{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T03:35:00Z","timestamp":1772681700158,"version":"3.50.1"},"reference-count":80,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/R033854\/1"],"award-info":[{"award-number":["EP\/R033854\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/R033870\/1"],"award-info":[{"award-number":["EP\/R033870\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/R033889\/2"],"award-info":[{"award-number":["EP\/R033889\/2"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/R033897\/1"],"award-info":[{"award-number":["EP\/R033897\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Big Data &amp; Society"],"published-print":{"date-parts":[[2023,7]]},"abstract":"<jats:p> Our research responds to calls for more engagement with everyday personal data. We used a co-designed, fictional persona called Alex Smith to concretise and represent people's online information to help participants (through role-playing) reflect on data and digital traces. Drawing together four fields of scholarly research concerning personal data: digital traces and the digital self, datafication and dataveillance, mundane, everyday data and the data journey \u2013 our aim was to advance understandings of personal data by exploring ordinary people's seemingly innocuous digital traces generated through everyday online interactions. Our paper presents three key findings from our analysis: (1) how ordinary people cope with and manage everyday data; (2) the haunting effects and affects of peer-to-peer surveillance and (3) postdigital identities. We argue that greater attention needs to be paid to everyday digital traces \u2013 how they are understood, managed and revealed because this has implications for ordinary people, corporate entities and governments. We contribute to a gap in critical data studies literature that calls for further investigations into ordinary people's engagement with data. We also offer a method that can be adapted for and used with different participant groups, which also supports their awareness of cumulative functions of personal data and potential use by un\/known actors. <\/jats:p>","DOI":"10.1177\/20539517231213827","type":"journal-article","created":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T22:57:58Z","timestamp":1701903478000},"update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":12,"title":["Everyday digital traces"],"prefix":"10.1177","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4685-7715","authenticated-orcid":false,"given":"Andrea","family":"Armstrong","sequence":"first","affiliation":[{"name":"Silent Spring Consultants, Middlesbrough, UK"}]},{"given":"Jo","family":"Briggs","sequence":"additional","affiliation":[{"name":"Northumbria University, School of Design, Newcastle upon Tyne, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1485-4723","authenticated-orcid":false,"given":"Wendy","family":"Moncur","sequence":"additional","affiliation":[{"name":"Computer and Information Sciences, University of Strathclyde, Glasgow, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7311-0038","authenticated-orcid":false,"given":"Daniel Paul","family":"Carey","sequence":"additional","affiliation":[{"name":"Independent Researcher, Newcastle upon Tyne, UK"}]},{"given":"Emma","family":"Nicol","sequence":"additional","affiliation":[{"name":"Computer and Information Sciences, University of Strathclyde, Glasgow, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6025-4593","authenticated-orcid":false,"given":"Burkhard","family":"Schafer","sequence":"additional","affiliation":[{"name":"University of Edinburgh, School of Law, Edinburgh, UK"}]}],"member":"179","published-online":{"date-parts":[[2023,12,6]]},"reference":[{"key":"bibr1-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.1994.9960162"},{"key":"bibr2-20539517231213827","doi-asserted-by":"publisher","DOI":"10.5210\/spir.v2021i0.12088"},{"key":"bibr3-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1002\/9781118384466.ch37"},{"key":"bibr4-20539517231213827","doi-asserted-by":"crossref","unstructured":"Azzopardi L, Briggs J, Duheric M, et al. (2022) Are Taylor's posts risky? Evaluating cumulative revelations in online personal data: A persona-based tool for evaluating awareness of online risks and harms. Proceeding of Conference on Research and Development in Information Retrieval, 3295\u20133299.","DOI":"10.1145\/3477495.3531659"},{"key":"bibr5-20539517231213827","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v11i9.1394"},{"key":"bibr6-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716654502"},{"key":"bibr7-20539517231213827","volume-title":"Liquid surveillance: A conversation","author":"Bauman Z","year":"2013"},{"key":"bibr8-20539517231213827","volume-title":"Personal Connections in the Digital Age","author":"Baym N","year":"2015","edition":"2"},{"key":"bibr9-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1177\/2053951719885967"},{"key":"bibr10-20539517231213827","doi-asserted-by":"publisher","DOI":"10.5040\/9781350047075"},{"key":"bibr11-20539517231213827","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9963.001.0001"},{"key":"bibr11a-20539517231213827","doi-asserted-by":"crossref","unstructured":"boyd d (2008) Why youth (heart) social network sites: The role of networked publics in teenage social life. In Buckingham D. (ed.) Youth, Identity, and Digital Media. Cambridge: MIT Press, pp. 2007\u20132016.","DOI":"10.31219\/osf.io\/22hq2"},{"key":"bibr12-20539517231213827","unstructured":"boyd d (2010) Public by default private when necessary. Available from https:\/\/www.zephoria.org\/thoughts\/archives\/2010\/01\/25\/public_by_defau.html (blog post accessed July 2023)."},{"key":"bibr13-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65584-0_16"},{"key":"bibr14-20539517231213827","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9780262029735.001.0001"},{"key":"bibr15-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1177\/20539517211065368"},{"key":"bibr16-20539517231213827","unstructured":"Burgess J (2017) Hook-up apps\u2019 vernacular data cultures. Social Life of Data symposium, April, RMIT University, Melbourne."},{"key":"bibr17-20539517231213827","volume-title":"Everyday Data Cultures","author":"Burgess J","year":"2022"},{"key":"bibr18-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1145\/42411.42413"},{"key":"bibr19-20539517231213827","volume-title":"Practising creative securities","author":"Coles-Kemp L","year":"2018"},{"key":"bibr20-20539517231213827","doi-asserted-by":"crossref","unstructured":"Coles-Kemp L, Jensen RB, Heath C. (2020) Too much information: Questioning security in a post-digital society. Proceedings of the Conference on Human Factors in Computing Systems. ACM, New York, USA, 1\u201314.","DOI":"10.1145\/3313831.3376214"},{"key":"bibr21-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1177\/2053951714539277"},{"key":"bibr22-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1057\/9781137437204_2"},{"key":"bibr23-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2014.888458"},{"key":"bibr24-20539517231213827","volume-title":"Logique du sens","author":"Deleuze G","year":"1990"},{"key":"bibr25-20539517231213827","volume-title":"A Vast Machine: Computer Models, Climate Data, and the Politics of Global Warming","author":"Edwards P","year":"2010"},{"key":"bibr26-20539517231213827","doi-asserted-by":"crossref","first-page":"33","DOI":"10.4267\/2042\/31473","volume":"53","author":"Ertzscheid O","year":"2009","journal-title":"Herm\u00e8s"},{"key":"bibr27-20539517231213827","first-page":"13","volume":"10","author":"Flyverbom M","year":"2016","journal-title":"International Journal of Communication"},{"key":"bibr28-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1177\/2053951718799114"},{"key":"bibr29-20539517231213827","volume-title":"L\u2019herm\u00e9neutique du sujet","author":"Foucault M","year":"2001"},{"key":"bibr30-20539517231213827","volume-title":"The Presentation of Self in Everyday Life","author":"Goffman E","year":"1959"},{"key":"bibr31-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2011.54"},{"key":"bibr32-20539517231213827","doi-asserted-by":"publisher","DOI":"10.4324\/9781315775098"},{"key":"bibr33-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1080\/00071310020015280"},{"key":"bibr34-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1177\/1350508414522315"},{"key":"bibr35-20539517231213827","first-page":"21","volume":"10","author":"Hargittai E","year":"2016","journal-title":"International Journal of Communication"},{"key":"bibr36-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1177\/2050157912464487"},{"key":"bibr37-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1017\/S0047279422000162"},{"key":"bibr38-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1177\/14782103211062713"},{"key":"bibr39-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1007\/s42438-018-0011-x"},{"key":"bibr40-20539517231213827","unstructured":"Jones A (2018) Have you signed up for a tracking app by mistake? Guardian. https:\/\/www.theguardian.com\/technology\/shortcuts\/2018\/jan\/29\/have-you-signed-up-for-a-tracking-app-by-mistake (accessed August 2022)."},{"key":"bibr41-20539517231213827","volume":"1","author":"Kennedy H","year":"2018","journal-title":"Krisis Journal for Contemporary Philosophy"},{"key":"bibr42-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-021-04747-x"},{"key":"bibr43-20539517231213827","unstructured":"Laflaqui\u00e8re J (2009) Conception de syst\u00e8me \u00e0 base de traces num\u00e9riques dans les environnements informatiques documentaires, Th\u00e8se de l. Universit\u00e9 de Technologie de Troyes."},{"key":"bibr44-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1177\/0309132519888687"},{"key":"bibr45-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716661366"},{"key":"bibr46-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1177\/1468794120939235"},{"key":"bibr47-20539517231213827","volume-title":"The Quantified Self","author":"Lupton D","year":"2016"},{"key":"bibr48-20539517231213827","first-page":"19","volume":"14","author":"Lupton D","year":"2020","journal-title":"International Journal of Communication"},{"key":"bibr49-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1177\/1749975520939779"},{"key":"bibr50-20539517231213827","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v15i2.6332"},{"key":"bibr51-20539517231213827","volume-title":"Space, Place and Gender","author":"Massey D","year":"1994"},{"key":"bibr52-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1177\/1362480697001002003"},{"key":"bibr53-20539517231213827","volume-title":"Big Data: A Revolution That Will Transform How We Live, Work, and Think","author":"Mayer-Sch\u00f6nberger V","year":"2013"},{"key":"bibr54-20539517231213827","volume-title":"Technoscience and Everyday Life","author":"Michael M","year":"2006"},{"key":"bibr55-20539517231213827","first-page":"507","volume":"12","author":"Milan S","year":"2018","journal-title":"International Journal of Communications"},{"key":"bibr56-20539517231213827","volume-title":"Revealing cumulative risks in online personal information: A data narrative study","author":"Nicol E","year":"2022"},{"key":"bibr57-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1080\/13569775.2020.1759883"},{"key":"bibr58-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1177\/2053951718756685"},{"key":"bibr59-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1177\/2053951717700924"},{"key":"bibr60-20539517231213827","volume-title":"Digital Identity and Social Media","author":"Pitsillides S","year":"2013"},{"key":"bibr61-20539517231213827","doi-asserted-by":"crossref","unstructured":"Prakash M, Kang W, Li W, et al. (2021) Embodying a narrative: Spatializing abstract narrative themes for forensic exploration. EA of the 2021 CHI Conference on Human Factors in Computing Systems: 1\u20136.","DOI":"10.1145\/3411763.3451593"},{"key":"bibr62-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1145\/3292147.3292168"},{"key":"bibr63-20539517231213827","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v12i2.4741"},{"key":"bibr64-20539517231213827","doi-asserted-by":"publisher","DOI":"10.3390\/soc4010068"},{"key":"bibr65-20539517231213827","doi-asserted-by":"publisher","DOI":"10.5840\/techne20159935"},{"key":"bibr66-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65592-1"},{"key":"bibr67-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2023.105800"},{"key":"bibr68-20539517231213827","volume-title":"Making Sense of Trifles: Data Narratives and Cumulative Data Disclosure","author":"Schafer B","year":"2022"},{"key":"bibr69-20539517231213827","first-page":"5032","volume":"10","author":"Shorey S","year":"2016","journal-title":"International Journal of Communication"},{"key":"bibr70-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1177\/1357034X15623622"},{"key":"bibr71-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1177\/2053951717751551"},{"key":"bibr72-20539517231213827","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v1i1.3397"},{"key":"bibr73-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2019.1657164"},{"key":"bibr74-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1177\/1354856514567827"},{"key":"bibr75-20539517231213827","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v12i2.4776"},{"key":"bibr76-20539517231213827","doi-asserted-by":"crossref","unstructured":"Vertesi J, Kaye J, Jarosewski, et al. (2016) Data narratives: Uncovering tensions in personal data management. In Proceedings of Conference on Computer-Supported Cooperative Work & Social Computing (CSCW \u201816), pp. 478\u2013490.","DOI":"10.1145\/2818048.2820017"},{"key":"bibr77-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1525\/si.2007.30.4.627"},{"key":"bibr78-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1145\/3274453"},{"key":"bibr79-20539517231213827","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2015.5"}],"container-title":["Big Data &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/20539517231213827","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/20539517231213827","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/20539517231213827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T13:30:29Z","timestamp":1740749429000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/20539517231213827"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7]]},"references-count":80,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["10.1177\/20539517231213827"],"URL":"https:\/\/doi.org\/10.1177\/20539517231213827","relation":{},"ISSN":["2053-9517","2053-9517"],"issn-type":[{"value":"2053-9517","type":"print"},{"value":"2053-9517","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7]]},"article-number":"20539517231213827"}}