{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T02:44:23Z","timestamp":1776307463826,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,2,28]],"date-time":"2015-02-28T00:00:00Z","timestamp":1425081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Tekes - the Finnish Funding Agency for Innovation","award":["FuNeSoMo"],"award-info":[{"award-number":["FuNeSoMo"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,2,28]]},"DOI":"10.1145\/2675133.2675256","type":"proceedings-article","created":{"date-parts":[[2015,2,24]],"date-time":"2015-02-24T14:09:31Z","timestamp":1424786971000},"page":"1427-1441","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Give Social Network Users the Privacy They Want"],"prefix":"10.1145","author":[{"given":"Pamela","family":"Wisniewski","sequence":"first","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"given":"A.K.M. Najmul","family":"Islam","sequence":"additional","affiliation":[{"name":"University of Turku, Turku, Finland &amp; Helsinki Institute for Information Technology HIIT \/ Aalto University, Aalto, Finland"}]},{"given":"Bart P.","family":"Knijnenburg","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Sameer","family":"Patil","sequence":"additional","affiliation":[{"name":"Helsinki Institute for Information Technology HIIT \/ Aalto University, Aalto, Finland &amp; University of Siegen, Siegen, Germany &amp; Yahoo Labs, Sunnyvale, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,2,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Brooks\/Cole Publishing Company","author":"Altman I.","year":"1975"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466446"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493510"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067860.1067868"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753613"},{"key":"e_1_3_2_1_6_1","volume-title":"Convergent and discriminant validation by the multitrait-multimethod matrix. Psychological bulletin 56, 2","author":"Campbell D. T.","year":"1959"},{"key":"e_1_3_2_1_7_1","volume-title":"Houghton Mifflin","author":"Cook T. D.","year":"1979"},{"key":"e_1_3_2_1_8_1","volume-title":"December","author":"Eler A.","year":"2011"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444810385389"},{"key":"e_1_3_2_1_11_1","volume-title":"Eds. Springer Berlin Heidelberg","author":"Ellison N. B.","year":"2011"},{"key":"e_1_3_2_1_12_1","volume-title":"A primer for soft modeling","author":"Falk R. F.","year":"1992"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"e_1_3_2_1_14_1","volume-title":"A theory of cognitive dissonance","author":"Festinger L.","year":"1962"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800313"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017507.2017508"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1006\/jevp.1996.0025"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054986"},{"key":"e_1_3_2_1_19_1","volume-title":"Americas Conference on Information Systems, AMCIS 2011","author":"Karr-Wisniewski P.","year":"2011"},{"key":"e_1_3_2_1_20_1","volume-title":"Boundaries Where You End and I Begin: How to Recognize and Set Healthy Boundaries","author":"Katherine A.","year":"1994"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1939-1668.2006.tb00414.x"},{"key":"e_1_3_2_1_22_1","volume-title":"Workshop on Human Decision Making in Recommender Systems, Decisions@ RecSys '13","author":"Knijnenburg B. P.","year":"2013"},{"key":"e_1_3_2_1_23_1","unstructured":"Kock N. WarpPLS 4.0 user manual 2010. https:\/\/linproxy.fan.workers.dev:443\/http\/scriptwarp.com\/warppls\/UserManual_v_4_0.pdf. Kock N. WarpPLS 4.0 user manual 2010. https:\/\/linproxy.fan.workers.dev:443\/http\/scriptwarp.com\/warppls\/UserManual_v_4_0.pdf."},{"key":"e_1_3_2_1_24_1","volume-title":"International Conference on Information Systems, ICIS 2011","author":"Koroleva K.","year":"2011"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/647987.741336"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017356.2017361"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2141512.2141523"},{"key":"e_1_3_2_1_30_1","volume-title":"Privacy management on social media sites. Tech. rep","author":"Madden M.","year":"2012"},{"key":"e_1_3_2_1_31_1","volume-title":"February","author":"Matyszczyk C.","year":"2010"},{"key":"e_1_3_2_1_32_1","volume-title":"Development of an instrument to measure the perceptions of adopting an information technology innovation. Information systems research 2, 3","author":"Moore G. C.","year":"1991"},{"key":"e_1_3_2_1_33_1","volume-title":"Psychometric Theory","author":"Nunnally J. C.","year":"1978","edition":"2"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1057073"},{"key":"e_1_3_2_1_35_1","volume-title":"The Sixth International AAAI Conference on Weblogs and Social Media, ICWSM 2012","author":"Page X.","year":"2012"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","DOI":"10.1353\/book4588","volume-title":"Boundaries of privacy: Dialectics of disclosure","author":"Petronio S.","year":"2002"},{"key":"e_1_3_2_1_38_1","volume-title":"Anonymity, privacy, and security online. Tech. rep","author":"Rainie L.","year":"2013"},{"key":"e_1_3_2_1_39_1","volume-title":"Coming and going on Facebook. Tech. rep","author":"Rainie L.","year":"2013"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_1"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0214-3"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.01324"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145320"},{"key":"e_1_3_2_1_44_1","volume-title":"The Sixth International AAAI Conference on Weblogs and Social Media, ICWSM 2012","author":"Stutzman F.","year":"2012"},{"key":"e_1_3_2_1_45_1","first-page":"1","article-title":"Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science","volume":"28","author":"Tufekci Z","year":"2008","journal-title":"Technology & Society"},{"key":"e_1_3_2_1_46_1","volume-title":"9th International Symposium on Online Journalism","author":"Valenzuela S.","year":"2008"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01474.x"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078841"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2006.00029.x"},{"key":"e_1_3_2_1_51_1","volume-title":"SOUPS 2014 Workshop on Privacy Personas and Segmentation","author":"Wisniewski P.","year":"2014"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207761"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557363"}],"event":{"name":"CSCW '15: Computer Supported Cooperative Work and Social Computing","location":"Vancouver BC Canada","acronym":"CSCW '15","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work &amp; Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/2675133.2675256","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/2675133.2675256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:50Z","timestamp":1750227170000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/2675133.2675256"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,28]]},"references-count":53,"alternative-id":["10.1145\/2675133.2675256","10.1145\/2675133"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/2675133.2675256","relation":{},"subject":[],"published":{"date-parts":[[2015,2,28]]},"assertion":[{"value":"2015-02-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}