{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:58:13Z","timestamp":1776110293148,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,30]]},"DOI":"10.1145\/3726986.3727904","type":"proceedings-article","created":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T15:13:01Z","timestamp":1759158781000},"page":"232-247","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Using Annotated Portfolios to Interrogate Speculative Designs: The Case of Emergent Personal Data Trails"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8408-0153","authenticated-orcid":false,"given":"Stephen","family":"Snow","sequence":"first","affiliation":[{"name":"University of Queensland, Brisbane, Australia"},{"name":"Environment, CSIRO, Brisbane, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3432-8445","authenticated-orcid":false,"given":"Awais Hameed","family":"Khan","sequence":"additional","affiliation":[{"name":"The University of Queensland, Brisbane, Queensland, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1128-729X","authenticated-orcid":false,"given":"Ben","family":"Matthews","sequence":"additional","affiliation":[{"name":"University of Queensland, Brisbane, QLD, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5931-7713","authenticated-orcid":false,"given":"Inmaculada","family":"Rodr\u00edguez","sequence":"additional","affiliation":[{"name":"University of Barcelona, Barcelona, Spain"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1980-1292","authenticated-orcid":false,"given":"Audrey","family":"Desjardins","sequence":"additional","affiliation":[{"name":"School of Art + Art History + Design, University of Washington, Seattle, Washington, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2656-4897","authenticated-orcid":false,"given":"Ayanna","family":"Seals","sequence":"additional","affiliation":[{"name":"Technology Management, New York University, New York, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3498-2976","authenticated-orcid":false,"given":"Omar","family":"Sosa-Tzec","sequence":"additional","affiliation":[{"name":"School of Design, San Francisco State University, San Francisco, California, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5381-7159","authenticated-orcid":false,"given":"Anh-Ton","family":"Tran","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, Georgia, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2192-1728","authenticated-orcid":false,"given":"James","family":"Pierce","sequence":"additional","affiliation":[{"name":"School of Art + Art History + Design, University of Washington Seattle, Seattle, Washington, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4442-9744","authenticated-orcid":false,"given":"Xiangjun","family":"Peng","sequence":"additional","affiliation":[{"name":"Chinese University of Hong Kong, Hong Kong, Hong Kong"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1954-5441","authenticated-orcid":false,"given":"Stephen","family":"Viller","sequence":"additional","affiliation":[{"name":"Electrical Engineering and Computer Science, University of Queensland, Brisbane, Australia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2025,9,29]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174156"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702210"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3539737"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1080\/14626268.2013.767276"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892340"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395464"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/2317956.2317968"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/1147261.1147271"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462002"},{"key":"e_1_3_3_1_10_2","volume-title":"Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (pp. 3566-3573)","author":"Briggs P.","year":"2016","unstructured":"P. Briggs, E. Churchill, M. Levine, J. Nicholson, G.W. Prochard, and P. Oliver. 2016. Everyday surveillance. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (pp. 3566-3573). ACM., 2016. ACM, San Jose, CA, 3566\u20133573."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376434"},{"key":"e_1_3_3_1_12_2","unstructured":"Bill Buxton. 2010. Sketching user experiences: getting the design right and the right design. Morgan Kaufmann."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106718"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.6084\/M9.FIGSHARE.4746964"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395490"},{"key":"e_1_3_3_1_16_2","volume-title":"Serious creativity: Using the power of lateral thinking to create new ideas","author":"deBono E","unstructured":"E deBono. 1992. Serious creativity: Using the power of lateral thinking to create new ideas. Harper Collins, New York."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.21606\/drs.2018.510"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376342"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/2079216.2079220"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-013-0678-7"},{"key":"e_1_3_3_1_21_2","volume-title":"Speculative everything: Design, fiction, and social dreaming","author":"Dunne Anthony","unstructured":"Anthony Dunne and Fiona Raby. 2013. Speculative everything: Design, fiction, and social dreaming. MIT Press, Boston."},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2376613"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025503"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804250"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1162\/desi.2008.24.3.4"},{"key":"e_1_3_3_1_26_2","volume-title":"Good data, Angela Daly","author":"Flintham Martin","unstructured":"Martin Flintham, Murray Goulden, M Price, and D Urquhart. 2019. Domesticating data: socio-legal perspectives on smart homes and good data design. In Good data, Angela Daly, S. Kate Devitt and Monique Mann (eds.). Institute of Network Cultures, Amsterdam."},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1080\/10811680.2017.1331637"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3569009.3572797"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/2212877.2212889"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3685272"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1177\/1461444817700154"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3064857.3079110"},{"key":"e_1_3_3_1_33_2","volume-title":"Everyware: the dawning age of ubiquitous computing. New Riders","author":"Greenfield Adam","unstructured":"Adam Greenfield. 2006. Everyware: the dawning age of ubiquitous computing. New Riders, Berkeley, CA."},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3196709.3196745"},{"key":"e_1_3_3_1_35_2","unstructured":"Alex Hern. 2019. Largest collection ever of breached data found. The Guardian. Retrieved from https:\/\/www.theguardian.com\/technology\/2019\/jan\/17\/breached-data-largest-collection-ever-seen-email-password-hacking"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462134"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3292147.3292165"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3191268"},{"key":"e_1_3_3_1_39_2","volume-title":"Design Methods","author":"Jones John Chris","unstructured":"John Chris Jones. 1992. Design Methods. John Wiley & Sons."},{"key":"e_1_3_3_1_40_2","article-title":"How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did","author":"Hill Kashmir","year":"2012","unstructured":"Kashmir Hill. 2012. How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did. Forbes Magazine. Retrieved August 16, 2020 from https:\/\/www.forbes.com\/sites\/kashmirhill\/2012\/02\/16\/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did\/#717d20636668","journal-title":"Forbes Magazine. Retrieved"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395580"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3591196.3593339"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15124-3"},{"key":"e_1_3_3_1_44_2","first-page":"8","article-title":"The Role of Fiction in Experiments within Design, Art & Architecture-Towards a New Typology of Design Fiction. Artifact","volume":"3","author":"Knutz Eva","year":"2014","unstructured":"Eva Knutz and Thomas Markussen. 2014. The Role of Fiction in Experiments within Design, Art & Architecture-Towards a New Typology of Design Fiction. Artifact: Journal of Design Practice 3, 2 (2014), 8\u20131.","journal-title":"Journal of Design Practice"},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3287054"},{"key":"e_1_3_3_1_46_2","volume-title":"Ethnographies of Collaborative Economies Conference Proceedings","author":"Larner Justin","year":"2019","unstructured":"Justin Larner. 2019. Reflective ethnographic design of collaborative economy models using annotated portfolios. In Ethnographies of Collaborative Economies Conference Proceedings, October 25, 2019. Edinburgh, 8\u201317."},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/1979742.1979573"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/2783446.2783592"},{"key":"e_1_3_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/2405716.2405725"},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2641676"},{"key":"e_1_3_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481371"},{"key":"e_1_3_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/2513506.2513531"},{"key":"e_1_3_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376167"},{"key":"e_1_3_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2560469"},{"key":"e_1_3_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3152771.3156139"},{"key":"e_1_3_3_1_56_2","volume-title":"MINIMIZING DISCLOSURE RISK IN HHS OPEN DATA INITIATIVES. 3","author":"Assistant Office","unstructured":"Office of the Assistant Secretary for Planning and Regulation. 2014. MINIMIZING DISCLOSURE RISK IN HHS OPEN DATA INITIATIVES. 3. OPEN DATA POLICY\u2014MANAGING INFORMATION AS AN ASSET. U.S. Department of Health and Human Services. Retrieved from https:\/\/aspe.hhs.gov\/report\/minimizing-disclosure-risk-hhs-open-data-initiatives\/3-open-data-policy%E2%80%94managing-information-asset"},{"key":"e_1_3_3_1_57_2","volume-title":"Proceedings of ACM conference on Designing Information Systems (DIS\u201914)","author":"Pierce J.","year":"2014","unstructured":"J. Pierce. 2014. Design proposal for a wireless derouter: Speculatively engaging digitally disconnected space. In Proceedings of ACM conference on Designing Information Systems (DIS\u201914), 2014. ACM, Brisbane, Australia, 388\u2013403."},{"key":"e_1_3_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300275"},{"key":"e_1_3_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462001"},{"key":"e_1_3_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/2968219.2968331"},{"key":"e_1_3_3_1_61_2","volume-title":"Developments in Design Methodology","author":"Rittel Horst","unstructured":"Horst Rittel. 1984. Second-Generation Design Methods. In Developments in Design Methodology, Nigel Cross (ed.). John Wiley & Sons, 317\u2013327."},{"key":"e_1_3_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376889"},{"key":"e_1_3_3_1_63_2","unstructured":"Donald A. Sch\u00f6n. 1983. The Reflective Practitioner: How Professionals Think in Action. Basic books."},{"key":"e_1_3_3_1_64_2","volume-title":"Retrieved","author":"Shepherd David","year":"2011","unstructured":"David Shepherd. 2011. Sentient City Survival Kit. Retrieved January 22, 2020 from http:\/\/survival.sentientcity.net\/umbrella.html"},{"key":"e_1_3_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_3_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2020.1741118"},{"key":"e_1_3_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.1108\/EUM0000000002738"},{"key":"e_1_3_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1017\/S0963180119000057"},{"key":"e_1_3_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/3673228"},{"key":"e_1_3_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445095"},{"key":"e_1_3_3_1_71_2","volume-title":"SpeculativeEdu. Retrieved","author":"Ward Matt","year":"2019","unstructured":"Matt Ward. 2019. Critical about Critical and Speculative Design. SpeculativeEdu. Retrieved April 22, 2021 from https:\/\/speculativeedu.eu\/critical-about-critical-and-speculative-design\/"},{"key":"e_1_3_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/3610107"},{"key":"e_1_3_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/3182655"},{"key":"e_1_3_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/3064663.3064682"},{"key":"e_1_3_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.21606\/drs.2024.1316"}],"event":{"name":"OzCHI '24: 36th Australasian Conference on Human-Computer Interaction","location":"Meanjin | Brisbane Australia","acronym":"OzCHI '24"},"container-title":["Proceedings of the 36th Australasian Conference on Human-Computer Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3726986.3727904","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T16:29:12Z","timestamp":1759163352000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3726986.3727904"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,30]]},"references-count":75,"alternative-id":["10.1145\/3726986.3727904","10.1145\/3726986"],"URL":"https:\/\/doi.org\/10.1145\/3726986.3727904","relation":{},"subject":[],"published":{"date-parts":[[2024,11,30]]},"assertion":[{"value":"2025-09-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}