{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:53:17Z","timestamp":1774601597079,"version":"3.50.1"},"reference-count":60,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T00:00:00Z","timestamp":1537401600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2019,2]]},"abstract":"<jats:p> The capacity to understand and control one\u2019s personal data is now a crucial part of living in contemporary society. In this sense, traditional concerns over supporting the development of \u2018digital literacy\u2019 are now being usurped by concerns over citizens\u2019 \u2018data literacies\u2019. In contrast to recent data safety and data science approaches, this article argues for a more critical form of \u2018personal data literacies\u2019 where digital data are understood as socially situated and context dependent. Drawing on the critical literacies tradition, the article outlines a range of salient socio-technical understandings of personal data generation and processing. Specifically, the article proposes a framework of \u2018Personal Data Literacies\u2019 that distinguishes five significant domains: (1) Data Identification, (2) Data Understandings, (3) Data Reflexivity, (4) Data Uses, and (5) Data Tactics. The article concludes by outlining the implications of this framework for future education and research around the area of individuals\u2019 understandings of personal data. <\/jats:p>","DOI":"10.1177\/1461444818799523","type":"journal-article","created":{"date-parts":[[2018,9,20]],"date-time":"2018-09-20T10:28:57Z","timestamp":1537439337000},"page":"419-437","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":204,"title":["\u2018Personal data literacies\u2019: A critical literacies approach to enhancing understandings of personal digital data"],"prefix":"10.1177","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7346-1313","authenticated-orcid":false,"given":"Luci","family":"Pangrazio","sequence":"first","affiliation":[{"name":"Deakin University, Australia"}]},{"given":"Neil","family":"Selwyn","sequence":"additional","affiliation":[{"name":"Monash University, Australia"}]}],"member":"179","published-online":{"date-parts":[[2018,9,20]]},"reference":[{"key":"bibr1-1461444818799523","first-page":"1673","volume":"8","author":"Andrejevic M","year":"2014","journal-title":"International Journal of Communication"},{"key":"bibr2-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1177\/0263276413476542"},{"key":"bibr3-1461444818799523","first-page":"138","volume-title":"Explorations in Critical Studies of Advertising","author":"Bodle R","year":"2016"},{"key":"bibr4-1461444818799523","first-page":"167","volume-title":"Raw Data","author":"Bowker G","year":"2013"},{"key":"bibr5-1461444818799523","unstructured":"Boyd D (2017) Hacking the attention economy. In: Data and Society: Points. Available at: https:\/\/points.datasociety.net\/hacking-the-attention-economy-9fa1daca7a37"},{"key":"bibr6-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2012.678878"},{"key":"bibr7-1461444818799523","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9780262029735.001.0001"},{"key":"bibr8-1461444818799523","volume-title":"Media Education: Literacy, Learning and Contemporary Culture","author":"Buckingham D","year":"2003"},{"issue":"2","key":"bibr9-1461444818799523","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1515\/libri-2013-0010","volume":"63","author":"Calzada-Prado J","year":"2013","journal-title":"Libri: International Journal of Libraries and Information Services"},{"key":"bibr10-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1353\/pla.2011.0022"},{"key":"bibr11-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1111\/1467-954X.12158"},{"key":"bibr12-1461444818799523","unstructured":"Data-Pop Alliance and Internews (2015) Beyond data literacy: reinventing community engagement and empowerment in the age of data (Data-Pop alliance white paper series). Working paper, Data-Pop Alliance and Internews, New York, September."},{"key":"bibr13-1461444818799523","volume-title":"Better the data you know","author":"Deahl E","year":"2014"},{"key":"bibr14-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1145\/2500499"},{"key":"bibr15-1461444818799523","unstructured":"Education Development Centre Inc (2016) Building global interest in data literacy. Workshop report. Waltham, MA: Oceans of Data Institute. Available at: http:\/\/oceansofdata.org\/our-work\/building-global-interest-data-literacy-dialogue-workshop-report"},{"key":"bibr16-1461444818799523","unstructured":"Office of the eSafety Commissioner (2017) Protecting personal information. Report. Canberra, ACT, Australia: Australian Government. Available at: https:\/\/www.esafety.gov.au\/esafety-information\/esafety-issues\/protecting-personal-information"},{"issue":"3","key":"bibr17-1461444818799523","first-page":"7","volume":"5","author":"Freebody P","year":"1990","journal-title":"Prospect: Australian Journal of TESOL"},{"key":"bibr18-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1215\/10407391-2420021"},{"key":"bibr19-1461444818799523","unstructured":"Garcia D, Lovink G (1997) The ABC of tactical media. Nettime. Available at: http:\/\/www.nettime.org\/Lists-Archives\/nettime-l-9705\/msg00096.html"},{"key":"bibr20-1461444818799523","first-page":"180","volume-title":"Situated Literacies: Reading and Writing in Context","author":"Gee J","year":"2000"},{"key":"bibr21-1461444818799523","first-page":"35","volume-title":"The Routledge Handbook of Literacy Studies","author":"Gee J","year":"2015"},{"key":"bibr22-1461444818799523","doi-asserted-by":"publisher","DOI":"10.14361\/dcs-2016-0203"},{"key":"bibr23-1461444818799523","unstructured":"Golumbia D (2018) We don\u2019t know what \u2018personal data\u2019 means. Available at: https:\/\/www.uncomputing.org\/?p=1983"},{"key":"bibr24-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1177\/000494418803200203"},{"key":"bibr25-1461444818799523","volume-title":"Literacy in 3D: An Integrated Perspective in Theory and Practice","author":"Green B","year":"2012"},{"key":"bibr26-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1177\/0038038512453798"},{"issue":"3","key":"bibr27-1461444818799523","first-page":"412","volume":"10","author":"Hearn A","year":"2010","journal-title":"Ephemera: Theory & Politics in Organization"},{"key":"bibr28-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1017\/S0047404500009039"},{"key":"bibr29-1461444818799523","doi-asserted-by":"publisher","DOI":"10.4324\/9781315726465"},{"key":"bibr30-1461444818799523","doi-asserted-by":"publisher","DOI":"10.4135\/9781473909472"},{"key":"bibr31-1461444818799523","unstructured":"Kruger A (2012) Hackathons aren\u2019t just for hacking. Wired, 6 June. Available at: https:\/\/www.wired.com\/2012\/06\/hackathons-arent-just-for-hacking\/"},{"key":"bibr32-1461444818799523","doi-asserted-by":"publisher","DOI":"10.22230\/cjc.2009v34n3a2114"},{"key":"bibr33-1461444818799523","first-page":"1","volume-title":"Compromised Data: From Social Media to Big Data","author":"Langlois G","year":"2015"},{"issue":"5","key":"bibr34-1461444818799523","first-page":"448","volume":"43","author":"Luke A","year":"2000","journal-title":"Journal of Adolescent & Adult Literacy"},{"key":"bibr35-1461444818799523","first-page":"136","volume-title":"Framing Languages and Literacies: Socially Situated Views and Perspectives","author":"Luke A","year":"2013"},{"key":"bibr36-1461444818799523","unstructured":"Luke A, Freebody P (1999) Further notes on the four resources model. Reading Online. Available at: https:\/\/pdfs.semanticscholar.org\/a916\/0ce3d5e75744de3d0ddacfaf6861fe928b9e.pdf"},{"key":"bibr37-1461444818799523","first-page":"339","volume-title":"Digital Sociologies","author":"Lupton D","year":"2017"},{"key":"bibr38-1461444818799523","doi-asserted-by":"crossref","unstructured":"McCosker A (2017) Data literacies for the postdemographic social media self. First Monday 22(10). Available at: http:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/7307\/6550 (accessed 2 October 2017).","DOI":"10.5210\/fm.v22i10.7307"},{"key":"bibr39-1461444818799523","first-page":"460","volume-title":"Debates in the Digital Humanities","author":"Manovich L","year":"2011"},{"key":"bibr40-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543995"},{"key":"bibr41-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1177\/2056305116683206"},{"key":"bibr42-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1177\/1354856517700383"},{"key":"bibr43-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1515\/9780804772891"},{"key":"bibr44-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1080\/01596306.2014.942836"},{"key":"bibr45-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1177\/2056305118787808"},{"key":"bibr46-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12152"},{"key":"bibr47-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1177\/2053951714564228"},{"key":"bibr48-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1177\/2053951715616649"},{"key":"bibr49-1461444818799523","first-page":"202","volume-title":"Compromised Data: From Social Media to Big Data","author":"Renzi A","year":"2015"},{"key":"bibr50-1461444818799523","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2016.01959."},{"key":"bibr51-1461444818799523","volume-title":"Internet Safety Parents\u2019 Guide","author":"Roddel V","year":"2006"},{"key":"bibr52-1461444818799523","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/8718.001.0001"},{"key":"bibr53-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1177\/0038038510394027"},{"key":"bibr54-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1177\/2043820613514321"},{"key":"bibr55-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1177\/2053951718765021."},{"key":"bibr56-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2015.1091026"},{"key":"bibr57-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1080\/1358684940010109"},{"key":"bibr58-1461444818799523","doi-asserted-by":"publisher","DOI":"10.17645\/mac.v1i1.70"},{"key":"bibr59-1461444818799523","doi-asserted-by":"publisher","DOI":"10.4159\/9780674044845"},{"key":"bibr60-1461444818799523","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2005.04.001"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444818799523","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444818799523","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444818799523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T06:57:16Z","timestamp":1740812236000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444818799523"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,20]]},"references-count":60,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["10.1177\/1461444818799523"],"URL":"https:\/\/doi.org\/10.1177\/1461444818799523","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,20]]}}}