{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T19:17:34Z","timestamp":1772824654015,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,19]],"date-time":"2018-04-19T00:00:00Z","timestamp":1524096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,19]]},"DOI":"10.1145\/3173574.3173692","type":"proceedings-article","created":{"date-parts":[[2018,4,20]],"date-time":"2018-04-20T15:43:11Z","timestamp":1524238991000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Exploring New Metaphors for a Networked World through the File Biography"],"prefix":"10.1145","author":[{"given":"Si\u00e2n E.","family":"Lindley","sequence":"first","affiliation":[{"name":"Microsoft Research, Cambridge, United Kingdom"}]},{"given":"Gavin","family":"Smyth","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge, United Kingdom"}]},{"given":"Robert","family":"Corish","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge, United Kingdom"}]},{"given":"Anastasia","family":"Loukianov","sequence":"additional","affiliation":[{"name":"University of Surrey, Surrey, United Kingdom"}]},{"given":"Michael","family":"Golembewski","sequence":"additional","affiliation":[{"name":"Royal College of Art, London, United Kingdom"}]},{"given":"Ewa A.","family":"Luger","sequence":"additional","affiliation":[{"name":"Edinburgh University, Edinburgh, Midlothian , United Kingdom"}]},{"given":"Abigail","family":"Sellen","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2018,4,19]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.7146\/aahcc.v1i1.21312"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753427"},{"key":"e_1_3_2_2_3_1","volume-title":"Basics of Qualitative Research","author":"Corbin Juliet","unstructured":"Juliet Corbin and Anselm Strauss. 2008. Basics of Qualitative Research (3rd ed.). Sage Publications.","edition":"3"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/319091.319099"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466453"},{"key":"e_1_3_2_2_6_1","volume-title":"Proceedings of the 18th conference on USENIX Security Symposium (SSYM'09)","author":"Geambasu Roxana","unstructured":"Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, and Henry M. Levy. 2009. Vanish: increasing data privacy with self-destructing data. In Proceedings of the 18th conference on USENIX Security Symposium (SSYM'09), 299--316."},{"key":"e_1_3_2_2_7_1","unstructured":"Git. Retrieved September 18 2017 from https:\/\/gitscm.com\/"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858154"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441903"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/142750.142751"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753439"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979334"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Lawrence Lessig. 2008. Remix. Penguin Books.","DOI":"10.5040\/9781849662505"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2389176.2389202"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2317956.2318038"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207789"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2598577"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979161"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518746"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466218"},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of the 7th conference on File and Storage Technologies (FAST '09)","author":"Salmon Brandon","unstructured":"Brandon Salmon, Steven W. Schlosser, Lorrie Faith Cranor, and Gregory R. Ganger. 2009. Perspective: semantic data management for the home. In Proceedings of the 7th conference on File and Storage Technologies (FAST '09), 167--182."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1500774.1500840"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/94079.94081"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837915.1837920"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481313"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124806"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518744"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/07370024.2017.1295857"}],"event":{"name":"CHI '18: CHI Conference on Human Factors in Computing Systems","location":"Montreal QC Canada","acronym":"CHI '18","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3173574.3173692","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3173574.3173692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:02:57Z","timestamp":1750215777000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3173574.3173692"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,19]]},"references-count":28,"alternative-id":["10.1145\/3173574.3173692","10.1145\/3173574"],"URL":"https:\/\/doi.org\/10.1145\/3173574.3173692","relation":{},"subject":[],"published":{"date-parts":[[2018,4,19]]},"assertion":[{"value":"2018-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}