"Mills , E. Google's street-level maps raising privacy concerns ; http:\/\/www.usatoday.com\/tech\/news\/internetprivacy\/ 2007 -06-01-google-maps-privacy_N.htm Mills, E. Google's street-level maps raising privacy concerns; http:\/\/www.usatoday.com\/tech\/news\/internetprivacy\/2007-06-01-google-maps-privacy_N.htm"},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780199935819.001.0001","volume-title":"eGods: Fantasy Versus Faith","author":"Bainbridge W.","year":"2013","unstructured":"Bainbridge , W. eGods: Fantasy Versus Faith . Oxford University Press , Oxford, U.K. , 2013 . Bainbridge, W. eGods: Fantasy Versus Faith. Oxford University Press, Oxford, U.K., 2013."},{"key":"e_1_2_1_7_1","volume-title":"Child Exploitation and Online Protection Centre regulatory framework (http:\/\/ceop.police.uk\/)","author":"California","year":"2004","unstructured":"California law documents : Child Exploitation and Online Protection Centre regulatory framework (http:\/\/ceop.police.uk\/) ; Children Act 2004 (http:\/\/www.legislation.gov.uk\/ukpga\/2004\/31\/contents); Computer Misuse Act 1990 (http:\/\/www.legislation.gov.uk\/ukpga\/1990\/18\/contents); Data Protection Act 1998 (http:\/\/www.legislation.gov.uk\/ukpga\/1998\/29\/contents); The European Convention on Human Rights ( http:\/\/www.hri.org\/docs\/ECHR50.html) California law documents: Child Exploitation and Online Protection Centre regulatory framework (http:\/\/ceop.police.uk\/); Children Act 2004 (http:\/\/www.legislation.gov.uk\/ukpga\/2004\/31\/contents); Computer Misuse Act 1990 (http:\/\/www.legislation.gov.uk\/ukpga\/1990\/18\/contents); Data Protection Act 1998 (http:\/\/www.legislation.gov.uk\/ukpga\/1998\/29\/contents); The European Convention on Human Rights (http:\/\/www.hri.org\/docs\/ECHR50.html)"},{"key":"e_1_2_1_8_1","unstructured":"Internet Society. Understanding your online identity protecting your privacy. 2012; http:\/\/www.internetsociety.org\/understanding-your-online-identity-protecting-your-privacy  Internet Society. Understanding your online identity protecting your privacy. 2012; http:\/\/www.internetsociety.org\/understanding-your-online-identity-protecting-your-privacy"}],"container-title":["Interactions"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2427076.2427085","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2427076.2427085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:49:01Z","timestamp":1750236541000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2427076.2427085"}},"subtitle":["some reflections"],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":8,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,3]]}},"alternative-id":["10.1145\/2427076.2427085"],"URL":"https:\/\/doi.org\/10.1145\/2427076.2427085","relation":{},"ISSN":["1072-5520","1558-3449"],"issn-type":[{"value":"1072-5520","type":"print"},{"value":"1558-3449","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3]]},"assertion":[{"value":"2013-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}