{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T16:42:39Z","timestamp":1772901759102,"version":"3.50.1"},"reference-count":128,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,8,14]],"date-time":"2018-08-14T00:00:00Z","timestamp":1534204800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Soc Sc"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s42001-018-0023-z","type":"journal-article","created":{"date-parts":[[2018,8,14]],"date-time":"2018-08-14T07:34:59Z","timestamp":1534232099000},"page":"391-435","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["How self-disclosure in Twitter profiles relate to anonymity consciousness and usage objectives: a cross-cultural study"],"prefix":"10.1007","volume":"1","author":[{"given":"Tomu","family":"Tominaga","sequence":"first","affiliation":[]},{"given":"Yoshinori","family":"Hijikata","sequence":"additional","affiliation":[]},{"given":"Joseph A.","family":"Konstan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,14]]},"reference":[{"key":"23_CR1","unstructured":"Ahern, S., Eckles, D., Good, N., King, S., Naaman, M., & Nair, R. (2007). Over-exposed? Privacy patterns and considerations in online and mobile photo sharing. In: Proceedings of the SIGCHI conference on human factors in computing systems (pp. 357\u2013366)."},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1016\/j.chb.2014.04.014","volume":"36","author":"Y Al-Saggaf","year":"2014","unstructured":"Al-Saggaf, Y., & Nielsen, S. (2014). Self-disclosure on Facebook among female users and its relationship to feelings of loneliness. Computers in Human Behavior, 36, 460\u2013468. https:\/\/doi.org\/10.1016\/j.chb.2014.04.014 .","journal-title":"Computers in Human Behavior"},{"key":"23_CR3","unstructured":"Altman, I. (1975). The environment and social behavior: Privacy, personal space, territory, and crowding.\u00a0Monterey: Brooks Cole."},{"key":"23_CR4","doi-asserted-by":"publisher","unstructured":"Andalibi, N., Ozturk, P., & Forte, A. (2017). Sensitive self-disclosures, responses, and social support on Instagram. In: Proceedings of the 2017 ACM conference on computer supported cooperative work and social computing (pp. 1485\u20131500). New York: ACM Press. https:\/\/doi.org\/10.1145\/2998181.2998243 .","DOI":"10.1145\/2998181.2998243"},{"issue":"4","key":"23_CR5","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/S0147-1767(98)00017-0","volume":"22","author":"A Asai","year":"1998","unstructured":"Asai, A., & Barnlund, D. C. (1998). Boundaries of the unconscious, private, and public self in Japanese and Americans: A cross-cultural comparison. International Journal of Intercultural Relations, 22(4), 431\u2013452.","journal-title":"International Journal of Intercultural Relations"},{"key":"23_CR6","doi-asserted-by":"publisher","unstructured":"Bargh, J. A., McKenna, K. Y. A., & Fitzsimons, G. M. (2002). Can you see the real me? Activation and expression of the \u201ctrue self\u201d on the internet. Journal of Social Issues, 58(1), 33\u201348. https:\/\/doi.org\/10.1111\/1540-4560.00247 .","DOI":"10.1111\/1540-4560.00247"},{"key":"23_CR7","unstructured":"Barnlund, D. C. (1989). Communicative styles of Japanese and Americans: Images and realities. Wadsworth\/Thomson Learning."},{"issue":"4","key":"23_CR8","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1111\/jcom.12106","volume":"64","author":"NN Bazarova","year":"2014","unstructured":"Bazarova, N. N., & Choi, Y. H. (2014). Self-disclosure in social media: Extending the functional approach to disclosure motivations and characteristics on social network sites. Journal of Communication, 64(4), 635\u2013657. https:\/\/doi.org\/10.1111\/jcom.12106 .","journal-title":"Journal of Communication"},{"issue":"5","key":"23_CR9","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1080\/01972240490507956","volume":"20","author":"S Bellman","year":"2004","unstructured":"Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society, 20(5), 313\u2013324.","journal-title":"The Information Society"},{"key":"23_CR10","doi-asserted-by":"publisher","unstructured":"Birnholtz, J., Merola, N. A. R., & Paul, A. (2015). Is it weird to still be a virgin: Anonymous, locally targeted questions on Facebook confession boards. In: Proceedings of the 33rd annual ACM conference on human factors in computing systems (pp. 2613\u20132622). New York: ACM Press. https:\/\/doi.org\/10.1145\/2702123.2702410 .","DOI":"10.1145\/2702123.2702410"},{"key":"23_CR11","doi-asserted-by":"publisher","DOI":"10.1162\/dmal.9780262524834.119","author":"D Boyd","year":"2007","unstructured":"Boyd, D. (2007). Why youth 3 social network sites: The role of networked publics in teenage social life. Youth, Identity, and Digital Media. https:\/\/doi.org\/10.1162\/dmal.9780262524834.119 .","journal-title":"Youth, Identity, and Digital Media"},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.chb.2013.07.059","volume":"30","author":"CW Chang","year":"2014","unstructured":"Chang, C. W., & Heo, J. (2014). Visiting theories that predict college students self-disclosure on Facebook. Computers in Human Behavior, 30, 79\u201386.","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"23_CR13","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1177\/0022022195261006","volume":"26","author":"GM Chen","year":"1995","unstructured":"Chen, G. M. (1995). Differences in self-disclosure patterns among Americans versus Chinese: A comparative study. Journal of Cross-Cultural Psychology, 26(1), 84\u201391.","journal-title":"Journal of Cross-Cultural Psychology"},{"issue":"1","key":"23_CR14","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1177\/1461444813504269","volume":"17","author":"GM Chen","year":"2015","unstructured":"Chen, G. M. (2015). Why do women bloggers use social media? Recreation and information motivations outweigh engagement motivations. New Media & Society, 17(1), 24\u201340. https:\/\/doi.org\/10.1177\/1461444813504269 .","journal-title":"New Media & Society"},{"issue":"1","key":"23_CR15","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1057\/ejis.2013.31","volume":"24","author":"R Chen","year":"2015","unstructured":"Chen, R., & Sharma, S. K. (2015). Learning and self-disclosure behavior on social networking sites: The case of Facebook users. European Journal of Information Systems, 24(1), 93\u2013106. https:\/\/doi.org\/10.1057\/ejis.2013.31 .","journal-title":"European Journal of Information Systems"},{"issue":"3","key":"23_CR16","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1080\/09720073.2016.11892151","volume":"26","author":"X Chen","year":"2016","unstructured":"Chen, X., Li, G., Hu, Y., & Li, Y. (2016). How anonymity influence self-disclosure tendency on sina weibo: An empirical study. Anthropologist, 26(3), 217\u2013226.","journal-title":"Anthropologist"},{"key":"23_CR17","doi-asserted-by":"publisher","unstructured":"Cheung, C., Lee, Z. W. Y., & Chan, T. K. H. (2015). Self-disclosure in social networking sites. In: Proceedings of the 19th ACM conference on computer-supported cooperative work & social computing (pp. 74\u201385). https:\/\/doi.org\/10.1108\/IntR-09-2013-0192 .","DOI":"10.1108\/IntR-09-2013-0192"},{"issue":"4","key":"23_CR18","doi-asserted-by":"publisher","first-page":"1337","DOI":"10.1016\/j.chb.2010.07.028","volume":"27","author":"CMK Cheung","year":"2011","unstructured":"Cheung, C. M. K., Chiu, P. Y., & Lee, M. K. O. (2011). Online social networks: Why do students use facebook? Computers in Human Behavior, 27(4), 1337\u20131343.","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"23_CR19","doi-asserted-by":"publisher","first-page":"1872","DOI":"10.1016\/j.dss.2006.04.001","volume":"42","author":"C Chiu","year":"2006","unstructured":"Chiu, C., Hsu, M., & Wang, E. (2006). Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories. Decision Support Systems, 42(3), 1872\u20131888.","journal-title":"Decision Support Systems"},{"issue":"4","key":"23_CR20","doi-asserted-by":"publisher","first-page":"2319","DOI":"10.1007\/s11135-011-9658-z","volume":"47","author":"SE Cho","year":"2013","unstructured":"Cho, S. E., & Park, H. W. (2013). A qualitative analysis of cross-cultural new media research: SNS use in Asia and the West. Quality & Quantity, 47(4), 2319\u20132330. https:\/\/doi.org\/10.1007\/s11135-011-9658-z .","journal-title":"Quality & Quantity"},{"issue":"4","key":"23_CR21","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1111\/hcre.12053","volume":"41","author":"YH Choi","year":"2015","unstructured":"Choi, Y. H., & Bazarova, N. N. (2015). Self-disclosure characteristics and motivations in social media: Extending the functional model to multiple social network sites. Human Communication Research, 41(4), 480\u2013500. https:\/\/doi.org\/10.1111\/hcre.12053 .","journal-title":"Human Communication Research"},{"issue":"3","key":"23_CR22","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1089\/cpb.2008.0226","volume":"12","author":"E Christofides","year":"2009","unstructured":"Christofides, E., Muise, A., & Desmarais, S. (2009). Information disclosure and control on Facebook: Are they two sides of the same coin or two different processes? Cyberpsychology & Behavior, 12(3), 341\u2013345.","journal-title":"Cyberpsychology & Behavior"},{"key":"23_CR23","unstructured":"Christofides, E., Muise, A., & Desmarais, S. (2010). Privacy and disclosure on Facebook: Youth and adults\u2019 information disclosure and perceptions of privacy risks. University of Guelph."},{"issue":"1","key":"23_CR24","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1177\/1948550611408619","volume":"3","author":"E Christofides","year":"2012","unstructured":"Christofides, E., Muise, A., & Desmarais, S. (2012). Hey mom, what\u2019s on your Facebook? Comparing Facebook disclosure and privacy in adolescents and adults. Social Psychological and Personality Science, 3(1), 48\u201354.","journal-title":"Social Psychological and Personality Science"},{"issue":"3","key":"23_CR25","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1037\/1099-9809.13.3.254","volume":"13","author":"NS Consedine","year":"2007","unstructured":"Consedine, N. S., Sabag-Cohen, S., & Krivoshekova, Y. S. (2007). Ethnic, gender, and socioeconomic differences in young adults\u2019 self-disclosure: Who discloses what and to whom? Cultural Diversity and Ethnic Minority Psychology, 13(3), 254\u2013263.","journal-title":"Cultural Diversity and Ethnic Minority Psychology"},{"key":"23_CR26","unstructured":"Correa, D., Silva, L.A., Mondal, M., Benevenuto, F., & Gummadi, K. P. (2015). The many shades of anonymity: Characterizing anonymous social media content. In: Proceedings of the ninth international AAAI conference on weblogs and social media (pp. 71\u201380)."},{"key":"23_CR27","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.chb.2013.12.011","volume":"32","author":"SW Davenport","year":"2014","unstructured":"Davenport, S. W., Bergman, S. M., Bergman, J. Z., & Fearrington, M. E. (2014). Twitter versus Facebook: Exploring the role of narcissism in the motives and usage of different social media platforms. Computers in Human Behavior, 32, 212\u2013220. https:\/\/doi.org\/10.1016\/j.chb.2013.12.011 .","journal-title":"Computers in Human Behavior"},{"key":"23_CR28","doi-asserted-by":"publisher","unstructured":"De Choudhury, M., Morris, M. R., & White, R. W. (2014). Seeking and sharing health information online: Comparing search engines and social media. In: Proceedings of the 32nd annual ACM conference on human factors in computing systems-CHI\u201914 (pp. 1365\u20131376). New York: ACM Press. https:\/\/doi.org\/10.1145\/2556288.2557214 .","DOI":"10.1145\/2556288.2557214"},{"key":"23_CR29","doi-asserted-by":"publisher","unstructured":"De Choudhury, M., Sharma, S. S., Logar. T., Eekhout, W., & Nielsen, R. C. (2017). Gender and cross-cultural differences in social media disclosures of mental illness. In: Proceedings of the 2017 ACM conference on computer supported cooperative work and social computing (pp. 353\u2013369). ACM Press: New York. https:\/\/doi.org\/10.1145\/2998181.2998220 .","DOI":"10.1145\/2998181.2998220"},{"issue":"5","key":"23_CR30","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1111\/jcc4.12163","volume":"21","author":"T Dienlin","year":"2016","unstructured":"Dienlin, T., & Metzger, M. J. (2016). An extended privacy calculus model for SNSs: Analyzing self-disclosure and self-withdrawal in a representative US sample. Journal of Computer-Mediated Communication, 21(5), 368\u2013383. https:\/\/doi.org\/10.1111\/jcc4.12163 .","journal-title":"Journal of Computer-Mediated Communication"},{"key":"23_CR31","unstructured":"Dimicco, J., Millen, D. R., Geyer, W., Dugan, C., Brownholtz, B., Muller, M., & Street, R. (2008). Motivations for social networking at work. In: Proceedings of the 2008 ACM conference on computer supported cooperative work (pp. 711\u2013720)."},{"issue":"1","key":"23_CR32","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61\u201380.","journal-title":"Information Systems Research"},{"issue":"5","key":"23_CR33","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1080\/0309877X.2015.1014321","volume":"40","author":"H Donelan","year":"2016","unstructured":"Donelan, H. (2016). Social media for professional development and networking opportunities in academia. Journal of Further and Higher Education, 40(5), 706\u2013729. https:\/\/doi.org\/10.1080\/0309877X.2015.1014321 .","journal-title":"Journal of Further and Higher Education"},{"key":"23_CR34","unstructured":"Dwyer, C., Hiltz, S. R., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. In: AMCIS 2007 proceedings."},{"key":"23_CR35","first-page":"1","volume":"36","author":"N Ellison","year":"2006","unstructured":"Ellison, N., Steinfield, C., & Lampe, C. (2006). Spatially bounded online social networks and social capital: The role of Facebook. International Communication Association, 36, 1\u201337.","journal-title":"International Communication Association"},{"key":"23_CR36","unstructured":"Fogg, B. J., & Iizawa, D. (2008). Online persuasion in Facebook and Mixi: A cross-cultural comparison. In: International conference on persuasive technology (pp. 35\u201346). Springer."},{"issue":"3","key":"23_CR37","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1177\/0956797611429709","volume":"23","author":"AL Forest","year":"2012","unstructured":"Forest, A. L., & Wood, J. V. (2012). When social networking is not working: Individuals with low self-esteem recognize but do not reap the benefits of self-disclosure on Facebook. Psychological Science, 23(3), 295\u2013302.","journal-title":"Psychological Science"},{"key":"23_CR38","unstructured":"Goodman, J., & Paolacci, G. (2014). Questioning the turk: Conducting high quality research with Amazon mechanical turk. In: Workshop held at the Association for Consumer Research North American Conference."},{"key":"23_CR39","unstructured":"Hall, E. T., & Hall, M. R. (1989). Understanding cultural differences. Intercultural Press."},{"key":"23_CR40","unstructured":"Harris Interactive (1999) IBM multi-national consumer privacy survey."},{"issue":"6","key":"23_CR41","doi-asserted-by":"publisher","first-page":"2134","DOI":"10.1016\/j.chb.2013.04.038","volume":"29","author":"M Hofer","year":"2013","unstructured":"Hofer, M., & Aubert, V. (2013). Perceived bridging and bonding social capital on Twitter: Differentiating between followers and followees. Computers in Human Behavior, 29(6), 2134\u20132142. https:\/\/doi.org\/10.1016\/j.chb.2013.04.038 .","journal-title":"Computers in Human Behavior"},{"key":"23_CR42","volume-title":"Culture\u2019s consequences: International differences in work-related values, vol\u00a05","author":"G Hofstede","year":"1984","unstructured":"Hofstede, G. (1984). Culture\u2019s consequences: International differences in work-related values, vol\u00a05. Beverly Hills: Sage."},{"key":"23_CR43","unstructured":"Hofstede, G. (2016). Greet Hofstede analysis."},{"key":"23_CR44","unstructured":"Hofstede, G., Hofstede, G. J., & Minkov, M. (2010). Cultures and organizations: Software of the mind, third edition. McGraw-Hill Education."},{"issue":"1\u20132","key":"23_CR45","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1089\/cyber.2009.0403","volume":"14","author":"EE Hollenbaugh","year":"2011","unstructured":"Hollenbaugh, E. E. (2011). Motives for maintaining personal journal blogs. Cyberpsychology, Behavior, and Social Networking, 14(1\u20132), 13\u201320.","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"key":"23_CR46","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.chb.2013.07.055","volume":"30","author":"EE Hollenbaugh","year":"2014","unstructured":"Hollenbaugh, E. E., & Ferris, A. L. (2014). Facebook self-disclosure: Examining the role of traits, social cohesion, and motives. Computers in Human Behavior, 30, 50\u201358.","journal-title":"Computers in Human Behavior"},{"key":"23_CR47","unstructured":"House, R. J., & Javidan, M. (2004). Overview of globe. In: Culture, leadership, and organizations: The GLOBE study of 62 societies (pp. 9\u201328). SAGE Publications."},{"issue":"1","key":"23_CR48","doi-asserted-by":"publisher","first-page":"111","DOI":"10.2501\/S0265048709201051","volume":"29","author":"RJ House","year":"2010","unstructured":"House, R. J., Quigley, N. R., & de Luque, M. S. (2010). Insights from project globe: Extending global advertising research through a contemporary framework. International Journal of Advertising, 29(1), 111\u2013139.","journal-title":"International Journal of Advertising"},{"issue":"3","key":"23_CR49","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1016\/j.chb.2012.11.024","volume":"29","author":"LA Jackson","year":"2013","unstructured":"Jackson, L. A., & Wang, J. L. (2013). Cultural differences in social networking site use: A comparative study of China and the United States. Computers in Human Behavior, 29(3), 910\u2013921. https:\/\/doi.org\/10.1016\/j.chb.2012.11.024 .","journal-title":"Computers in Human Behavior"},{"key":"23_CR50","unstructured":"Java, A., Song, X., Finin, T., & Tseng, B. (2007). Why we Twitter: Understanding microblogging usage and communities. In: Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on web mining and social network analysis (pp. 56\u201365). ACM."},{"issue":"11\u201312","key":"23_CR51","doi-asserted-by":"publisher","first-page":"1100","DOI":"10.1080\/10447318.2010.516727","volume":"26","author":"YG Ji","year":"2010","unstructured":"Ji, Y. G., Hwangbo, H., Yi, J. S., Rau, P. L. P., Fang, X., & Ling, C. (2010). The influence of cultural differences on the use of social network services and the formation of social capital. International Journal of Human\u2013Computer Interaction, 26(11\u201312), 1100\u20131121. https:\/\/doi.org\/10.1080\/10447318.2010.516727 .","journal-title":"International Journal of Human\u2013Computer Interaction"},{"key":"23_CR52","unstructured":"Joinson, A. N. (2007). Disinhibition and the internet. In:\u00a0Psychology and the internet (second edition)\u00a0(pp. 75\u201392)."},{"key":"23_CR53","unstructured":"Joinson, A. N. (2008). Looking at, looking up or keeping up with people? Motives and uses of Facebook. In: Proceedings of the SIGCHI conference on human factors in computing systems, ACM (pp. 1027\u20131036). ACM."},{"key":"23_CR54","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1093\/oxfordhb\/9780199561803.001.0001","volume-title":"Self-disclosure, privacy and the internet. Oxford handbook of Iiternet psychology","author":"AN Joinson","year":"2012","unstructured":"Joinson, A. N., & Paine, C. B. (2012). Self-disclosure, privacy and the internet. Oxford handbook of Iiternet psychology (pp. 235\u2013250). Oxford: Oxford University Press."},{"issue":"1","key":"23_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/07370020903586662","volume":"25","author":"AN Joinson","year":"2010","unstructured":"Joinson, A. N., Reips, U. D., Buchanan, T., & Schofield, C. B. P. (2010). Privacy, trust, and self-disclosure online. Human\u2013Computer Interaction, 25(1), 1\u201324.","journal-title":"Human\u2013Computer Interaction"},{"key":"23_CR56","doi-asserted-by":"publisher","unstructured":"Kang, R., Brown, S., & Kiesler, S. (2013). Why do people seek anonymity on the internet? In: Proceedings of the SIGCHI conference on human factors in computing systems (pp. 2657\u20132666). New York: ACM Press. https:\/\/doi.org\/10.1145\/2470654.2481368 .","DOI":"10.1145\/2470654.2481368"},{"key":"23_CR57","unstructured":"Kang, R., Brown, S., Dabbish, L., & Kiesler, S. (2014). Privacy attitudes of mechanical turk workers and the U.S. public. In: SOUPS \u201914: Proceedings of the tenth symposium on usable privacy and security (pp. 37\u201349)."},{"key":"23_CR58","doi-asserted-by":"publisher","unstructured":"Kang, R., Dabbish, L. A., & Sutton, K. (2016). Strangers on your phone: Why people use anonymous communication applications. In: Proceedings of the 19th ACM conference on computer-supported cooperative work & social computing (pp. 359\u2013370). New York: ACM Press. https:\/\/doi.org\/10.1145\/2818048.2820081 .","DOI":"10.1145\/2818048.2820081"},{"issue":"6","key":"23_CR59","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1080\/1369118X.2014.991342","volume":"18","author":"T Keipi","year":"2015","unstructured":"Keipi, T., Oksanen, A., & R\u00e4s\u00e4nen, P. (2015). Who prefers anonymous self-expression online? A survey-based study of Finns aged 15\u201330 years. Information, Communication & Society, 18(6), 717\u2013732. https:\/\/doi.org\/10.1080\/1369118X.2014.991342 .","journal-title":"Information, Communication & Society"},{"issue":"1","key":"23_CR60","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/j.chb.2010.08.015","volume":"27","author":"Y Kim","year":"2011","unstructured":"Kim, Y., Sohn, D., & Choi, S. M. (2011). Cultural difference in motivations for using social network sites: A comparative study of American and Korean college students. Computers in Human Behavior, 27(1), 365\u2013372.","journal-title":"Computers in Human Behavior"},{"key":"23_CR61","unstructured":"Krasnova, H., Kolesnikova, E., Guenther, O., & G\u00fcnther, O. (2009). It won\u2019t happen to me: Self-disclosure in online social networks. In: Amcis 2009 proceedings (p. 343)."},{"issue":"2","key":"23_CR62","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1057\/jit.2010.6","volume":"25","author":"H Krasnova","year":"2010","unstructured":"Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. Journal of Information Technology, 25(2), 109\u2013125.","journal-title":"Journal of Information Technology"},{"issue":"3","key":"23_CR63","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s12599-012-0216-6","volume":"4","author":"H Krasnova","year":"2012","unstructured":"Krasnova, H., Veltri, N. F., & G\u00fcnther, O. (2012). Self-disclosure and privacy calculus on social networking sites: The role of culture. Business and Information Systems Engineering, 4(3), 127\u2013135.","journal-title":"Business and Information Systems Engineering"},{"key":"23_CR64","unstructured":"Kumaraguru, P., & Cranor, L. (2005). Privacy in India: Attitudes and awareness. In: International workshop on privacy enhancing technologies (pp. 243\u2013258). Springer."},{"key":"23_CR65","unstructured":"Kwak, H., Lee, C., Park, H., & Moon, S. (2010). What is Twitter, a social network or a news media? In: Proceedings of the 19th international conference on world wide web (pp. 591\u2013600). ACM."},{"issue":"9","key":"23_CR66","doi-asserted-by":"publisher","first-page":"1454","DOI":"10.1177\/1461444814528294","volume":"17","author":"CY Lai","year":"2014","unstructured":"Lai, C. Y., & Yang, H. L. (2014). Determinants of individuals\u2019 self-disclosure and instant information sharing behavior in micro-blogging. New Media & Society, 17(9), 1454\u20131472. https:\/\/doi.org\/10.1177\/1461444814528294 .","journal-title":"New Media & Society"},{"key":"23_CR67","unstructured":"Lampe, C., Ellison, N., & Steinfield, C. (2006). A Face(book) in the crowd: Social searching vs. social browsing. In: Proceedings of the 2006 20th anniversary conference on computer supported cooperative work (pp. 167\u2013170). ACM."},{"issue":"12","key":"23_CR68","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1080\/10810730.2014.904022","volume":"19","author":"HR Lee","year":"2014","unstructured":"Lee, H. R., Lee, H. E., Choi, J., Kim, J. H., & Han, H. L. (2014). Social media use, body image, and psychological well-being: A cross-cultural comparison of Korea and the United States. Journal of Health Communication, 19(12), 1343\u20131358. https:\/\/doi.org\/10.1080\/10810730.2014.904022 .","journal-title":"Journal of Health Communication"},{"key":"23_CR69","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3389\/fpsyg.2016.00376","volume":"7","author":"SL Lee","year":"2016","unstructured":"Lee, S. L., Kim, J. A., Golden, K. J., Kim, J. H., & Park, M. S. A. (2016). A cross-cultural examination of SNS usage intensity and managing interpersonal relationships online: The role of culture and the autonomous-related self-construal. Frontiers in Psychology, 7, 1\u201312. https:\/\/doi.org\/10.3389\/fpsyg.2016.00376 .","journal-title":"Frontiers in Psychology"},{"issue":"1","key":"23_CR70","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.chb.2013.10.016","volume":"31","author":"I Leftheriotis","year":"2014","unstructured":"Leftheriotis, I., & Giannakos, M. N. (2014). Using social media for work: Losing your time or improving your work? Computers in Human Behavior, 31(1), 134\u2013142. https:\/\/doi.org\/10.1016\/j.chb.2013.10.016 .","journal-title":"Computers in Human Behavior"},{"issue":"6","key":"23_CR71","doi-asserted-by":"publisher","first-page":"2945","DOI":"10.1016\/j.chb.2008.05.002","volume":"24","author":"CC Lewis","year":"2008","unstructured":"Lewis, C. C., & George, J. F. (2008). Cross-cultural deception in social networking sites and face-to-face communication. Computers in Human Behavior, 24(6), 2945\u20132964.","journal-title":"Computers in Human Behavior"},{"issue":"3","key":"23_CR72","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1016\/j.chb.2010.12.009","volume":"27","author":"KY Lin","year":"2011","unstructured":"Lin, K. Y., & Lu, H. P. (2011). Why people use social networking sites: An empirical study integrating network externalities and motivation theory. Computers in Human Behavior, 27(3), 1152\u20131161.","journal-title":"Computers in Human Behavior"},{"key":"23_CR73","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.chb.2017.01.012","volume":"70","author":"R Lin","year":"2017","unstructured":"Lin, R., & Utz, S. (2017). Self-disclosure on SNS: Do disclosure intimacy and narrativity influence interpersonal closeness and social attraction? Computers in Human Behavior, 70, 426\u2013436. https:\/\/doi.org\/10.1016\/j.chb.2017.01.012 .","journal-title":"Computers in Human Behavior"},{"key":"23_CR74","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.chb.2014.06.003","volume":"38","author":"D Liu","year":"2014","unstructured":"Liu, D., & Brown, B. B. (2014). Self-disclosure on social networking sites, positive feedback, and social capital among Chinese college students. Computers in Human Behavior, 38, 213\u2013219. https:\/\/doi.org\/10.1016\/j.chb.2014.06.003 .","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"23_CR75","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.im.2015.08.006","volume":"53","author":"Z Liu","year":"2016","unstructured":"Liu, Z., Min, Q., Zhai, Q., & Smyth, R. (2016). Self-disclosure in Chinese micro-blogging: A social exchange theory perspective. Information & Management, 53(1), 53\u201363. https:\/\/doi.org\/10.1016\/j.im.2015.08.006 .","journal-title":"Information & Management"},{"key":"23_CR76","unstructured":"Ma, X., Hancock, J., & Naaman, M. (2016). Anonymity, intimacy and self-disclosure in social media. In: Proceedings of the SIGCHI conference on human factors in computing systems (pp. 3857\u20133869)."},{"issue":"4","key":"23_CR77","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"NK Malhotra","year":"2004","unstructured":"Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336\u2013355.","journal-title":"Information Systems Research"},{"issue":"3","key":"23_CR78","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1111\/j.1540-4560.1977.tb01879.x","volume":"33","author":"ST Margulis","year":"1977","unstructured":"Margulis, S. T. (1977). Conceptions of privacy: Current status and next steps. Journal of Social Issues, 33(3), 5\u201321. https:\/\/doi.org\/10.1111\/j.1540-4560.1977.tb01879.x .","journal-title":"Journal of Social Issues"},{"key":"23_CR79","unstructured":"Margulis, S. T. (2011). Three theories of privacy: An overview. In: Privacy online: Perspectives on privacy and self-disclosure in the social web, Chap 2 (pp. 9\u201317). Springer."},{"issue":"1","key":"23_CR80","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1177\/1461444810365313","volume":"13","author":"AE Marwick","year":"2011","unstructured":"Marwick, A. E., & Boyd, D. (2011). I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society, 13(1), 114\u2013133. https:\/\/doi.org\/10.1177\/1461444810365313 .","journal-title":"New Media & Society"},{"issue":"2","key":"23_CR81","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1080\/019722499128565","volume":"15","author":"GT Marx","year":"1999","unstructured":"Marx, G. T. (1999). What\u2019s in a name? Some reflections on the sociology of anonymity. The Information Society, 15(2), 99\u2013112. https:\/\/doi.org\/10.1080\/019722499128565 .","journal-title":"The Information Society"},{"issue":"1","key":"23_CR82","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/2056305116634368","volume":"2","author":"PK Masur","year":"2016","unstructured":"Masur, P. K., & Scharkow, M. (2016). Disclosure management on social network sites: Individual privacy perceptions and user-directed privacy strategies. Social Media + Society, 2(1), 1\u201313. https:\/\/doi.org\/10.1177\/2056305116634368 .","journal-title":"Social Media + Society"},{"issue":"1","key":"23_CR83","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1002\/(SICI)1522-7138(199624)10:1<34::AID-DIR3>3.0.CO;2-0","volume":"10","author":"ML Maynard","year":"1996","unstructured":"Maynard, M. L., & Taylor, C. R. (1996). A comparative analysis of Japanese and US attitudes toward direct marketing. Journal of Direct Marketing, 10(1), 34\u201344.","journal-title":"Journal of Direct Marketing"},{"issue":"3","key":"23_CR84","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/S0963-8687(02)00020-3","volume":"11","author":"DH Mcknight","year":"2002","unstructured":"Mcknight, D. H., Choudhury, V., & Kacmar, C. (2002). The impact of initial customer trust on intentions to transact with web site: A trust building model. Journal of Strategic Information Systems, 11(3), 297\u2013323.","journal-title":"Journal of Strategic Information Systems"},{"issue":"1","key":"23_CR85","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1287\/orsc.11.1.35.12567","volume":"11","author":"SJ Milberg","year":"2000","unstructured":"Milberg, S. J., Smith, H. J., & Burke, S. J. (2000). Information privacy: Corporate management and national regulation. Organization Science, 11(1), 35\u201357.","journal-title":"Organization Science"},{"issue":"2","key":"23_CR86","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s00146-007-0143-0","volume":"23","author":"H Morio","year":"2009","unstructured":"Morio, H., & Buchholz, C. (2009). How anonymous are you online? Examining online social behaviors from a cross-cultural perspective. AI & Society, 23(2), 297\u2013307.","journal-title":"AI & Society"},{"issue":"2","key":"23_CR87","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1111\/j.1468-2958.1986.tb00101.x","volume":"13","author":"M Nakanishi","year":"1986","unstructured":"Nakanishi, M. (1986). Perceptions of self-disclosure in initial interaction: A Japanese sample. Human Communication Research, 13(2), 167\u2013190.","journal-title":"Human Communication Research"},{"key":"23_CR88","unstructured":"Nakayama, M. (2014). The present and future of Yahoo!. Crowd sourcing (only in Japanese). Technical Report."},{"issue":"2","key":"23_CR89","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1002\/dir.20077","volume":"21","author":"S Nambisan","year":"2007","unstructured":"Nambisan, S., & Baron, R. A. (2007). Interactions in virtual customer environments: Implications for product support and customer relationship management. Journal of Interactive Marketing, 21(2), 42\u201362.","journal-title":"Journal of Interactive Marketing"},{"issue":"10","key":"23_CR90","doi-asserted-by":"publisher","first-page":"e110171","DOI":"10.1371\/journal.pone.0110171","volume":"9","author":"JA Naslund","year":"2014","unstructured":"Naslund, J. A., Grande, S. W., Aschbrenner, K. A., & Elwyn, G. (2014). Naturally occurring peer support through social media: The experiences of individuals with severe mental illness using YouTube. PLoS One, 9(10), e110171\u2013e110171. https:\/\/doi.org\/10.1371\/journal.pone.0110171 .","journal-title":"PLoS One"},{"key":"23_CR91","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.chb.2014.12.012","volume":"45","author":"L Nemec Zlatolas","year":"2015","unstructured":"Nemec Zlatolas, L., Welzer, T., Heri\u010dko, M., & H\u00f6lbl, M. (2015). Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior, 45, 158\u2013167. https:\/\/doi.org\/10.1016\/j.chb.2014.12.012 .","journal-title":"Computers in Human Behavior"},{"issue":"10","key":"23_CR92","doi-asserted-by":"publisher","first-page":"2045","DOI":"10.1002\/asi.23320","volume":"66","author":"S Oh","year":"2015","unstructured":"Oh, S., & Syn, S. Y. (2015). Motivations for sharing information and social support in social media: A comparative analysis of Facebook, Twitter, Delicious, YouTube, and Flickr. Journal of the Association for Information Science and Technology, 66(10), 2045\u20132060. https:\/\/doi.org\/10.1002\/asi.23320 .","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"2","key":"23_CR93","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1177\/1750481312437441","volume":"6","author":"R Page","year":"2012","unstructured":"Page, R. (2012). The linguistics of self-branding and micro-celebrity in Twitter: The role of hashtags. Discourse & Communication, 6(2), 181\u2013201.","journal-title":"Discourse & Communication"},{"issue":"3","key":"23_CR94","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1177\/0963721414531598","volume":"23","author":"G Paolacci","year":"2014","unstructured":"Paolacci, G., & Chandler, J. (2014). Inside the turk: Understanding mechanical turk as a participant pool. Current Directions in Psychological Science, 23(3), 184\u2013188. https:\/\/doi.org\/10.1177\/0963721414531598 .","journal-title":"Current Directions in Psychological Science"},{"key":"23_CR95","unstructured":"Patil, S., & Lai, J. (2005). Who gets to know what when: Configuring privacy permissions in an awareness application. In: Proceedings of the SIGCHI conference on human factors in computing systems (pp. 101\u2013110). New York: ACM."},{"key":"23_CR96","unstructured":"Peddinti, S. T., Ross, K. W., & Cappos, J. (2014). On the internet, nobody knows you\u2019re a dog: A Twitter case study of anonymity in social networks. In: Proceedings of the second ACM conference on online social networks (pp. 83\u201393). ACM."},{"key":"23_CR97","unstructured":"Peterson, K., & Siek, K. A. (2009). Analysis of information disclosure on a social networking site. In: International conference on online communities and social computing (pp. 256\u2013264). Springer."},{"key":"23_CR98","doi-asserted-by":"crossref","unstructured":"Petronio, S., & Altman, I. (2002). Boundaries of privacy: Dialectics of disclosure. Suny Press.","DOI":"10.1353\/book4588"},{"issue":"4","key":"23_CR99","doi-asserted-by":"publisher","first-page":"1428","DOI":"10.1111\/j.1083-6101.2007.00380.x","volume":"12","author":"H Qian","year":"2007","unstructured":"Qian, H., & Scott, C. R. (2007). Anonymity and self-disclosure on weblogs. Journal of Computer-Mediated Communication, 12(4), 1428\u20131451.","journal-title":"Journal of Computer-Mediated Communication"},{"key":"23_CR100","unstructured":"Rainie, L., Kiesler, S., Kang, R., Madden, M., Duggan, M., Brown, S., et al. (2013). Anonymity, privacy, and security online. Pew Research Center, 5."},{"key":"23_CR101","volume-title":"Cross-cultural management: A transactional approach","author":"BJ Reagon","year":"2013","unstructured":"Reagon, B. J. (2013). Introducing and critiquing national, societal and regional culture frameworks. In T. Patel (Ed.), Cross-cultural management: A transactional approach, Chap\u00a03 (pp. 37\u201358). London: Routledge."},{"key":"23_CR102","unstructured":"Reed, P. J., Spiro, E. S., & Butts, C. T. (2015). Using Facebook data to examine culture and self-disclosure behaviors. In: iConference 2015 proceedings."},{"key":"23_CR103","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.ssresearch.2016.04.022","volume":"59","author":"PJ Reed","year":"2016","unstructured":"Reed, P. J., Spiro, E. S., & Butts, C. T. (2016). Thumbs up for privacy? Differences in online self-disclosure behavior across national cultures. Social Science Research, 59, 155\u2013170. https:\/\/doi.org\/10.1016\/j.ssresearch.2016.04.022 .","journal-title":"Social Science Research"},{"issue":"1","key":"23_CR104","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.chb.2012.07.022","volume":"29","author":"J Rui","year":"2013","unstructured":"Rui, J., & Stefanone, M. A. (2013). Strategic self-presentation online: A cross-cultural study. Computers in Human Behavior, 29(1), 110\u2013118. https:\/\/doi.org\/10.1016\/j.chb.2012.07.022 .","journal-title":"Computers in Human Behavior"},{"issue":"2","key":"23_CR105","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"HJ Smith","year":"1996","unstructured":"Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals\u2019 concerns about organizational practices. MIS Quarterly, 20(2), 167\u2013196.","journal-title":"MIS Quarterly"},{"issue":"2","key":"23_CR106","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1016\/j.chb.2011.11.008","volume":"28","author":"WP Special","year":"2012","unstructured":"Special, W. P., & Li-Barber, K. T. (2012). Self-disclosure and student satisfaction with Facebook. Computers in Human Behavior, 28(2), 624\u2013630.","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"23_CR107","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1016\/j.smr.2013.11.004","volume":"17","author":"C Stavros","year":"2014","unstructured":"Stavros, C., Meng, M. D., Westberg, K., & Farrelly, F. (2014). Understanding fan motivation for interacting on social media. Sport Management Review, 17(4), 455\u2013469. https:\/\/doi.org\/10.1016\/j.smr.2013.11.004 .","journal-title":"Sport Management Review"},{"key":"23_CR108","doi-asserted-by":"publisher","unstructured":"Stuart, H. C., Dabbish, L., Kiesler, S., Kinnaird, P., & Kang, R. (2012). Social transparency in networked information exchange: A framework and research question. In: Proceedings of the ACM 2012 conference on computer supported cooperative work (pp. 451\u2013460). New York: ACM Press. https:\/\/doi.org\/10.1145\/2145204.2145275 .","DOI":"10.1145\/2145204.2145275"},{"key":"23_CR109","unstructured":"Stutzman, F., Vitak, J., Ellison, N. B., Gray, R., & Lampe, C. (2012). Privacy in interaction: Exploring disclosure and social capital in Facebook. In: Proceedings of the sixth international AAAI conference on weblogs and social media (pp. 330\u2013337)."},{"issue":"1","key":"23_CR110","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/0147-1767(91)90072-O","volume":"15","author":"S Ting-Toomey","year":"1991","unstructured":"Ting-Toomey, S. (1991). Intimacy expressions in three cultures: France, Japan, and the United States. International Journal of Intercultural Relations, 15(1), 29\u201346.","journal-title":"International Journal of Intercultural Relations"},{"key":"23_CR111","unstructured":"Trepte, S., & Masur, P. K. (2016). Cultural differences in social media use, privacy, and self-disclosure. Research report on a multicultural survey study. Technical Report."},{"key":"23_CR112","unstructured":"Tsai, J. Y., Kelley, P., Drielsma, P., Cranor, L. F., Hong, J., & Sadeh, N. (2009). Who\u2019s viewed you? The impact of feedback in a mobile location-sharing application. In: Proceedings of the SIGCHI conference on human factors in computing systems (pp. 2003\u20132012)."},{"key":"23_CR113","unstructured":"Tsai, J. Y., Kelley, P. G., Cranor, L. F., & Sadeh, N. (2010). Location-sharing technologies: Privacy risks and controls. In: Research conference on communication, information and internet policy (TPRC), vol\u00a06. (pp. 119\u2013151)."},{"key":"23_CR114","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816660731","author":"M Tsay-Vogel","year":"2016","unstructured":"Tsay-Vogel, M., Shanahan, J., & Signorielli, N. (2016). Social media cultivating perceptions of privacy: A 5-year analysis of privacy attitudes and self-disclosure behaviors among Facebook users. New Media & Society. https:\/\/doi.org\/10.1177\/1461444816660731 .","journal-title":"New Media & Society"},{"issue":"1","key":"23_CR115","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1057\/palgrave.jibs.8400331","volume":"39","author":"RL Tung","year":"2008","unstructured":"Tung, R. L. (2008). The cross-cultural research imperative: The need to balance cross-national and intra-national diversity. Journal of International Business Studies, 39(1), 41\u201346. https:\/\/doi.org\/10.1057\/palgrave.jibs.840033 .","journal-title":"Journal of International Business Studies"},{"issue":"4","key":"23_CR116","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1111\/j.1083-6101.2009.01474.x","volume":"14","author":"S Valenzuela","year":"2009","unstructured":"Valenzuela, S., Park, N., & Kee, K. F. (2009). Is there social capital in a social network site? Facebook use and college students\u2019 life satisfaction, trust, and participation. Journal of Computer-Mediated Communication, 14(4), 875\u2013901. https:\/\/doi.org\/10.1111\/j.1083-6101.2009.01474.x .","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"1","key":"23_CR117","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2224\/sbp.2015.43.1.1","volume":"43","author":"K Varnali","year":"2015","unstructured":"Varnali, K., & Toker, A. (2015). Self-disclosure on social networking sites. Social Behavior and Personality, 43(1), 1\u201314. https:\/\/doi.org\/10.2224\/sbp.2015.43.1.1 .","journal-title":"Social Behavior and Personality"},{"issue":"10","key":"23_CR118","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1016\/j.ijhcs.2010.06.002","volume":"68","author":"A Vasalou","year":"2010","unstructured":"Vasalou, A., Joinson, A. N., & Courvoisier, D. (2010). Cultural differences, experience with social networks and the nature of \u201ctrue commitment\" in Facebook. International Journal of Human\u2013Computer Studies, 68(10), 719\u2013728.","journal-title":"International Journal of Human\u2013Computer Studies"},{"issue":"1","key":"23_CR119","doi-asserted-by":"publisher","first-page":"article 3","DOI":"10.5817\/CP2012-1-3","volume":"6","author":"M Walrave","year":"2012","unstructured":"Walrave, M., Vanwesenbeeck, I., & Heirman, W. (2012). Connecting and protecting? Comparing predictors of self-disclosure and privacy settings use between adolescents and adults. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 6(1), article 3. https:\/\/doi.org\/10.5817\/CP2012-1-3","journal-title":"Cyberpsychology: Journal of Psychosocial Research on Cyberspace"},{"key":"23_CR120","doi-asserted-by":"publisher","unstructured":"Wang, Y. C., Burke, M., & Kraut, R. E. (2016). Modeling self-disclosure in social networking sites. In: Proceedings of the 19th ACM conference on computer-supported cooperative work & social computing (pp. 74\u201385). New York: ACM Press. https:\/\/doi.org\/10.1145\/2818048.2820010 .","DOI":"10.1145\/2818048.2820010"},{"issue":"1","key":"23_CR121","first-page":"166","volume":"25","author":"AF Westin","year":"1968","unstructured":"Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25(1), 166.","journal-title":"Washington and Lee Law Review"},{"issue":"2","key":"23_CR122","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1111\/j.1468-2958.1978.tb00604.x","volume":"4","author":"LR Wheeless","year":"1978","unstructured":"Wheeless, L. R. (1978). A follow-up study of the relationships among trust, disclosure, and interpersonal solidarity. Human Communication Research, 4(2), 143\u2013157.","journal-title":"Human Communication Research"},{"key":"23_CR123","unstructured":"World Bank (2015). Data. http:\/\/data.worldbank.org\/ . Accessed 29 July 2015."},{"key":"23_CR124","unstructured":"Wu, S., Hofman, J. M., Mason, W. A., & Watts, D. J. (2011). Who says what to whom on Twitter. In: Proceedings of the 20th international conference on world wide web (pp. 705\u2013714). ACM."},{"key":"23_CR125","unstructured":"Yang, J., Morris, M. R., Teevan, J., Adamic, L. A., & Ackerman, M. S. (2011). Culture matters: A survey study of social Q&A behavior. In: Proceedings of the fifth international AAAI conference on weblogs and social media (pp. 409\u2013416)."},{"key":"23_CR126","unstructured":"Zhang, K., & Kizilcec, F. (2014). Anonymity in social media: Effects of content controversiality and social endorsement on sharing behavior. In: Proceedings of the eighth International AAAI conference on weblogs and social media (pp. 643\u2013646)."},{"key":"23_CR127","doi-asserted-by":"publisher","unstructured":"Zhao, C., & Jiang, G. (2011). Cultural differences on visual self-presentation through social networking site profile images. In: Proceedings of the 2011 annual conference on human factors in computing systems (pp. 1129\u20131132). New York: ACM Press. https:\/\/doi.org\/10.1145\/1978942.1979110 .","DOI":"10.1145\/1978942.1979110"},{"key":"23_CR128","unstructured":"Zhao, D., & Rosson, M. B. (2009). How and why people Twitter: The role that micro-blogging plays in informal communication at work. In: Proceedings of the ACM 2009 international conference on supporting group work (pp. 243\u2013252)."}],"container-title":["Journal of Computational Social Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42001-018-0023-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42001-018-0023-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42001-018-0023-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T10:06:23Z","timestamp":1693821983000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42001-018-0023-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,14]]},"references-count":128,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["23"],"URL":"https:\/\/doi.org\/10.1007\/s42001-018-0023-z","relation":{},"ISSN":["2432-2717","2432-2725"],"issn-type":[{"value":"2432-2717","type":"print"},{"value":"2432-2725","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,14]]},"assertion":[{"value":"7 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 July 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}