{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:11:09Z","timestamp":1776111069855,"version":"3.50.1"},"reference-count":77,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1763297"],"award-info":[{"award-number":["1763297"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2022,11,7]]},"abstract":"<jats:p>This project illuminates what data youth believe online advertisers and social media companies collect about them. We situate these findings within the context of current advertising regulations and compare youth beliefs with what data social media companies report collecting based on their privacy policies. Through interviews with 21 youth ages 10-17 in the United States, we learn that participants are largely aware of how their interactions on the website or app are used to inform personalized content. However, certain types of information like geolocation or how long data is retained is less clear to them. We also learn about what school and family factors influence youth to adopt apps and websites. This work has implications for design and policy related to companies' personal data collection and targeted advertising, especially for youth.<\/jats:p>","DOI":"10.1145\/3555576","type":"journal-article","created":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T22:59:06Z","timestamp":1668207546000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Youths' Perceptions of Data Collection in Online Advertising and Social Media"],"prefix":"10.1145","volume":"6","author":[{"given":"Cami","family":"Goray","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Sarita","family":"Schoenebeck","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/jcpy.1191"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501612"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300233"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.2753\/JOA0091-3367400103"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23280"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23191"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449148"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478122"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3201064.3201089"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/00913367.2017.1339368"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/pra2.2017.14505401004"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15374424jccp2702_5"},{"key":"e_1_2_1_13_1","doi-asserted-by":"crossref","unstructured":"B Bradford Brown and James Larson. 2009. Peer relationships in adolescence. (2009).  B Bradford Brown and James Larson. 2009. Peer relationships in adolescence. (2009).","DOI":"10.1002\/9780470479193.adlpsy002004"},{"key":"e_1_2_1_14_1","volume-title":"Making sense of algorithmic profiling: user perceptions on Facebook. Information","author":"B\u00fcchi Moritz","year":"2021","unstructured":"Moritz B\u00fcchi , Eduard Fosch-Villaronga , Christoph Lutz , Aurelia Tam\u00f2-Larrieux , and Shruthi Velidi . 2021. Making sense of algorithmic profiling: user perceptions on Facebook. Information , Communication & Society ( 2021 ), 1--17. Moritz B\u00fcchi, Eduard Fosch-Villaronga, Christoph Lutz, Aurelia Tam\u00f2-Larrieux, and Shruthi Velidi. 2021. Making sense of algorithmic profiling: user perceptions on Facebook. Information, Communication & Society (2021), 1--17."},{"key":"e_1_2_1_15_1","volume-title":"The chilling effects of algorithmic profiling: Mapping the issues. Computer law & security review","author":"B\u00fcchi Moritz","year":"2020","unstructured":"Moritz B\u00fcchi , Eduard Fosch-Villaronga , Christoph Lutz , Aurelia Tam\u00f2-Larrieux , Shruthi Velidi , and Salome Viljoen . 2020. The chilling effects of algorithmic profiling: Mapping the issues. Computer law & security review , Vol. 36 ( 2020 ), 105367. Moritz B\u00fcchi, Eduard Fosch-Villaronga, Christoph Lutz, Aurelia Tam\u00f2-Larrieux, Shruthi Velidi, and Salome Viljoen. 2020. The chilling effects of algorithmic profiling: Mapping the issues. Computer law & security review , Vol. 36 (2020), 105367."},{"key":"e_1_2_1_16_1","volume-title":"Gender shades: intersectional phenotypic and demographic evaluation of face datasets and gender classifiers. Ph.,D. Dissertation","author":"Buolamwini Joy Adowaa","unstructured":"Joy Adowaa Buolamwini . 2017. Gender shades: intersectional phenotypic and demographic evaluation of face datasets and gender classifiers. Ph.,D. Dissertation . Massachusetts Institute of Technology . Joy Adowaa Buolamwini. 2017. Gender shades: intersectional phenotypic and demographic evaluation of face datasets and gender classifiers. Ph.,D. Dissertation. Massachusetts Institute of Technology."},{"key":"e_1_2_1_17_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Jos\u00e9 Gonz\u00e1lez","year":"2018","unstructured":"Jos\u00e9 Gonz\u00e1lez Caba nas, \u00c1ngel Cuevas , and Rub\u00e9n Cuevas . 2018 . Unveiling and quantifying facebook exploitation of sensitive personal data for advertising purposes . In 27th USENIX Security Symposium (USENIX Security 18) . 479--495. Jos\u00e9 Gonz\u00e1lez Caba nas, \u00c1ngel Cuevas, and Rub\u00e9n Cuevas. 2018. Unveiling and quantifying facebook exploitation of sensitive personal data for advertising purposes. In 27th USENIX Security Symposium (USENIX Security 18). 479--495."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951721996046"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/17405629.2017.1405578"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0007"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174067"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3046055.3046062"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174006"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0237875"},{"key":"e_1_2_1_25_1","volume-title":"30th $$USENIX$$ Security Symposium ($$USENIX$$ Security 21). 483--500.","author":"Farke Florian M","unstructured":"Florian M Farke , David G Balash , Maximilian Golla , Markus D\u00fcrmuth , and Adam J Aviv . 2021. Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity . In 30th $$USENIX$$ Security Symposium ($$USENIX$$ Security 21). 483--500. Florian M Farke, David G Balash, Maximilian Golla, Markus D\u00fcrmuth, and Adam J Aviv. 2021. Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google's My Activity. In 30th $$USENIX$$ Security Symposium ($$USENIX$$ Security 21). 483--500."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.01.009"},{"key":"e_1_2_1_27_1","volume-title":"Algorithmic mirrors: An examination of how personalized recommendations can shape self-perceptions and reinforce gender stereotypes","author":"French Megan Rebecca","unstructured":"Megan Rebecca French . 2018. Algorithmic mirrors: An examination of how personalized recommendations can shape self-perceptions and reinforce gender stereotypes . Stanford University . Megan Rebecca French. 2018. Algorithmic mirrors: An examination of how personalized recommendations can shape self-perceptions and reinforce gender stereotypes. Stanford University."},{"key":"e_1_2_1_28_1","volume-title":"Leaking privacy and shadow profiles in online social networks. Science advances","author":"Garcia David","year":"2017","unstructured":"David Garcia . 2017. Leaking privacy and shadow profiles in online social networks. Science advances , Vol. 3 , 8 ( 2017 ), e1701172. David Garcia. 2017. Leaking privacy and shadow profiles in online social networks. Science advances, Vol. 3, 8 (2017), e1701172."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.3138\/cjccj.52.5.527"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2578883"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382816"},{"key":"e_1_2_1_32_1","volume-title":"Facebook algorithms and personal data","author":"Hitlin Paul","year":"2019","unstructured":"Paul Hitlin and Lee Rainie . 2019. Facebook algorithms and personal data . Pew Research Center ( 2019 ). Paul Hitlin and Lee Rainie. 2019. Facebook algorithms and personal data. Pew Research Center (2019)."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445778"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/0263276417722391"},{"key":"e_1_2_1_35_1","volume-title":"Designing personalized user experiences in eCommerce","author":"Karat Clare-Marie","unstructured":"Clare-Marie Karat , Jan O Blom , and John Karat . 2004. Designing personalized user experiences in eCommerce . Vol. 5 . Springer Science & Business Media . Clare-Marie Karat, Jan O Blom, and John Karat. 2004. Designing personalized user experiences in eCommerce. Vol. 5. Springer Science & Business Media."},{"key":"e_1_2_1_36_1","volume-title":"convenience or irrelevance? Identifying conceptual barriers to safeguarding children's data privacy","author":"Keen Caroline","year":"2020","unstructured":"Caroline Keen . 2020. Apathy , convenience or irrelevance? Identifying conceptual barriers to safeguarding children's data privacy . New Media & Society ( 2020 ), 1461444820960068. Caroline Keen. 2020. Apathy, convenience or irrelevance? Identifying conceptual barriers to safeguarding children's data privacy. New Media & Society (2020), 1461444820960068."},{"key":"e_1_2_1_37_1","first-page":"65","article-title":"Prediction, preemption, presumption: How big data threatens big picture privacy","volume":"66","author":"Kerr Ian","year":"2013","unstructured":"Ian Kerr and Jessica Earle . 2013 . Prediction, preemption, presumption: How big data threatens big picture privacy . Stan. L. Rev. Online , Vol. 66 (2013), 65 . Ian Kerr and Jessica Earle. 2013. Prediction, preemption, presumption: How big data threatens big picture privacy. Stan. L. Rev. Online , Vol. 66 (2013), 65.","journal-title":"Stan. L. Rev. Online"},{"key":"e_1_2_1_38_1","volume-title":"The Common Sense census: Plugged-in parents of tweens and teens","author":"Lauricella ALEXIS R","year":"2016","unstructured":"ALEXIS R Lauricella , Drew P Cingel , Leanne Beaudoin-Ryan , Michael B Robb , M Saphir , and Ellen A Wartella . 2016. The Common Sense census: Plugged-in parents of tweens and teens . San Francisco, CA : Common Sense Media ( 2016 ). ALEXIS R Lauricella, Drew P Cingel, Leanne Beaudoin-Ryan, Michael B Robb, M Saphir, and Ellen A Wartella. 2016. The Common Sense census: Plugged-in parents of tweens and teens. San Francisco, CA: Common Sense Media (2016)."},{"key":"e_1_2_1_39_1","volume-title":"The unseen teen: The challenges of building healthy tech for young people","author":"Lenhart A","year":"2021","unstructured":"A Lenhart and K Owens . 2021. The unseen teen: The challenges of building healthy tech for young people . Data & Society ( 2021 ). A Lenhart and K Owens. 2021. The unseen teen: The challenges of building healthy tech for young people. Data & Society (2021)."},{"key":"e_1_2_1_40_1","volume-title":"Symposium on usable privacy and security (SOUPS). 22--24","author":"Leon Pedro Giovanni","year":"2015","unstructured":"Pedro Giovanni Leon , Ashwini Rao , Florian Schaub , Abigail Marsh , Lorrie Faith Cranor , and Norman Sadeh . 2015 . Privacy and behavioral advertising: Towards meeting users' preferences . In Symposium on usable privacy and security (SOUPS). 22--24 . Pedro Giovanni Leon, Ashwini Rao, Florian Schaub, Abigail Marsh, Lorrie Faith Cranor, and Norman Sadeh. 2015. Privacy and behavioral advertising: Towards meeting users' preferences. In Symposium on usable privacy and security (SOUPS). 22--24."},{"key":"e_1_2_1_41_1","first-page":"777","article-title":"Online Privacy and the Invisible Market for Our Data","volume":"120","author":"Lipman Rebecca","year":"2015","unstructured":"Rebecca Lipman . 2015 . Online Privacy and the Invisible Market for Our Data . Penn St. L. Rev. , Vol. 120 (2015), 777 . Rebecca Lipman. 2015. Online Privacy and the Invisible Market for Our Data. Penn St. L. Rev. , Vol. 120 (2015), 777.","journal-title":"Penn St. L. Rev."},{"key":"e_1_2_1_42_1","unstructured":"Sonia Livingstone Mariya Stoilova and Rishita Nandagiri. 2019. Children's data and privacy online: growing up in a digital age: an evidence review. (2019).  Sonia Livingstone Mariya Stoilova and Rishita Nandagiri. 2019. Children's data and privacy online: growing up in a digital age: an evidence review. (2019)."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445467"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449180"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/13600834.2017.1321096"},{"key":"e_1_2_1_46_1","volume-title":"Networked privacy: How teenagers negotiate context in social media. New media & society","author":"Marwick Alice E","year":"2014","unstructured":"Alice E Marwick and Danah Boyd . 2014. Networked privacy: How teenagers negotiate context in social media. New media & society , Vol. 16 , 7 ( 2014 ), 1051--1067. Alice E Marwick and Danah Boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New media & society, Vol. 16, 7 (2014), 1051--1067."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858051"},{"key":"e_1_2_1_48_1","volume-title":"Personality development: Continuity and change over the life course. Annual review of psychology","author":"McAdams Dan P","year":"2010","unstructured":"Dan P McAdams and Bradley D Olson . 2010. Personality development: Continuity and change over the life course. Annual review of psychology , Vol. 61 ( 2010 ), 517--542. Dan P McAdams and Bradley D Olson. 2010. Personality development: Continuity and change over the life course. Annual review of psychology , Vol. 61 (2010), 517--542."},{"key":"e_1_2_1_49_1","unstructured":"Aleecia McDonald and Lorrie Faith Cranor. 2010. Beliefs and behaviors: Internet users' understanding of behavioral advertising. Tprc.  Aleecia McDonald and Lorrie Faith Cranor. 2010. Beliefs and behaviors: Internet users' understanding of behavioral advertising. Tprc."},{"key":"e_1_2_1_50_1","first-page":"514","article-title":"Psychographics, Predictive Analytics, Artificial Intelligence, & Bots: Is The FTC Keeping Pace? Geo","volume":"2","author":"McSweeny Terrell","year":"2018","unstructured":"Terrell McSweeny . 2018 . Psychographics, Predictive Analytics, Artificial Intelligence, & Bots: Is The FTC Keeping Pace? Geo . L. Tech. Rev. , Vol. 2 (2018), 514 -- 514 . Terrell McSweeny. 2018. Psychographics, Predictive Analytics, Artificial Intelligence, & Bots: Is The FTC Keeping Pace? Geo. L. Tech. Rev. , Vol. 2 (2018), 514--514.","journal-title":"L. Tech. Rev."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322286"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2021.106170"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1162\/DAED_a_00113"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376632"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305118787808"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.2005.24.2.202"},{"key":"e_1_2_1_57_1","volume-title":"Sixteenth Symposium on Usable Privacy and Security ($$SOUPS$$","author":"Rader Emilee","year":"2020","unstructured":"Emilee Rader , Samantha Hautea , and Anjali Munasinghe . 2020 . \" I Have a Narrow Thought Process\": Constraints on Explanations Connecting Inferences and Self-Perceptions . In Sixteenth Symposium on Usable Privacy and Security ($$SOUPS$$ 2020). 457--488. Emilee Rader, Samantha Hautea, and Anjali Munasinghe. 2020. \" I Have a Narrow Thought Process\": Constraints on Explanations Connecting Inferences and Self-Perceptions. In Sixteenth Symposium on Usable Privacy and Security ($$SOUPS$$ 2020). 457--488."},{"key":"e_1_2_1_58_1","volume-title":"Nusheen Ameenuddin, Dipesh Navsaria, et al.","author":"Radesky Jenny","year":"2020","unstructured":"Jenny Radesky , Yolanda Linda Reid Chassiakos , Nusheen Ameenuddin, Dipesh Navsaria, et al. 2020 . Digital advertising to children. Pediatrics , Vol. 146 , 1 (2020). Jenny Radesky, Yolanda Linda Reid Chassiakos, Nusheen Ameenuddin, Dipesh Navsaria, et al. 2020. Digital advertising to children. Pediatrics, Vol. 146, 1 (2020)."},{"key":"e_1_2_1_59_1","volume-title":"What do they know about me? Contents and concerns of online behavioral profiles. arXiv preprint arXiv:1506.01675","author":"Rao Ashwini","year":"2015","unstructured":"Ashwini Rao , Florian Schaub , and Norman Sadeh . 2015. What do they know about me? Contents and concerns of online behavioral profiles. arXiv preprint arXiv:1506.01675 ( 2015 ). Ashwini Rao, Florian Schaub, and Norman Sadeh. 2015. What do they know about me? Contents and concerns of online behavioral profiles. arXiv preprint arXiv:1506.01675 (2015)."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0021"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/17530350.2019.1574866"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1177\/1359183518820366"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479603"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2019.1657164"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1093\/jcr\/ucw012"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445333"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3217804.3217911"},{"key":"e_1_2_1_70_1","first-page":"367","article-title":"Affinity Profiling and Discrimination by Association in Online Behavioral Advertising","volume":"35","author":"Wachter Sandra","year":"2020","unstructured":"Sandra Wachter . 2020 . Affinity Profiling and Discrimination by Association in Online Behavioral Advertising . Berkeley Tech. LJ , Vol. 35 (2020), 367 . Sandra Wachter. 2020. Affinity Profiling and Discrimination by Association in Online Behavioral Advertising. Berkeley Tech. LJ , Vol. 35 (2020), 367.","journal-title":"Berkeley Tech. LJ"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819941"},{"key":"e_1_2_1_72_1","volume-title":"User Perceptions, and Ad Explanations Through Users' Own Twitter Data. In 29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20). 145--162.","author":"Wei Miranda","unstructured":"Miranda Wei , Madison Stamos , Sophie Veys , Nathan Reitinger , Justin Goodman , Margot Herman , Dorota Filipczuk , Ben Weinshel , Michelle L Mazurek , and Blase Ur. 2020. What Twitter Knows: Characterizing Ad Targeting Practices , User Perceptions, and Ad Explanations Through Users' Own Twitter Data. In 29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20). 145--162. Miranda Wei, Madison Stamos, Sophie Veys, Nathan Reitinger, Justin Goodman, Margot Herman, Dorota Filipczuk, Ben Weinshel, Michelle L Mazurek, and Blase Ur. 2020. What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users' Own Twitter Data. In 29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20). 145--162."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2021.093"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174230"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445299"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998316"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300303"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555576","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3555576","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3555576","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:03Z","timestamp":1750182543000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3555576"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":77,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2022,11,7]]}},"alternative-id":["10.1145\/3555576"],"URL":"https:\/\/doi.org\/10.1145\/3555576","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}