{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T04:06:05Z","timestamp":1773288365293,"version":"3.50.1"},"reference-count":103,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW1","license":[{"start":{"date-parts":[[2021,4,13]],"date-time":"2021-04-13T00:00:00Z","timestamp":1618272000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1651969"],"award-info":[{"award-number":["IIS-1651969"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2021,4,13]]},"abstract":"<jats:p>Investigators in fields such as journalism and law enforcement have long sought the public's help with investigations. New technologies have also allowed amateur sleuths to lead their own crowdsourced investigations - that have traditionally only been the purview of expert investigators - with mixed results. Through an ethnographic study of a four-day, co-located event with over 250 attendees, we examine the human infrastructure responsible for enabling the success of an expert-led crowdsourced investigation. We find that the experts enabled attendees to generate useful leads; the attendees formed a community around the event; and the victims' families felt supported. Additionally, the co-located setting, legal structures, and emergent social norms impacted collaborative work practice. We also surface three important tensions to consider in future investigations and provide design recommendations to manage these tensions.<\/jats:p>","DOI":"10.1145\/3449192","type":"journal-article","created":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T17:47:59Z","timestamp":1619113679000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["CrowdSolve"],"prefix":"10.1145","volume":"5","author":[{"given":"Sukrit","family":"Venkatagiri","sequence":"first","affiliation":[{"name":"Virginia Tech, Arlington, VA, USA"}]},{"given":"Aakash","family":"Gautam","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Kurt","family":"Luther","sequence":"additional","affiliation":[{"name":"Virginia Tech, Arlington, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,22]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2007. Help Find Jim Gray With Web 2.0. https:\/\/techcrunch.com\/2007\/02\/03\/help-find-jim-gray-with-web-20\/"},{"key":"e_1_2_1_2_1","unstructured":"2015. The evolution of the wanted poster. https:\/\/www.sfgate.com\/news\/article\/The-evolution-of-the-wanted-poster-6110088.php"},{"key":"e_1_2_1_3_1","unstructured":"2019. Amnesty Decoders Strike Tracker. https:\/\/decoders.amnesty.org\/projects\/strike-tracker"},{"key":"e_1_2_1_4_1","unstructured":"2019. Stop Child Abuse ? Trace an Object. https:\/\/www.europol.europa.eu\/stopchildabuse"},{"key":"e_1_2_1_5_1","unstructured":"2020. Top 100 US Podcasts (Apple Podcasts Top Charts). https:\/\/www.podcastinsights.com\/top-us-podcasts\/"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v3i1.13235"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.29"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3059454.3059477"},{"key":"e_1_2_1_9_1","unstructured":"James Baysinger. [n. d.]. Hide and Seek. https:\/\/podcasts.apple.com\/us\/podcast\/hide-and-seek\/id1452121762"},{"key":"e_1_2_1_10_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology, Vol. 3, 2 (2006), 77--101."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2835202"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858178"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820023"},{"key":"e_1_2_1_14_1","volume-title":"Cybercrime Risks and Responses","author":"Chang Lennon YC","unstructured":"Lennon YC Chang and Andy KH Leung. 2015. An introduction to cyber crowdsourcing (human flesh search) in the Greater China region. In Cybercrime Risks and Responses. Springer, 240--252."},{"key":"e_1_2_1_15_1","volume-title":"Joseph Jay Williams, and Juho Kim","author":"Young Chung John Joon","year":"2018","unstructured":"John Joon Young Chung, Joseph Jay Williams, and Juho Kim. 2018. Collaborative Crowdsourcing Between Experts and Crowds for Chronological Ordering of Narrative Events. HCI (2018), 621--626."},{"key":"e_1_2_1_16_1","volume-title":"Is our growing obsession with true crime a problem? BBC","author":"Cooper Kelly-Leigh","year":"2019","unstructured":"Kelly-Leigh Cooper. 2019. Is our growing obsession with true crime a problem? BBC (2019). https:\/\/www.bbc.com\/news\/world-us-canada-47474996"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-014-9208-z"},{"key":"e_1_2_1_18_1","unstructured":"Victor Daniel. 2017. Amateur Sleuths Aim to Identify Charlottesville Marchers but Sometimes Misfire. https:\/\/www.nytimes.com\/2017\/08\/14\/us\/charlottesville-doxxing.html"},{"key":"e_1_2_1_19_1","volume-title":"The HPU. In Computer Vision and Pattern Recognition Workshops (CVPRW). 9--16","author":"Davis J.","unstructured":"J. Davis, J. Arderiu, H. Lin, Z. Nevins, S. Schuon, O. Gallo, and M.H. Yang. 2010. The HPU. In Computer Vision and Pattern Recognition Workshops (CVPRW). 9--16."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21796-8_11"},{"key":"e_1_2_1_21_1","volume-title":"Crowdsourcing may have solved a 20-year-old cold case. The Washington Post","author":"Dewey Caitlin","year":"2015","unstructured":"Caitlin Dewey. 2015. Crowdsourcing may have solved a 20-year-old cold case. The Washington Post (2015). http:\/\/www.washingtonpost.com\/lifestyle\/style\/how-theinternet- may-have-solved-a-20-year-old-cold-case\/2015\/03\/10\/02a4a326-acb1-11e4-9c91- e9d2f9fde644_story.html"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174213"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359256"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998342"},{"key":"e_1_2_1_26_1","first-page":"729","article-title":"Everything I need to know I learned from fandom: How existing social norms can help shape the next generation of user-generated content","volume":"10","author":"Fiesler Casey","year":"2007","unstructured":"Casey Fiesler. 2007. Everything I need to know I learned from fandom: How existing social norms can help shape the next generation of user-generated content. Vand. J. Ent. & Tech. L., Vol. 10 (2007), 729.","journal-title":"Vand. J. Ent. & Tech. L."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858409"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998210"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207711"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5325\/jasiapacipopcult.1.2.0239"},{"key":"e_1_2_1_31_1","volume-title":"Mobile crowdsensing: current state and future challenges","author":"Ganti Raghu K","year":"2011","unstructured":"Raghu K Ganti, Fan Ye, and Hui Lei. 2011. Mobile crowdsensing: current state and future challenges. IEEE communications Magazine, Vol. 49, 11 (2011), 32--39."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083--6101.2005.tb00277.x"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/950566.950595"},{"key":"e_1_2_1_34_1","volume-title":"Man who allegedly confessed to killing Nancy Moyer now says he doesn't recall confessing. The Olympian (Aug","author":"Gentzler Sara","year":"2019","unstructured":"Sara Gentzler. 2019. Man who allegedly confessed to killing Nancy Moyer now says he doesn't recall confessing. The Olympian (Aug. 2019). https:\/\/www.theolympian.com\/news\/local\/crime\/article234489522.html"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.11.014"},{"key":"e_1_2_1_36_1","volume-title":"Sharing qualitative research findings with participants: Study experiences of methodological and ethical dilemmas. Patient education and counseling","author":"Goldblatt Hadass","year":"2011","unstructured":"Hadass Goldblatt, Orit Karnieli-Miller, and Melanie Neumann. 2011. Sharing qualitative research findings with participants: Study experiences of methodological and ethical dilemmas. Patient education and counseling, Vol. 82, 3 (2011), 389--395."},{"key":"e_1_2_1_37_1","volume-title":"Pulling the plug visually: Images of resistance to ICTs and connectivity. First Monday","author":"Gomez Ricardo","year":"2015","unstructured":"Ricardo Gomez, Kirsten Foot, Meg Young, Rose Paquet-Kinsley, and Stacey Morrison. 2015. Pulling the plug visually: Images of resistance to ICTs and connectivity. First Monday (2015)."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675240"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820071"},{"key":"e_1_2_1_40_1","volume-title":"Hooked on Serial, the whodunnit that has become a cultural phenomenon. The Guardian","author":"Grant Linda","year":"2014","unstructured":"Linda Grant. 2014. Hooked on Serial, the whodunnit that has become a cultural phenomenon. The Guardian (2014). https:\/\/www.theguardian.com\/commentisfree\/2014\/nov\/14\/serial-hae-min-lee-adnan-syed-whodunnit-us-crime-drama"},{"key":"e_1_2_1_41_1","volume-title":"Gray and Siddharth Suri","author":"Mary","year":"2019","unstructured":"Mary L. Gray and Siddharth Suri. 2019. Ghost Work: How to Stop Silicon Valley from Building a New Global Underclass. Houghton Mifflin Harcourt, Boston."},{"key":"e_1_2_1_42_1","unstructured":"Peter W Greenwood and Joan Petersiua. 1975. The Criminal Investigation Process Volume I: Summary and Policy Implications. (1975)."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824062"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858364"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1965724.1965744"},{"key":"e_1_2_1_47_1","volume-title":"True Injustice: Cultures of Violence and Stories of Resistance in the New True Crime. IdeaFest: Interdisciplinary Journal of Creative Works and Research from","author":"Hernandez Marcos A","year":"2019","unstructured":"Marcos A Hernandez. 2019. True Injustice: Cultures of Violence and Stories of Resistance in the New True Crime. IdeaFest: Interdisciplinary Journal of Creative Works and Research from Humboldt State University, Vol. 3, 1 (2019), 13."},{"key":"e_1_2_1_48_1","unstructured":"Eliot Higgins. 2014. A Beginner's Guide to Geolocation. https:\/\/www.bellingcat.com\/resources\/how-tos\/2014\/07\/09\/a-beginners-guide-to-geolocation\/"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2600887"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/1748895812448086"},{"key":"e_1_2_1_51_1","unstructured":"Kristin Hunt. [n. d.]. 9 True-Crime Documentaries That Changed Their Cases' Verdicts. Thrillist ([n. d.]). https:\/\/www.thrillist.com\/entertainment\/nation\/true-crime-documentaries-serial-jinx-making-a-murder-changed-verdicts"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470742"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998238"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJEFM-09-2012-0030"},{"key":"e_1_2_1_55_1","first-page":"731","article-title":"When Fandom Ends and Harassment Begins","volume":"75","author":"Jones Daniel W","year":"2018","unstructured":"Daniel W Jones and Leeann M Lower. 2018. When Fandom Ends and Harassment Begins. Physical Educator, Vol. 75, 4 (2018), 731--736.","journal-title":"Physical Educator"},{"key":"e_1_2_1_56_1","unstructured":"Nicolas J LaLone Jess Kropczynski and Andrea H Tapia. 2018. The Symbiotic Relationship of Crisis Response Professionals and Enthusiasts as Demonstrated by Reddit's User-Interface Over Time.. In ISCRAM."},{"key":"e_1_2_1_57_1","volume-title":"First AAAI Conference on Human Computation and Crowdsourcing.","author":"Law Edith","year":"2013","unstructured":"Edith Law, Conner Dalton, Nick Merrill, Albert Young, and Krzysztof Z Gajos. 2013. Curio: a platform for supporting mixed-expertise crowdsourcing. In First AAAI Conference on Human Computation and Crowdsourcing."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998197"},{"key":"e_1_2_1_59_1","volume-title":"Police deny link to mysterious 'Umbrella Man,' who broke windows during riot. Atlanta Journal Constitution","author":"Lee ArLuther","year":"2019","unstructured":"ArLuther Lee. 2019. Police deny link to mysterious 'Umbrella Man,' who broke windows during riot. Atlanta Journal Constitution (2019). https:\/\/www.ajc.com\/news\/police-deny-link-mysterious-umbrella-man-who-broke-windows-during-riot\/3j8cSrRBHjvnvX0PRwIYIP\/"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180950"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1086\/468039"},{"key":"e_1_2_1_62_1","volume-title":"Code and Other Laws of Cyberspace","author":"Lessig Lawrence","unstructured":"Lawrence Lessig. 1999. Code and Other Laws of Cyberspace. Basic Books, Inc., USA."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208595"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","unstructured":"Tianyi Li Kurt Luther and Chris North. 2018. CrowdIA: Solving Mysteries with Crowdsourced Sensemaking. Vol. 2 (2018) 105:1--105:29. Issue CSCW. https:\/\/doi.org\/10.1145\/3274374","DOI":"10.1145\/3274374"},{"key":"e_1_2_1_65_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"3","author":"Li Tianyi","year":"2019","unstructured":"Tianyi Li, Chandler J Manns, Chris North, and Kurt Luther. 2019. Dropping the baton? Understanding errors and bottlenecks in a crowdsourced sensemaking pipeline. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (2019), 1--26."},{"key":"e_1_2_1_66_1","unstructured":"N.A. Lopez Coombs. 2016. Truth Isn't Stranger than Fanfiction: The Serial Podcast and Citizen Journalism. Master's thesis."},{"key":"e_1_2_1_67_1","volume-title":"George Fachner, and Charles Lieberman.","author":"Lum Cynthia","year":"2009","unstructured":"Cynthia Lum, Maria Maki Haberfeld, George Fachner, and Charles Lieberman. 2009. Police activities to counter terrorism: What we know and what we need to know. In To protect and to serve. Springer, 101--141."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518741"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441891"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441891"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2071423.2071450"},{"key":"e_1_2_1_72_1","volume-title":"Enough Boston Bombing Vigilantism. The Atlantic (April","author":"Madrigal Alexis C.","year":"2013","unstructured":"Alexis C. Madrigal. 2013. Hey Reddit, Enough Boston Bombing Vigilantism. The Atlantic (April 2013). http:\/\/www.theatlantic.com\/technology\/archive\/2013\/04\/hey-reddit-enough-boston-bombing-vigilantism\/275062\/"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2014.2346573"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.126"},{"key":"e_1_2_1_75_1","volume-title":"Melbourne DAC 2003 Streamingworlds Conference Proceedings. Citeseer.","author":"McGonigal Jane","year":"2003","unstructured":"Jane McGonigal. 2003. This is not a game: Immersive aesthetics and collective play. In Melbourne DAC 2003 Streamingworlds Conference Proceedings. Citeseer."},{"key":"e_1_2_1_76_1","unstructured":"Panagiotis Metaxas and Samantha T Finn. 2017. The infamous# Pizzagate conspiracy theory: Insight from a TwitterTrails investigation. (2017)."},{"key":"e_1_2_1_77_1","volume-title":"Sensemaking: A structure for an Intelligence Revolution. Government Printing Office.","author":"Moore David T","year":"2013","unstructured":"David T Moore. 2013. Sensemaking: A structure for an Intelligence Revolution. Government Printing Office."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718987"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531721"},{"key":"e_1_2_1_80_1","volume-title":"The Internet Is Actually Surprisingly Good at Fighting Crime. Mother Jones. Mother Jones","author":"Murphy Tim","year":"2013","unstructured":"Tim Murphy. 2013. The Internet Is Actually Surprisingly Good at Fighting Crime. Mother Jones. Mother Jones (2013). https:\/\/www.motherjones.com\/politics\/2013\/04\/reddit-internet-solving-fighting-crime\/"},{"key":"e_1_2_1_81_1","volume-title":"Digilantism: An analysis of crowdsourcing and the Boston marathon bombings. The British journal of criminology","author":"Nhan Johnny","year":"2017","unstructured":"Johnny Nhan, Laura Huey, and Ryan Broll. 2017. Digilantism: An analysis of crowdsourcing and the Boston marathon bombings. The British journal of criminology, Vol. 57, 2 (2017), 341--361."},{"key":"e_1_2_1_82_1","article-title":"A Concise History of Alternate Reality Games: From Transmedia Marketing Campaigns to College the Classroom","volume":"1","author":"O'Flynn Siobhan","year":"2017","unstructured":"Siobhan O'Flynn and David Seelow. 2017. A Concise History of Alternate Reality Games: From Transmedia Marketing Campaigns to College the Classroom. International Journal on Innovations in Online Education, Vol. 1, 4 (2017).","journal-title":"International Journal on Innovations in Online Education"},{"key":"e_1_2_1_83_1","unstructured":"Karolyn Park. 2014. The Objects of Our Affection: Objectification Sexualization and Commodification of the Korean Pop Culture Industry and Fandom. (2014)."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518974"},{"key":"e_1_2_1_85_1","volume-title":"Proceedings of international conference on intelligence analysis","volume":"5","author":"Pirolli Peter","year":"2005","unstructured":"Peter Pirolli and Stuart Card. 2005. The sensemaking process and leverage points for analyst technology as identified through cognitive task analysis. In Proceedings of international conference on intelligence analysis, Vol. 5. McLean, VA, USA, 2--4."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3170636"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.15039"},{"key":"e_1_2_1_88_1","volume-title":"Saturation in qualitative research: exploring its conceptualization and operationalization. Quality & quantity","author":"Saunders Benjamin","year":"2018","unstructured":"Benjamin Saunders, Julius Sim, Tom Kingstone, Shula Baker, Jackie Waterfield, Bernadette Bartlam, Heather Burroughs, and Clare Jinks. 2018. Saturation in qualitative research: exploring its conceptualization and operationalization. Quality & quantity, Vol. 52, 4 (2018), 1893--1907."},{"key":"e_1_2_1_89_1","volume-title":"The evolution of the wanted poster. SFGate","author":"Schiller Dane","year":"2015","unstructured":"Dane Schiller. 2015. The evolution of the wanted poster. SFGate (2015). https:\/\/www.sfgate.com\/news\/article\/The-evolution-of-the-wanted-poster-6110088.php"},{"key":"e_1_2_1_90_1","volume-title":"The unlikely role of true crime podcasts in criminal justice reform. Quartz","author":"Simpson Susan","year":"2017","unstructured":"Susan Simpson. 2017. The unlikely role of true crime podcasts in criminal justice reform. Quartz (2017). https:\/\/qz.com\/1101889\/the-unlikely-role-of-true-crime-podcasts-in-criminal-justice-reform\/"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359229"},{"key":"e_1_2_1_92_1","volume-title":"IConference 2014 Proceedings","author":"Starbird Kate","year":"2014","unstructured":"Kate Starbird, Jim Maddock, Mania Orand, Peg Achterman, and Robert M Mason. 2014. Rumors, false flags, and digital vigilantes: Misinformation on twitter after the 2013 boston marathon bombing. IConference 2014 Proceedings (2014)."},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145212"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.5555\/1466607.1466609"},{"key":"e_1_2_1_95_1","volume-title":"Amateur pro-Trump 'sleuths' scramble to unmask whistleblower: \"Your president has asked for your help'. The Washington Post","author":"Timberg Craig","year":"2019","unstructured":"Craig Timberg and Drew Harwell. 2019. Amateur pro-Trump 'sleuths' scramble to unmask whistleblower: \"Your president has asked for your help'. The Washington Post (2019). https:\/\/www.washingtonpost.com\/technology\/2019\/09\/28\/amateur-pro-trump-sleuths-scramble-unmask-whistleblower-your-president-has-asked-your-help\/"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702420"},{"key":"e_1_2_1_97_1","first-page":"75","article-title":"Police and user-led investigations on social media","volume":"23","author":"Trottier Daniel","year":"2014","unstructured":"Daniel Trottier. 2014. Police and user-led investigations on social media. JL Inf. & Sci., Vol. 23 (2014), 75.","journal-title":"JL Inf. & Sci."},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-016-0216-4"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359209"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.5555\/2042118.2042175"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378704.1378719"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820063"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1177\/1741659016674045"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776867"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979453"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3449192","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3449192","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3449192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:17Z","timestamp":1750191497000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3449192"}},"subtitle":["Managing Tensions in an Expert-Led Crowdsourced Investigation"],"short-title":[],"issued":{"date-parts":[[2021,4,13]]},"references-count":103,"journal-issue":{"issue":"CSCW1","published-print":{"date-parts":[[2021,4,13]]}},"alternative-id":["10.1145\/3449192"],"URL":"https:\/\/doi.org\/10.1145\/3449192","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,13]]},"assertion":[{"value":"2021-04-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}