{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T08:17:09Z","timestamp":1775204229588,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":85,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T00:00:00Z","timestamp":1560816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002790","name":"Canadian Network for Research and Innovation in Machining Technology, Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN-2017- 04549"],"award-info":[{"award-number":["RGPIN-2017- 04549"]}],"id":[{"id":"10.13039\/501100002790","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,18]]},"DOI":"10.1145\/3322276.3322300","type":"proceedings-article","created":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T12:45:07Z","timestamp":1561121107000},"page":"1463-1477","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Keeping and Discarding Personal Data"],"prefix":"10.1145","author":[{"given":"Francesco","family":"Vitale","sequence":"first","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"William","family":"Odom","sequence":"additional","affiliation":[{"name":"Simon Fraser University, Surrey, BC, Canada"}]},{"given":"Joanna","family":"McGrenere","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2019,6,18]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124805"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/221296.221307"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642672"},{"key":"e_1_3_2_2_4_1","volume-title":"Human-computer interaction: the agency perspective","author":"Bergman Ofer","unstructured":"Ofer Bergman . 2012. The user-subjective approach to personal information management: from theory to practice . In Human-computer interaction: the agency perspective . Springer , 55--81. Ofer Bergman. 2012. The user-subjective approach to personal information management: from theory to practice. In Human-computer interaction: the agency perspective. Springer, 55--81."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10283"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1093\/iwc\/iwu018"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0411-3"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518745"},{"key":"e_1_3_2_2_9_1","volume-title":"The Science of Managing Our Digital Stuff","author":"Bergman Ofer","unstructured":"Ofer Bergman and Steve Whittaker . 2016. The Science of Managing Our Digital Stuff . MIT Press . Ofer Bergman and Steve Whittaker. 2016. The Science of Managing Our Digital Stuff. MIT Press."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985766"},{"key":"e_1_3_2_2_11_1","volume-title":"Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1, 3, Article 38 (Sept.","author":"Brewer R. N.","year":"2017","unstructured":"R. N. Brewer , M. R. Morris , and S. E. Lindley . 2017. How to Remember What to Remember: Exploring Possibilities for Digital Reminder Systems . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1, 3, Article 38 (Sept. 2017 ), 20 pages. R. N. Brewer, M. R. Morris, and S. E. Lindley. 2017. How to Remember What to Remember: Exploring Possibilities for Digital Reminder Systems. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1, 3, Article 38 (Sept. 2017), 20 pages."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/347642.347802"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216295.1216317"},{"key":"e_1_3_2_2_14_1","volume-title":"Retrieved","author":"Cadwalladr Carole","year":"2018","unstructured":"Carole Cadwalladr and Emma Graham Harrison . 2018 . Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach | The Guardian. (17 March 2018) . Retrieved January 16, 2019 from https:\/\/www.theguardian.com\/news\/2018\/mar\/17\/ cambridge-analytica-facebook-influence-us-election Carole Cadwalladr and Emma Graham Harrison. 2018. Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach | The Guardian. (17 March 2018). Retrieved January 16, 2019 from https:\/\/www.theguardian.com\/news\/2018\/mar\/17\/ cambridge-analytica-facebook-influence-us-election"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173623"},{"key":"e_1_3_2_2_16_1","volume-title":"Encyclopedia of critical psychology","author":"Clarke Victoria","year":"1947","unstructured":"Victoria Clarke and Virginia Braun . 2014. Thematic analysis . In Encyclopedia of critical psychology . Springer , 1947 --1952. Victoria Clarke and Virginia Braun. 2014. Thematic analysis. In Encyclopedia of critical psychology. Springer, 1947--1952."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1771592.1771617"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/319091.319099"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804250"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/257089.257404"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985704"},{"key":"e_1_3_2_2_22_1","volume-title":"USENIX Security Symposium","volume":"316","author":"Geambasu Roxana","year":"2009","unstructured":"Roxana Geambasu , Tadayoshi Kohno , Amit A Levy , and Henry M Levy . 2009 . Vanish: Increasing Data Privacy with Self-Destructing Data .. In USENIX Security Symposium , Vol. 316 . Roxana Geambasu, Tadayoshi Kohno, Amit A Levy, and Henry M Levy. 2009. Vanish: Increasing Data Privacy with Self-Destructing Data.. In USENIX Security Symposium, Vol. 316."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2602964"},{"key":"e_1_3_2_2_24_1","first-page":"464","article-title":"Home Video Editing Made Easy-Balancing Automation and User Control","volume":"1","author":"Girgensohn Andreas","year":"2001","unstructured":"Andreas Girgensohn , Sara A Bly , Frank Shipman , John S Boreczky , and Lynn Wilcox . 2001 . Home Video Editing Made Easy-Balancing Automation and User Control .. In INTERACT , Vol. 1. 464 -- 471 . Andreas Girgensohn, Sara A Bly, Frank Shipman, John S Boreczky, and Lynn Wilcox. 2001. Home Video Editing Made Easy-Balancing Automation and User Control.. In INTERACT, Vol. 1. 464--471.","journal-title":"INTERACT"},{"key":"e_1_3_2_2_25_1","volume-title":"Retrieved","author":"Greenwald Glenn","year":"2013","unstructured":"Glenn Greenwald and Ewen MacAskill . 2013 . NSA Prism program taps in to user data of Apple, Google and others | The Guardian. (7 June 2013) . Retrieved January 16, 2019 from https:\/\/www.theguardian.com\/world\/2013\/ jun\/06\/us-tech-giants-nsa-data Glenn Greenwald and Ewen MacAskill. 2013. NSA Prism program taps in to user data of Apple, Google and others | The Guardian. (7 June 2013). Retrieved January 16, 2019 from https:\/\/www.theguardian.com\/world\/2013\/ jun\/06\/us-tech-giants-nsa-data"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466240"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702297"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/633292.633383"},{"key":"e_1_3_2_2_29_1","volume-title":"Supporting Prospective Information in Email. In CHI '01 Extended Abstracts on Human Factors in Computing Systems (CHI EA '01). ACM","author":"Gwizdka Jacek","year":"2001","unstructured":"Jacek Gwizdka . 2001 . Supporting Prospective Information in Email. In CHI '01 Extended Abstracts on Human Factors in Computing Systems (CHI EA '01). ACM , New York, NY, USA, 135--136. Jacek Gwizdka. 2001. Supporting Prospective Information in Email. In CHI '01 Extended Abstracts on Human Factors in Computing Systems (CHI EA '01). ACM, New York, NY, USA, 135--136."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/506443.506476"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441903"},{"key":"e_1_3_2_2_32_1","volume-title":"Retrieved","author":"Hecht B.","year":"2019","unstructured":"B. Hecht , L. Wilcox , J.P. Bigham , J. Sch\u00f6ning , E. Hoque , J. Ernst , Y. Bisk , L. De Russis , L. Yarosh , B. Anjum , D. Contractor , and C. Wu . 2018. It's Time to Do Something: Mitigating the Negative Impacts of Computing Through a Change to the Peer Review Process. (29 March 2018) . Retrieved January 16, 2019 from https:\/\/acm-fca.org\/2018\/03\/29\/negativeimpacts\/ B. Hecht, L. Wilcox, J.P. Bigham, J. Sch\u00f6ning, E. Hoque, J. Ernst, Y. Bisk, L. De Russis, L. Yarosh, B. Anjum, D. Contractor, and C. Wu. 2018. It's Time to Do Something: Mitigating the Negative Impacts of Computing Through a Change to the Peer Review Process. (29 March 2018). Retrieved January 16, 2019 from https:\/\/acm-fca.org\/2018\/03\/29\/negativeimpacts\/"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303030"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858171.1858226"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294211.1294242"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2957276.2957316"},{"key":"e_1_3_2_2_37_1","volume-title":"Personal information management. Annual review of information science and technology 41, 1","author":"Jones William","year":"2007","unstructured":"William Jones . 2007. Personal information management. Annual review of information science and technology 41, 1 ( 2007 ), 453--504. William Jones. 2007. Personal information management. Annual review of information science and technology 41, 1 (2007), 453--504."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2856481"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"crossref","unstructured":"Daniel Kahneman and Amos Tversky. 2013. Prospect theory: An analysis of decision under risk. In Handbook of the fundamentals of financial decision making: Part I. World Scientific 99--127.  Daniel Kahneman and Amos Tversky. 2013. Prospect theory: An analysis of decision under risk. In Handbook of the fundamentals of financial decision making: Part I. World Scientific 99--127.","DOI":"10.1142\/9789814417358_0006"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124814"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174117"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702213"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901812"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753409"},{"key":"e_1_3_2_2_46_1","volume-title":"Proc. of ICICS-PCM","volume":"3","author":"Li Jun","year":"2003","unstructured":"Jun Li , Joo Hwee Lim , and Qi Tian . 2003 . Automatic summarization for personal digital photos . In Proc. of ICICS-PCM , Vol. 3 . Citeseer. Jun Li, Joo Hwee Lim, and Qi Tian. 2003. Automatic summarization for personal digital photos. In Proc. of ICICS-PCM, Vol. 3. Citeseer."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488454"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173692"},{"key":"e_1_3_2_2_49_1","unstructured":"Caroline Lo Justin Cheng and Jure Leskovec. 2017. Understanding Online Collection Growth Over Time: A Case Study of Pinterest. In Proceedings of the 26th International Conference on World Wide Web Companion (WWW '17 Companion). International World Wide Web Conferences Steering Committee Republic and Canton of Geneva Switzerland 545--554.  Caroline Lo Justin Cheng and Jure Leskovec. 2017. Understanding Online Collection Growth Over Time: A Case Study of Pinterest. In Proceedings of the 26th International Conference on World Wide Web Companion (WWW '17 Companion). International World Wide Web Conferences Steering Committee Republic and Canton of Geneva Switzerland 545--554."},{"key":"e_1_3_2_2_50_1","volume-title":"Retrieved Janaury 16","author":"Madden Mary","year":"2015","unstructured":"Mary Madden and Lee Rainie . 2015 . Americans' Attitudes About Privacy, Security and Surveillance | Pew Research Center. (20 May 2015) . Retrieved Janaury 16 , 2019 from http:\/\/www.pewinternet.org\/2015\/05\/20\/ americans-attitudes-about-privacy-security-and-surveillance\/ Mary Madden and Lee Rainie. 2015. Americans' Attitudes About Privacy, Security and Surveillance | Pew Research Center. (20 May 2015). Retrieved Janaury 16, 2019 from http:\/\/www.pewinternet.org\/2015\/05\/20\/ americans-attitudes-about-privacy-security-and-surveillance\/"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753350"},{"key":"e_1_3_2_2_52_1","first-page":"2","article-title":"Rethinking personal digital archiving","volume":"14","author":"Marshall Catherine C","year":"2008","unstructured":"Catherine C Marshall . 2008 . Rethinking personal digital archiving , Part 1: Four challenges from the field. D-Lib Magazine 14 , 3\/4 (2008), 2 . Catherine C Marshall. 2008. Rethinking personal digital archiving, Part 1: Four challenges from the field. D-Lib Magazine 14, 3\/4 (2008), 2.","journal-title":"D-Lib Magazine"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557023"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466442"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998358"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3010079.3010082"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874025"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207723"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173678"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207789"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2317956.2318008"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979161"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2598577"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557178"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.008"},{"key":"e_1_3_2_2_66_1","volume-title":"Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS","author":"Ramokapane Kopo Marvin","year":"2017","unstructured":"Kopo Marvin Ramokapane , Awais Rashid , and Jose Such . 2017 . \" I feel stupid I can't delete...\": a study of users' cloud deletion practices and coping strategies . In Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association. Kopo Marvin Ramokapane, Awais Rashid, and Jose Such. 2017. \"I feel stupid I can't delete...\": a study of users' cloud deletion practices and coping strategies. In Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466241"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2926714"},{"key":"e_1_3_2_2_69_1","volume-title":"Proceedings of the International Conference on Information Systems, ICIS","author":"Sedera Darshana","year":"2018","unstructured":"Darshana Sedera and Sachithra Lokuge . 2018 . Is Digital Hoarding a Mental Disorder? Development of a Construct for Digital Hoarding for Future IS Research . In Proceedings of the International Conference on Information Systems, ICIS 2018, San Francisco. Darshana Sedera and Sachithra Lokuge. 2018. Is Digital Hoarding a Mental Disorder? Development of a Construct for Digital Hoarding for Future IS Research. In Proceedings of the International Conference on Information Systems, ICIS 2018, San Francisco."},{"key":"e_1_3_2_2_70_1","unstructured":"Margo I Seltzer and Nicholas Murphy. 2009. Hierarchical File Systems Are Dead. In HotOS.   Margo I Seltzer and Nicholas Murphy. 2009. Hierarchical File Systems Are Dead. In HotOS."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.03.031"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820017"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174161"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518959"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518744"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702380"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358922"},{"key":"e_1_3_2_2_78_1","first-page":"629","article-title":"The Function and Future of the Folder","volume":"29","author":"Whitham Roger","year":"2017","unstructured":"Roger Whitham and Leon Cruickshank . 2017 . The Function and Future of the Folder . Interacting with Computers 29 , 5 (2017), 629 -- 647 . Roger Whitham and Leon Cruickshank. 2017. The Function and Future of the Folder. Interacting with Computers 29, 5 (2017), 629--647.","journal-title":"Interacting with Computers"},{"key":"e_1_3_2_2_79_1","volume-title":"Personal information management: from information consumption to curation. Annual review of information science and technology 45, 1","author":"Whittaker Steve","year":"2011","unstructured":"Steve Whittaker . 2011. Personal information management: from information consumption to curation. Annual review of information science and technology 45, 1 ( 2011 ), 1--62. Steve Whittaker. 2011. Personal information management: from information consumption to curation. Annual review of information science and technology 45, 1 (2011), 1--62."},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-009-0218-7"},{"key":"e_1_3_2_2_81_1","first-page":"1","article-title":"Socio-Technical Lifelogging: Deriving Design Principles for a Future Proof Digital Past","volume":"27","author":"Whittaker Steve","year":"2012","unstructured":"Steve Whittaker , Vaiva Kalnikait e, Daniela Petrelli , Abigail Sellen , Nicolas Villar , Ofer Bergman , Paul Clough , and Jens Brockmeier . 2012 . Socio-Technical Lifelogging: Deriving Design Principles for a Future Proof Digital Past . Human-Computer Interaction 27 , 1 -- 2 (2012), 37--62. Steve Whittaker, Vaiva Kalnikait e, Daniela Petrelli, Abigail Sellen, Nicolas Villar, Ofer Bergman, Paul Clough, and Jens Brockmeier. 2012. Socio-Technical Lifelogging: Deriving Design Principles for a Future Proof Digital Past. Human-Computer Interaction 27, 1--2 (2012), 37--62.","journal-title":"Human-Computer Interaction"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/238386.238530"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134746"},{"key":"e_1_3_2_2_84_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14)","author":"Zhao Xuan","unstructured":"Xuan Zhao and Si\u00e2n E. Lindley . 2014. Curation Through Use: Understanding the Personal Value of Social Media . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14) . ACM, New York, NY, USA, 2431--2440. Xuan Zhao and Si\u00e2n E. Lindley. 2014. Curation Through Use: Understanding the Personal Value of Social Media. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 2431--2440."},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.91"},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240704"}],"event":{"name":"DIS '19: Designing Interactive Systems Conference 2019","location":"San Diego CA USA","acronym":"DIS '19","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2019 on Designing Interactive Systems Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3322276.3322300","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3322276.3322300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:55Z","timestamp":1750206355000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3322276.3322300"}},"subtitle":["Exploring a Design Space"],"short-title":[],"issued":{"date-parts":[[2019,6,18]]},"references-count":85,"alternative-id":["10.1145\/3322276.3322300","10.1145\/3322276"],"URL":"https:\/\/doi.org\/10.1145\/3322276.3322300","relation":{},"subject":[],"published":{"date-parts":[[2019,6,18]]},"assertion":[{"value":"2019-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}