{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:07:53Z","timestamp":1776121673470,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,21]],"date-time":"2014-06-21T00:00:00Z","timestamp":1403308800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["750271"],"award-info":[{"award-number":["750271"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,21]]},"DOI":"10.1145\/2598510.2598579","type":"proceedings-article","created":{"date-parts":[[2014,6,20]],"date-time":"2014-06-20T13:06:05Z","timestamp":1403269565000},"page":"975-984","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":48,"title":["Legacy in the age of the internet"],"prefix":"10.1145","author":[{"given":"Rebecca","family":"Gulotta","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"William","family":"Odom","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Haakon","family":"Faste","sequence":"additional","affiliation":[{"name":"California College of the Arts, San Francisco, CA, USA"}]},{"given":"Jodi","family":"Forlizzi","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,6,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/584993.585055"},{"key":"e_1_3_2_1_2_1","volume-title":"(My) Space of one's own: Privacy and online social networks. Northwestern Journal of Technology and Intellectual Property, 6","author":"Abril P.S.","year":"2007"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/15710880600608230"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958843"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1086\/209154"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1515\/auk-2004-0108"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00988593"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22864"},{"key":"e_1_3_2_1_9_1","volume-title":"Self-censorship on Facebook","author":"Das S.","year":"2013"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357177"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01494.x"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1316624.1316682"},{"issue":"2","key":"e_1_3_2_1_13_1","first-page":"415","article-title":"Managing impressions online: Self presentation processes in the online dating environment","volume":"11","author":"Ellison N.","year":"2006","journal-title":"Journal of ComputerMediated Communication"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958880"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753665"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107458.1107460"},{"key":"e_1_3_2_1_17_1","volume-title":"Presentation of self in everyday life","author":"Goffman I.","year":"1959"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI16234_10"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466240"},{"key":"e_1_3_2_1_20_1","volume-title":"Universal methods of design","author":"Hanington B.","year":"2012"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640233.1640244"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-4079(13)60820-9"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1000676723815"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaging.2004.08.002"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00400.x"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/07370024.2012.656065","article-title":"Before I forget: From personal memory to family history","volume":"27","author":"Lindley S.E.","year":"2012","journal-title":"Human-Computer Interaction"},{"key":"e_1_3_2_1_27_1","volume-title":"How people manage personal information over a lifetime. Personal Information Management, 57--75","author":"Marshall C.C.","year":"2007"},{"key":"e_1_3_2_1_28_1","volume-title":"Social media, personal data, and reusing our digital legacy. Personal Archiving: Preserving Our Digital Heritage","author":"Marshall C.C.","year":"2013"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2049955"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1037\/1089-2680.5.2.100"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207723"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1836216.1836224"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466242"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_1_35_1","volume-title":"Needfinding: The why and how of uncovering people's needs. Design Management Journal, 37--43","author":"Patnaik D.","year":"1999"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357065"},{"issue":"2","key":"e_1_3_2_1_37_1","first-page":"406","article-title":"Negotiating the digital closet: Online pseudonymity and the politics of sexual identity","volume":"5","author":"Phillips D.J.","year":"2010","journal-title":"Information, Communication, & Society"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1086\/314319"},{"key":"e_1_3_2_1_39_1","unstructured":"Rosen J. (2010 July 21). The web means the end of forgetting. The New York Times. Rosen J. (2010 July 21). The web means the end of forgetting. The New York Times."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466241"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1037\/0012-1649.44.2.496"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240636"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00380.x"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2008.09.007"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444805052282"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.2190\/OM.64.4.a"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107458.1107494"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.2307\/800358"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.02.012"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470656"}],"event":{"name":"DIS '14: Designing Interactive Systems Conference 2014","location":"Vancouver BC Canada","acronym":"DIS '14","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2014 conference on Designing interactive systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2598510.2598579","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2598510.2598579","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:51Z","timestamp":1750229751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2598510.2598579"}},"subtitle":["reflections on how interactive systems shape how we are remembered"],"short-title":[],"issued":{"date-parts":[[2014,6,21]]},"references-count":50,"alternative-id":["10.1145\/2598510.2598579","10.1145\/2598510"],"URL":"https:\/\/doi.org\/10.1145\/2598510.2598579","relation":{},"subject":[],"published":{"date-parts":[[2014,6,21]]},"assertion":[{"value":"2014-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}