{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:12:37Z","timestamp":1755997957860,"version":"3.41.0"},"reference-count":0,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2014,10,30]],"date-time":"2014-10-30T00:00:00Z","timestamp":1414627200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["interactions"],"published-print":{"date-parts":[[2014,10,30]]},"abstract":"<jats:p>\n            Social media has become globally ubiquitous, transforming how people are networked and mobilized. This forum explores research and applications of these new networked publics at individual, organizational, and societal levels.\n            <jats:bold>---Shelly Farnham, Editor<\/jats:bold>\n          <\/jats:p>","DOI":"10.1145\/2675705","type":"journal-article","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T19:28:54Z","timestamp":1414783734000},"page":"72-75","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Antisocial computing"],"prefix":"10.1145","volume":"21","author":[{"given":"David W.","family":"McDonald","sequence":"first","affiliation":[{"name":"University of Washington"}]},{"given":"David H.","family":"Ackley","sequence":"additional","affiliation":[{"name":"University of New Mexico"}]},{"given":"Randal","family":"Bryant","sequence":"additional","affiliation":[{"name":"Carnegie-Mellon University"}]},{"given":"Melissa","family":"Gedney","sequence":"additional","affiliation":[{"name":"Digital Promise"}]},{"given":"Haym","family":"Hirsh","sequence":"additional","affiliation":[{"name":"Cornell University"}]},{"given":"Lea","family":"Shanley","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison"}]}],"member":"320","published-online":{"date-parts":[[2014,10,30]]},"container-title":["Interactions"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2675705","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2675705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:47Z","timestamp":1750277687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2675705"}},"subtitle":["exploring design risks in social computing systems"],"short-title":[],"issued":{"date-parts":[[2014,10,30]]},"references-count":0,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,10,30]]}},"alternative-id":["10.1145\/2675705"],"URL":"https:\/\/doi.org\/10.1145\/2675705","relation":{},"ISSN":["1072-5520","1558-3449"],"issn-type":[{"type":"print","value":"1072-5520"},{"type":"electronic","value":"1558-3449"}],"subject":[],"published":{"date-parts":[[2014,10,30]]},"assertion":[{"value":"2014-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}