{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:58:15Z","timestamp":1775199495357,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T00:00:00Z","timestamp":1462579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["1216347"],"award-info":[{"award-number":["1216347"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,7]]},"DOI":"10.1145\/2858036.2858409","type":"proceedings-article","created":{"date-parts":[[2016,5,5]],"date-time":"2016-05-05T10:08:22Z","timestamp":1462442902000},"page":"2574-2585","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":107,"title":["An Archive of Their Own"],"prefix":"10.1145","author":[{"given":"Casey","family":"Fiesler","sequence":"first","affiliation":[{"name":"University of Colorado - Boulder, Boulder, CO, USA"}]},{"given":"Shannon","family":"Morrison","sequence":"additional","affiliation":[{"name":"College of Charleston, Charleston, SC, USA"}]},{"given":"Amy S.","family":"Bruckman","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,5,7]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979041"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753521"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208560"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557059"},{"key":"e_1_3_2_2_6_1","volume-title":"When should we use real names in published accounts of internet research? In Digital Research Confidential","author":"Bruckman Amy","unstructured":"Amy Bruckman, Kurt Luther, and Casey Fiesler. 2015. When should we use real names in published accounts of internet research? In Digital Research Confidential, Ezster Hargittai and Christian Sandvig (eds.). MIT Press, Cambridge, MA."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551512470051"},{"key":"e_1_3_2_2_8_1","volume-title":"ethics, and fan privacy","author":"Busse Kristina","unstructured":"Kristina Busse and Karen Hellekson. 2012. Identity, ethics, and fan privacy. In Fan Culture, Katherine Larsen and Lynn Zubernis (eds.). Cambridge Scholars Publishing, Newcastle, UK, 38--56."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1353\/cj.2015.0034"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456202.1456209"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1215\/02705346-1301566"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/spip.259"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2389176.2389218"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441831"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531695"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675234"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819931"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/jpcu.12198"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675223"},{"key":"e_1_3_2_2_20_1","volume-title":"Human-Computer Interaction in Management Information Systems: Foundations, Ping Zhang and Dennis","author":"Friedman Batya","unstructured":"Batya Friedman, Peter H. Kahn, and Alan Borning. 2006. Value Sensitive Design and information systems. In Human-Computer Interaction in Management Information Systems: Foundations, Ping Zhang and Dennis. F. Galletta (eds.). Routledge, NY, NY, 348--372."},{"key":"e_1_3_2_2_21_1","volume-title":"Presentation of Self in Everyday Life","author":"Goffman Erving","unstructured":"Erving Goffman. 1959. Presentation of Self in Everyday Life. Anchor Books, NY, NY."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675152"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557313"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1353\/cj.0.0140"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1353\/cj.2015.0017"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.03.003"},{"key":"e_1_3_2_2_27_1","volume-title":"Fic: Why Fanfiction is Taking Over the World. Smart Pop","author":"Jamison Anne","year":"2013","unstructured":"Anne Jamison. 2013. Fic: Why Fanfiction is Taking Over the World. Smart Pop, Dallas, TX."},{"key":"e_1_3_2_2_28_1","volume-title":"NY University Press","author":"Jenkins Henry","unstructured":"Henry Jenkins. 2006. Convergence Culture. NY University Press, NY, NY."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","unstructured":"Shannon Fay Johnson. 2014. Fan fiction metadata creation and utilization within fan fiction archives: Three primary models. Transformative Works and Cultures 17. http:\/\/doi.org\/10.3983\/twc.2014.0578","DOI":"10.3983\/twc.2014.0578"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2207798"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1177\/1367877912459132"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444811422887"},{"key":"e_1_3_2_2_33_1","volume-title":"The 2015 Annual Meeting of the American Educational Research Association.","author":"Polin Linda","year":"2015","unstructured":"Linda Polin, Sheila Pisa, Bonnie Nardi, Sylvie Noel, and Dev Sen. 2015. Mediated search for information: Finding information and help inside and outside ravelry.com. The 2015 Annual Meeting of the American Educational Research Association."},{"key":"e_1_3_2_2_34_1","volume-title":"Interviewing as Qualitative Research","author":"Seidman Irving","unstructured":"Irving Seidman. 1998. Interviewing as Qualitative Research. Teachers College Press, NY, NY."},{"key":"e_1_3_2_2_35_1","volume-title":"Online Proceedings of the 5th European Symposium on Gender & ICT. Retrieved","author":"Suchman Lucy","year":"2009","unstructured":"Lucy Suchman. 2009. Agencies in technology design: Feminist reconfigurations. Online Proceedings of the 5th European Symposium on Gender & ICT. Retrieved January 7, 2016 from http:\/\/www.informatik.unibremen.de\/soteg\/gict2009\/proceedings\/GICT2009_Suc hman.pdf"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.24"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702549"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/503376.503460"},{"key":"e_1_3_2_2_39_1","volume-title":"The Scope of Fair Use. Retrieved","author":"Courts Congressional Hearing","year":"2016","unstructured":"Congressional Hearing before the Subcommittee on Courts, Intellectual Property, and the Internet. 2014. The Scope of Fair Use. Retrieved January 7, 2016 from http:\/\/judiciary.house.gov\/index.cfm\/2014\/1\/thescope-of-fair-use"}],"event":{"name":"CHI'16: CHI Conference on Human Factors in Computing Systems","location":"San Jose California USA","acronym":"CHI'16","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858036.2858409","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2858036.2858409","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2858036.2858409","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:51:46Z","timestamp":1763459506000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858036.2858409"}},"subtitle":["A Case Study of Feminist HCI and Values in Design"],"short-title":[],"issued":{"date-parts":[[2016,5,7]]},"references-count":39,"alternative-id":["10.1145\/2858036.2858409","10.1145\/2858036"],"URL":"https:\/\/doi.org\/10.1145\/2858036.2858409","relation":{},"subject":[],"published":{"date-parts":[[2016,5,7]]},"assertion":[{"value":"2016-05-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}