{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T22:24:24Z","timestamp":1776119064545,"version":"3.50.1"},"reference-count":139,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T00:00:00Z","timestamp":1736467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,1,10]]},"abstract":"<jats:p>In our contemporary moment, there exists a hegemonic design practice and a general social desire to retain information. With the help of sociotechnical platforms and other contemporary technologies, information has changed its temporal and spatial boundaries, creating unbounded, algorithmic, and emergent forms of retention. The consequences of such retention are numerous, ranging from an overabundance of autobiographical information that cannot be fully understood by the individual to the improper use and economization of such information by state and corporation alike. Within this context, this paper investigates a counter-hegemonic practice of forgetting, specifically from the perspective of human-computer interaction and computer-supported cooperative work research, with additional insight drawn from adjacent fields. In doing so, we present forgetting as a significant area of research with HCI and CSCW, a burgeoning and contradictory space that may offer solutions to issues we face within a moment of persistence by default. This paper also explores potential directions for future research and design on forgetting in HCI and CSCW through an investigation of an art piece by Chinese artist Song Dong.<\/jats:p>","DOI":"10.1145\/3701211","type":"journal-article","created":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T16:06:46Z","timestamp":1736525206000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Time's Sublimest Target: Practices of Forgetting in HCI and CSCW"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-9011-1609","authenticated-orcid":false,"given":"Sam Addison","family":"Ankenbauer","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3790-5834","authenticated-orcid":false,"given":"Robin N.","family":"Brewer","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,1,10]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"A continuity theory of normal aging. The gerontologist 29, 2","author":"Atchley Robert C","year":"1989","unstructured":"Robert C Atchley. 1989. A continuity theory of normal aging. The gerontologist 29, 2 (1989), 183--190."},{"key":"e_1_2_1_2_1","volume-title":"Marjolijn De Jager, and James Edward Young","author":"Aug\u00e9 Marc","year":"2004","unstructured":"Marc Aug\u00e9, Marjolijn De Jager, and James Edward Young. 2004. Oblivion. (No Title) (2004)."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359320"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/15710880600608230"},{"key":"e_1_2_1_5_1","volume-title":"Working models of working memory. Current opinion in neurobiology 25","author":"Barak Omri","year":"2014","unstructured":"Omri Barak and Misha Tsodyks. 2014. Working models of working memory. Current opinion in neurobiology 25 (2014), 20--24."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030198"},{"key":"e_1_2_1_7_1","volume-title":"Pervasive Intelligibility Workshop","volume":"3","author":"Barua Debjanee","year":"2011","unstructured":"Debjanee Barua, Judy Kay, and Bob Kummerfeld. 2011. Personis-LF: user modelling framework with user controlled forgetting for pervasive lifelong personalisation. In Pervasive Intelligibility Workshop, Vol. 3."},{"key":"e_1_2_1_8_1","volume-title":"Sharing the small moments: ephemeral social interaction on Snapchat. Information, communication & society 19, 7","author":"Bayer Joseph B","year":"2016","unstructured":"Joseph B Bayer, Nicole B Ellison, Sarita Y Schoenebeck, and Emily B Falk. 2016. Sharing the small moments: ephemeral social interaction on Snapchat. Information, communication & society 19, 7 (2016), 956--977."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2012.705200"},{"key":"e_1_2_1_10_1","unstructured":"Ruha Benjamin. 2020. Race after technology: Abolitionist tools for the new Jim code."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10283"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535813.2535814"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240252818216"},{"key":"e_1_2_1_14_1","unstructured":"Jorge Luis Borges. 1986. Ficciones; El aleph; El informe de brodie. Vol. 118. Fundaci\u00f3n Biblioteca Ayacuch."},{"key":"e_1_2_1_15_1","volume-title":"Google CEO Eric Schmidt advises you to change your name to escape online shame. Huffington Post","author":"Bosker Bianca","year":"2010","unstructured":"Bianca Bosker. 2010. Google CEO Eric Schmidt advises you to change your name to escape online shame. Huffington Post (2010)."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05284-2_4"},{"key":"e_1_2_1_17_1","first-page":"n1","article-title":"Information behaviour that keeps found things found","volume":"10","author":"Bruce Harry","year":"2004","unstructured":"Harry Bruce, William Jones, and Susan Dumais. 2004. Information behaviour that keeps found things found. Information Research: An International Electronic Journal 10, 1 (2004), n1.","journal-title":"Information Research: An International Electronic Journal"},{"key":"e_1_2_1_18_1","unstructured":"Vannevar Bush et al. 1945. As we may think. The atlantic monthly 176 1 (1945) 101--108."},{"key":"e_1_2_1_19_1","first-page":"36","article-title":"Postmortem life on-line","volume":"25","author":"Cahn Naomi","year":"2011","unstructured":"Naomi Cahn. 2011. Postmortem life on-line. Prob. & Prop. 25 (2011), 36.","journal-title":"Prob. & Prop."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998266"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of ascilite Dunedin 2014","author":"Charteris Jennifer","year":"2014","unstructured":"Jennifer Charteris, Sue Gregory, and Yvonne Masters. 2014. Snapchat'selfies': The case of disappearing data. Rhetoric and Reality: Critical perspectives on educational technology. Proceedings of ascilite Dunedin 2014 (2014)."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274305"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1520340.1520342"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462204.3481778"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444817744784"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1086\/595632"},{"key":"e_1_2_1_27_1","volume-title":"II.","author":"Cicero Marcus Tullius","unstructured":"Marcus Tullius Cicero. 1979. De oratore\/1 Books I, II. Vol. 348. Harvard Univ. Press."},{"key":"e_1_2_1_28_1","volume-title":"The extended mind. analysis 58, 1","author":"Clark Andy","year":"1998","unstructured":"Andy Clark and David Chalmers. 1998. The extended mind. analysis 58, 1 (1998), 7--19."},{"key":"e_1_2_1_29_1","volume-title":"Why we need things. History from things: Essays on material culture","author":"Csikszentmihalyi Mihaly","year":"1993","unstructured":"Mihaly Csikszentmihalyi. 1993. Why we need things. History from things: Essays on material culture (1993), 20--29."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1107458.1107489"},{"key":"e_1_2_1_31_1","volume-title":"Snap shares plunge 25 percent as Apple privacy changes hit ads business","author":"Dang Sheila","year":"2021","unstructured":"Sheila Dang. 2021. Snap shares plunge 25 percent as Apple privacy changes hit ads business. Reuters (2021). https: \/\/www.reuters.com\/technology\/snap-revenue-falls-short-apple-privacy-changes-hurt-ads-business-2021--10--21\/"},{"key":"e_1_2_1_32_1","volume-title":"Theorizing affordances: From request to refuse. Bulletin of science, technology & society 36, 4","author":"Davis Jenny L","year":"2016","unstructured":"Jenny L Davis and James B Chouinard. 2016. Theorizing affordances: From request to refuse. Bulletin of science, technology & society 36, 4 (2016), 241--248."},{"key":"e_1_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Sergio Della Sala. 2010. Forgetting. Psychology Press.","DOI":"10.4324\/9780203851647"},{"key":"e_1_2_1_34_1","volume-title":"Outlines of a world coming into existence': pervasive computing and the ethics of forgetting. Environment and planning B: planning and design 34, 3","author":"Dodge Martin","year":"2007","unstructured":"Martin Dodge and Rob Kitchin. 2007. 'Outlines of a world coming into existence': pervasive computing and the ethics of forgetting. Environment and planning B: planning and design 34, 3 (2007), 431--445."},{"key":"e_1_2_1_35_1","volume-title":"Can Facebook be Your Friend? Real Simple Magazine","author":"Dominus Susan","year":"2009","unstructured":"Susan Dominus. 2009. Can Facebook be Your Friend? Real Simple Magazine (2009). https:\/\/realsimple.com\/work-life\/technology\/communication-etiquette\/facebook-friend"},{"key":"e_1_2_1_36_1","volume-title":"Cracking the Agrippa code: Cryptography for the digital humanities. Scholarly and Research Communication 4, 3","author":"DuPont Quinn","year":"2013","unstructured":"Quinn DuPont. 2013. Cracking the Agrippa code: Cryptography for the digital humanities. Scholarly and Research Communication 4, 3 (2013)."},{"key":"e_1_2_1_37_1","volume-title":"How Facebook decides which memories to show you in one of its most \"sensitive\" features. Business Insider","author":"D'Onfro Jillian","year":"2016","unstructured":"Jillian D'Onfro. 2016. How Facebook decides which memories to show you in one of its most \"sensitive\" features. Business Insider (2016)."},{"key":"e_1_2_1_38_1","volume-title":"An ars oblivionalis? Forget it! pmla 103, 3","author":"Eco Umberto","year":"1988","unstructured":"Umberto Eco. 1988. An ars oblivionalis? Forget it! pmla 103, 3 (1988), 254--261."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2021.08.005"},{"key":"e_1_2_1_40_1","volume-title":"Archive fever: photography between history and the monument. Archive Fever: Uses of the document in contemporary art 1","author":"Enwezor Okwui","year":"2008","unstructured":"Okwui Enwezor. 2008. Archive fever: photography between history and the monument. Archive Fever: Uses of the document in contemporary art 1 (2008), 11--51."},{"key":"e_1_2_1_41_1","volume-title":"Your Snapchats aren't safe: How to secretly save videos from Snapchat or Facebook's 'Poke'. BGR","author":"Epstein Zach","year":"2013","unstructured":"Zach Epstein. 2013. Your Snapchats aren't safe: How to secretly save videos from Snapchat or Facebook's 'Poke'. BGR (2013). https:\/\/news.yahoo.com\/snapchats-aren-t-safe-secretly-save-videos-snapchat-160042248.html"},{"key":"e_1_2_1_42_1","volume-title":"Protecting Privacy Protection in Surveillance Societies: The Federal Republic of Germany","author":"Flaherty David H","unstructured":"David H Flaherty. 1989. Protecting Privacy Protection in Surveillance Societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1515\/pdtc-2018-0011"},{"key":"e_1_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Sophie Fuggle. 2013. 12. Stiegler and Foucault: The Politics of Care and Self-Writing. (2013).","DOI":"10.1515\/9780748677030-015"},{"key":"e_1_2_1_45_1","volume-title":"The panoptic sort: A political economy of personal information","author":"Gandy Oscar H","unstructured":"Oscar H Gandy. 2021. The panoptic sort: A political economy of personal information. Oxford University Press."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/15295039309366849"},{"key":"e_1_2_1_47_1","volume-title":"Vanish: Increasing Data Privacy with Self-Destructing Data.. In USENIX security symposium","author":"Geambasu Roxana","year":"2009","unstructured":"Roxana Geambasu, Tadayoshi Kohno, Amit A Levy, and Henry M Levy. 2009. Vanish: Increasing Data Privacy with Self-Destructing Data.. In USENIX security symposium, Vol. 316. 10--5555."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2602964"},{"key":"e_1_2_1_49_1","first-page":"464","article-title":"Home Video Editing Made Easy-Balancing Automation and User Control","volume":"1","author":"Girgensohn Andreas","year":"2001","unstructured":"Andreas Girgensohn, Sara A Bly, Frank Shipman, John S Boreczky, and Lynn Wilcox. 2001. Home Video Editing Made Easy-Balancing Automation and User Control.. In INTERACT, Vol. 1. 464--471.","journal-title":"INTERACT"},{"key":"e_1_2_1_50_1","volume-title":"Freeze-dried stigma: Cybernetics and social control. Humanity & society 6, 4","author":"Goodwin Glenn A","year":"1982","unstructured":"Glenn A Goodwin and Laud Humphreys. 1982. Freeze-dried stigma: Cybernetics and social control. Humanity & society 6, 4 (1982), 391--408."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702238"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466240"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702297"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1734454.1734488"},{"key":"e_1_2_1_55_1","volume-title":"The scent of time: A philosophical essay on the art of lingering","author":"Han Byung-Chul","unstructured":"Byung-Chul Han. 2017. The scent of time: A philosophical essay on the art of lingering. John Wiley & Sons."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441903"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449116"},{"key":"e_1_2_1_58_1","volume-title":"Virtual bodies and flickering signifiers. October 66","author":"Hayles N Katherine","year":"1993","unstructured":"N Katherine Hayles. 1993. Virtual bodies and flickering signifiers. October 66 (1993), 69--91."},{"key":"e_1_2_1_59_1","volume-title":"How we think: Digital media and contemporary technogenesis","author":"Hayles N Katherine","unstructured":"N Katherine Hayles. 2012. How we think: Digital media and contemporary technogenesis. University of Chicago Press."},{"key":"e_1_2_1_60_1","unstructured":"Helene Hellmich and Jesse David Dinneen. 2022. Making space for the future: the importance of deletion for librarianship and information science and the information society. (2022)."},{"key":"e_1_2_1_61_1","volume-title":"Myspace loses all content uploaded before","author":"Hern Alex","year":"2016","unstructured":"Alex Hern. 2019. Myspace loses all content uploaded before 2016. The Guardian 18 (2019)."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376595"},{"key":"e_1_2_1_63_1","volume-title":"11 rethinking repair. Media technologies: Essays on communication, materiality, and society","author":"Jackson Steven J","year":"2014","unstructured":"Steven J Jackson. 2014. 11 rethinking repair. Media technologies: Essays on communication, materiality, and society (2014), 221--39."},{"key":"e_1_2_1_64_1","volume-title":"Personal information management","author":"Jaime Teevan Jones","unstructured":"Jones and Jaime Teevan. 2007. Personal information management. University of Washington Press."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2957276.2957316"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432920"},{"key":"e_1_2_1_67_1","volume-title":"Jamil Abou Saleh, and Mo Nours Arab","author":"Karray Fakhreddine","year":"2008","unstructured":"Fakhreddine Karray, Milad Alemzadeh, Jamil Abou Saleh, and Mo Nours Arab. 2008. Human-computer interaction: Overview on state of the art. International journal on smart sensing and intelligent systems 1, 1 (2008), 137--159."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509916.2509920"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718968"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806923.1806924"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934667"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243920925147"},{"key":"e_1_2_1_73_1","volume-title":"Proceedings of ECAI 2000 Workshop on Current Issues in Spatio-Temporal . . . .","author":"Koychev Ivan","year":"2000","unstructured":"Ivan Koychev. 2000. Gradual forgetting for adaptation to concept drift. Proceedings of ECAI 2000 Workshop on Current Issues in Spatio-Temporal . . . ."},{"key":"e_1_2_1_74_1","doi-asserted-by":"crossref","DOI":"10.1109\/ICICS.2003.1292724","volume-title":"Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint","volume":"3","author":"Li Jun","year":"2003","unstructured":"Jun Li, Joo Hwee Lim, and Qi Tian. 2003. Automatic summarization for personal digital photos. In Fourth International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on Multimedia. Proceedings of the 2003 Joint, Vol. 3. IEEE, 1536--1540."},{"key":"e_1_2_1_75_1","volume-title":"Unfinished Farewell. In CHI Conference on Human Factors in Computing Systems Extended Abstracts. 1--3.","author":"Li Jiabao","year":"2022","unstructured":"Jiabao Li, Laobai Wu, Wenying Wu, Lu Wang, and Min Zhu. 2022. Unfinished Farewell. In CHI Conference on Human Factors in Computing Systems Extended Abstracts. 1--3."},{"key":"e_1_2_1_76_1","unstructured":"Nancy P Lin. [n. d.]. Song Dong's Multimedia Works with Water Photography and Video. ([n. d.])."},{"key":"e_1_2_1_77_1","volume-title":"Das Hugo Loetscher Lesebuch","author":"Loetscher Hugo","unstructured":"Hugo Loetscher. 1984. Das Hugo Loetscher Lesebuch. Vol. 21207. Diogenes."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11133-020-09458-9"},{"key":"e_1_2_1_79_1","first-page":"2","article-title":"Teens, social media, and privacy","volume":"21","author":"Madden Mary","year":"2013","unstructured":"Mary Madden, Amanda Lenhart, Sandra Cortesi, Urs Gasser, Maeve Duggan, Aaron Smith, and Meredith Beaton. 2013. Teens, social media, and privacy. Pew Research Center 21, 1055 (2013), 2--86.","journal-title":"Pew Research Center"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054989"},{"key":"e_1_2_1_81_1","volume-title":"The iron fist and the velvet glove: totalitarian potentials within democratic structures. The social fabric: Dimensions and issues","author":"Marx Gary T","year":"1986","unstructured":"Gary T Marx. 1986. The iron fist and the velvet glove: totalitarian potentials within democratic structures. The social fabric: Dimensions and issues (1986), 135--162."},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1515\/9781400838455"},{"key":"e_1_2_1_83_1","unstructured":"Gustav Metzger. 1960. Auto-destructive art manifesto."},{"key":"e_1_2_1_84_1","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS","author":"Mondal Mainack","year":"2016","unstructured":"Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P Gummadi, and Aniket Kate. 2016. Forgetting in social media: Understanding and controlling longitudinal exposure of socially shared data. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). 287--299."},{"key":"e_1_2_1_85_1","doi-asserted-by":"crossref","unstructured":"Steven Gonzalez Monserrate. 2022. The cloud is material: On the environmental impacts of computation and data storage. (2022).","DOI":"10.21428\/2c646de5.031d4553"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517644"},{"key":"e_1_2_1_87_1","volume-title":"Sick building syndrome and the problem of uncertainty: Environmental politics, technoscience, and women workers","author":"Murphy Michelle","unstructured":"Michelle Murphy. 2006. Sick building syndrome and the problem of uncertainty: Environmental politics, technoscience, and women workers. Duke University Press."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300264"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979161"},{"key":"e_1_2_1_90_1","volume-title":"Snapchat announces 750M monthly active users. TechCrunch","author":"Perez Sarah","year":"2023","unstructured":"Sarah Perez. 2023. Snapchat announces 750M monthly active users. TechCrunch (2023). https:\/\/techcrunch.com\/ 2023\/02\/16\/snapchat-announces-750-million-monthly-active-users\/"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2017.7906896"},{"key":"e_1_2_1_92_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 3, CSCW","author":"Pinter Anthony T","year":"2019","unstructured":"Anthony T Pinter, Jialun Aaron Jiang, Katie Z Gach, Melanie M Sidwell, James E Dykes, and Jed R Brubaker. 2019. \" Am I Never Going to Be Free of All This Crap?\" Upsetting Encounters with Algorithmically Curated Content About Ex-Partners. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 1--23."},{"key":"e_1_2_1_93_1","first-page":"1","article-title":"Snapchat and sexting: A snapshot of baring your bare essentials","volume":"19","author":"Poltash Nicole A","year":"2012","unstructured":"Nicole A Poltash. 2012. Snapchat and sexting: A snapshot of baring your bare essentials. Rich. JL & Tech. 19 (2012), 1.","journal-title":"Rich. JL & Tech."},{"key":"e_1_2_1_94_1","volume-title":"A networked self and birth, life, death","author":"Prey Robert","unstructured":"Robert Prey and Rik Smit. 2018. From personal to personalized memory: Social media as mnemotechnology. In A networked self and birth, life, death. Routledge, 209--223."},{"key":"e_1_2_1_95_1","volume-title":"Remembrance of Things Past","author":"Proust Marcel","unstructured":"Marcel Proust. 1931. Remembrance of Things Past. Vol. 2. Wordsworth Editions."},{"key":"e_1_2_1_96_1","volume-title":"Why students should be more careful with 'confidential' apps. USA Today","author":"Psencik Katey","year":"2013","unstructured":"Katey Psencik. 2013. Why students should be more careful with 'confidential' apps. USA Today (2013). https: \/\/www.usatoday.com\/story\/tech\/personal\/2013\/07\/10\/students-security-snapchat-whisper\/2506539\/"},{"key":"e_1_2_1_97_1","volume-title":"history, forgetting","author":"Ricoeur Paul","unstructured":"Paul Ricoeur. 2004. Memory, history, forgetting. University of Chicago Press."},{"key":"e_1_2_1_98_1","volume-title":"Cognitive offloading. Trends in cognitive sciences 20, 9","author":"Risko Evan F","year":"2016","unstructured":"Evan F Risko and Sam J Gilbert. 2016. Cognitive offloading. Trends in cognitive sciences 20, 9 (2016), 676--688."},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_5"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466218"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466241"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/2926714"},{"key":"e_1_2_1_103_1","unstructured":"Daniel L Schacter. 2002. The seven sins of memory: How the mind forgets and remembers. HMH."},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/1735223.1735243"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500468.2500474"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173753"},{"key":"e_1_2_1_107_1","volume-title":"On photography","author":"Sontag Susan","unstructured":"Susan Sontag. 2001. On photography. Vol. 48. Macmillan."},{"key":"e_1_2_1_108_1","volume-title":"Killer Apps: Vanishing Messages, Encrypted Communications, and Challenges to Freedom of Information Laws When Public Officials Go Dark. Case W. Res. JL Tech. & Internet 10","author":"Stewart Daxton R","year":"2019","unstructured":"Daxton R Stewart. 2019. Killer Apps: Vanishing Messages, Encrypted Communications, and Challenges to Freedom of Information Laws When Public Officials Go Dark. Case W. Res. JL Tech. & Internet 10 (2019), i."},{"key":"e_1_2_1_109_1","volume-title":"For a new critique of political economy","author":"Stiegler Bernard","unstructured":"Bernard Stiegler. 2010. For a new critique of political economy. Polity."},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0030739"},{"key":"e_1_2_1_111_1","volume-title":"Images, Ethics, Technology","author":"Sturken Marita","unstructured":"Marita Sturken. 2015. Facebook photography and the demise of Kodak and Polaroid. In Images, Ethics, Technology. Routledge, 94--110."},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145320"},{"key":"e_1_2_1_113_1","volume-title":"Porous memory and the cognitive life of things. Prefiguring cyberculture: An intellectual history","author":"Sutton John","year":"2002","unstructured":"John Sutton. 2002. Porous memory and the cognitive life of things. Prefiguring cyberculture: An intellectual history (2002), 130--141."},{"key":"e_1_2_1_114_1","volume-title":"German poetry: an anthology from Klopstock to Enzensberger","author":"Swales Martin","unstructured":"Martin Swales. 1987. German poetry: an anthology from Klopstock to Enzensberger. Cambridge University Press."},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.5621\/sciefictstud.43.1.0014"},{"key":"e_1_2_1_116_1","volume-title":"Save everything: supporting human memory with a personal digital lifetime store. Personal Information Management: Challenges and Opportunities (eds. William Jones and Jaime Teevan)","author":"Tan Desney","year":"2007","unstructured":"Desney Tan, Emma Berry, Mary Czerwinski, Gordon Bell, Jim Gemmell, Steve Hodges, Narinder Kapur, Brian Meyers, Nuria Oliver, and Ken Woodberry. 2007. Save everything: supporting human memory with a personal digital lifetime store. Personal Information Management: Challenges and Opportunities (eds. William Jones and Jaime Teevan) (2007), 90--107."},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639189.2639485"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-018-1110-0"},{"key":"e_1_2_1_119_1","first-page":"1","article-title":"Introduction to this special issue on designing for personal memories: past, present, and future","volume":"27","author":"Den Hoven Elise Van","year":"2012","unstructured":"Elise Van Den Hoven, Corina Sas, and Steve Whittaker. 2012. Introduction to this special issue on designing for personal memories: past, present, and future. Human--Computer Interaction 27, 1--2 (2012), 1--12.","journal-title":"Human--Computer Interaction"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/3335082.3335101"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.spc.2022.09.025"},{"key":"e_1_2_1_122_1","volume-title":"Damaged Nature: The Media Ecology of Auto-destructive Art. In Media and the Ecological Crisis","author":"Vik Synn\u00f8ve Marie","year":"2014","unstructured":"Synn\u00f8ve Marie Vik. 2014. Damaged Nature: The Media Ecology of Auto-destructive Art. In Media and the Ecological Crisis. Routledge, 40--52."},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/3393914.3395821"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322300"},{"key":"e_1_2_1_125_1","volume-title":"Song Dong: The Diary Keeper. Suhanya Raffel et al., APT","author":"Walsh Julie","year":"2002","unstructured":"Julie Walsh. 2002. Song Dong: The Diary Keeper. Suhanya Raffel et al., APT (2002)."},{"key":"e_1_2_1_126_1","volume-title":"Lethe: The art and critique of forgetting","author":"Weinrich Harald","year":"2004","unstructured":"Harald Weinrich. 2004. Lethe: The art and critique of forgetting. Cornell University Press."},{"key":"e_1_2_1_127_1","volume-title":"How Can We Learn to Forget?","author":"Welsh Sarah","year":"2020","unstructured":"Sarah Welsh. 2020. Forgetting as a Function: When the Internet Wants to Remember, How Can We Learn to Forget? (2020)."},{"key":"e_1_2_1_128_1","volume-title":"Kodak and the Lens of Nostalgia","author":"West Nancy Martha","unstructured":"Nancy Martha West. 2000. Kodak and the Lens of Nostalgia. University of virginia Press."},{"key":"e_1_2_1_129_1","volume-title":"Personal information management: from information consumption to curation. Annual review of information science and technology 45, 1","author":"Whittaker Steve","year":"2011","unstructured":"Steve Whittaker. 2011. Personal information management: from information consumption to curation. Annual review of information science and technology 45, 1 (2011), 1."},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-009-0218-7"},{"key":"e_1_2_1_131_1","volume-title":"The Digital Future of Museums: Conversations and Provocations","author":"Winesmith Keir","unstructured":"Keir Winesmith and Suse Anderson. 2020. The Digital Future of Museums: Conversations and Provocations. Routledge."},{"key":"e_1_2_1_132_1","volume-title":"Upon opening the black box and finding it empty: Social constructivism and the philosophy of technology. Science, technology, & human values 18, 3","author":"Winner Langdon","year":"1993","unstructured":"Langdon Winner. 1993. Upon opening the black box and finding it empty: Social constructivism and the philosophy of technology. Science, technology, & human values 18, 3 (1993), 362--378."},{"key":"e_1_2_1_133_1","volume-title":"Understanding computers and cognition: A new foundation for design","author":"Winograd Terry","unstructured":"Terry Winograd and Fernando Flores. 1986. Understanding computers and cognition: A new foundation for design. Intellect Books."},{"key":"e_1_2_1_134_1","volume-title":"Chien Wen Yuan, and John Scott Siri Jr","author":"Wohn Donghee Yvette","year":"2021","unstructured":"Donghee Yvette Wohn, Chien Wen Yuan, and John Scott Siri Jr. 2021. The Many Facets of Me: Multiple Account Management on Reddit.. In HICSS. 1--10."},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819948"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102288"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858333"},{"key":"e_1_2_1_138_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS","author":"Zou Yixin","year":"2018","unstructured":"Yixin Zou, Abraham H Mhaidli, Austin McCall, and Florian Schaub. 2018. \"I've Got Nothing to Lose\": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). 197--216."},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2015.5"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701211","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3701211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T14:22:33Z","timestamp":1755872553000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701211"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,10]]},"references-count":139,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,10]]}},"alternative-id":["10.1145\/3701211"],"URL":"https:\/\/doi.org\/10.1145\/3701211","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,10]]},"assertion":[{"value":"2025-01-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}