{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:17:03Z","timestamp":1776107823368,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T00:00:00Z","timestamp":1462579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,7]]},"DOI":"10.1145\/2858036.2858136","type":"proceedings-article","created":{"date-parts":[[2016,5,5]],"date-time":"2016-05-05T14:08:22Z","timestamp":1462457302000},"page":"2895-2907","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":99,"title":["Digital Footprints and Changing Networks During Online Identity Transitions"],"prefix":"10.1145","author":[{"given":"Oliver L.","family":"Haimson","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Jed R.","family":"Brubaker","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder, Boulder, CO, USA"}]},{"given":"Lynn","family":"Dombrowski","sequence":"additional","affiliation":[{"name":"Indiana University - Purdue University Indianapolis (IUPUI), Indianpolis, IN, USA"}]},{"given":"Gillian R.","family":"Hayes","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,5,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240683"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501608"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517859"},{"key":"e_1_3_2_1_4_1","volume-title":"Berger and Thomas Luckmann","author":"Peter","year":"1966"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753560"},{"key":"e_1_3_2_1_6_1","volume-title":"Memory Practices in the Sciences","author":"Bowker Geoffrey C."},{"key":"e_1_3_2_1_7_1","unstructured":"danah boyd. 2008. Taken Out of Context: American Teen Sociality in Networked Publics. danah boyd. 2008. Taken Out of Context: American Teen Sociality in Networked Publics."},{"key":"e_1_3_2_1_8_1","volume-title":"Networked Self: Identity, Community, and Culture on Social Network Sites"},{"key":"e_1_3_2_1_9_1","unstructured":"Judith Butler. 1993. Bodies That Matter: On the Discursive Limits of \"Sex.\" Routledge. Judith Butler. 1993. Bodies That Matter: On the Discursive Limits of \"Sex.\" Routledge."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.2307\/2136404"},{"key":"e_1_3_2_1_11_1","volume-title":"Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory","author":"Corbin Juliet"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/1470357207084865"},{"key":"e_1_3_2_1_13_1","volume-title":"Social Media Update","author":"Duggan Maeve","year":"2014"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702460"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","volume-title":"Presentation of Self in Everyday Life","author":"Goffman Erving","DOI":"10.4324\/9781003320609-59"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702238"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207729"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466240"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702297"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702270"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675152"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1215\/23289252-2815255"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/1750698008093795"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.36"},{"key":"e_1_3_2_1_25_1","volume-title":"It's about time: Privacy, information lifecycles, and the right to be forgotten. Social Science Research Network","author":"Jones Meg Leta","year":"2015"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124814"},{"key":"e_1_3_2_1_27_1","volume-title":"Forgetting footprints, shunning shadows: A critical analysis of the \"right to be forgotten\" in big data practice. Social Science Research Network","author":"Koops Bert-Jaap","year":"2015"},{"key":"e_1_3_2_1_28_1","unstructured":"Priya Kumar. 2014. A Digital Footprint From Birth: New Mothers? Decisions to Share Baby Pictures Online. Priya Kumar. 2014. A Digital Footprint From Birth: New Mothers? Decisions to Share Baby Pictures Online."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675149"},{"key":"e_1_3_2_1_30_1","volume-title":"Handbook of Qualitative Organizational Research: Innovative Pathways and Methods, Kimberly D","author":"Locke Karen"},{"key":"e_1_3_2_1_31_1","volume-title":"Lovibond","author":"Lovibond S. F.","year":"1995"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675203"},{"issue":"0","key":"e_1_3_2_1_33_1","first-page":"5","article-title":"I'm more than just a Friendster profile: Edentity, authenticity, and power in social networking services","volume":"6","author":"Marwick Alice E.","year":"2005","journal-title":"Association for Internet Researchers"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444810365313"},{"key":"e_1_3_2_1_35_1","volume-title":"Delete: The Virtue of Forgetting in the Digital Age","author":"Mayer-Sch\u00f6nberger Viktor","year":"2009"},{"key":"e_1_3_2_1_36_1","volume-title":"From the Standpoint of a Social Behaviorist","author":"Mead George Herbert"},{"key":"e_1_3_2_1_37_1","unstructured":"Edited by Paul Muljadi. Digital Marketing Handbook. Paul Muljadi. Edited by Paul Muljadi. Digital Marketing Handbook. Paul Muljadi."},{"key":"e_1_3_2_1_38_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","journal-title":"Washington Law Review"},{"key":"e_1_3_2_1_39_1","volume-title":"Human Aspects of Information Security","author":"Novotny Alexander"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207723"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753635"},{"key":"e_1_3_2_1_43_1","volume-title":"The Washington Post. Retrieved","author":"Peterson Andrea","year":"2015"},{"key":"e_1_3_2_1_44_1","volume-title":"Retrieved","year":"2015"},{"key":"e_1_3_2_1_45_1","first-page":"88","article-title":"The right to be forgotten","volume":"64","author":"Rosen Jeffrey","year":"2012","journal-title":"Stanford Law Review Online"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466241"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145374"},{"key":"e_1_3_2_1_48_1","unstructured":"Susan Stryker. 2009. Transgender History. Seal Press. Susan Stryker. 2009. Transgender History. Seal Press."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1089\/1094931041291295"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1215\/9780822390213"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.03.003"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531672"},{"key":"e_1_3_2_1_53_1","first-page":"2","article-title":"The right to be forgotten: More than a Pandora's box","volume":"2","author":"Weber Rolf H.","year":"2011","journal-title":"Journal of Intellectual Property, Information Technology and E-Commerce Law"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557126"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557291"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470656"}],"event":{"name":"CHI'16: CHI Conference on Human Factors in Computing Systems","location":"San Jose California USA","acronym":"CHI'16","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858036.2858136","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2858036.2858136","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:11Z","timestamp":1750222451000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858036.2858136"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,7]]},"references-count":56,"alternative-id":["10.1145\/2858036.2858136","10.1145\/2858036"],"URL":"https:\/\/doi.org\/10.1145\/2858036.2858136","relation":{},"subject":[],"published":{"date-parts":[[2016,5,7]]},"assertion":[{"value":"2016-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}