{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T02:38:52Z","timestamp":1768617532738,"version":"3.49.0"},"reference-count":101,"publisher":"Informa UK Limited","issue":"23","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1080\/10447318.2023.2278933","type":"journal-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T07:51:18Z","timestamp":1700553078000},"page":"8202-8218","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Recommendations with Benefits: Exploring Explanations in Information Sharing Recommender Systems for Temporary Teams"],"prefix":"10.1080","volume":"40","author":[{"given":"Geoff","family":"Musick","sequence":"first","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7785-5996","authenticated-orcid":false,"given":"Allyson I.","family":"Hauptman","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Christopher","family":"Flathmann","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Nathan J.","family":"McNeese","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Bart P.","family":"Knijnenburg","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]}],"member":"301","published-online":{"date-parts":[[2023,11,20]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206320969787"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2019.2942288"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8551.2012.00810.x"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.08.001"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00065"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-010-0346-0"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/ajps.12081"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.2307\/1130287"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00749745"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.08.031"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1108\/09513570910966379"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/0024-6301(95)00008-7"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511047.3538032"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8721.ep10773005"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503252.3531304"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.330153"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3569452"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/00221546.2000.11780816"},{"key":"e_1_3_2_20_1","first-page":"221","article-title":"Shared mental models in expert team decision making","volume":"221","author":"Converse S.","year":"1993","unstructured":"Converse, S., Cannon-Bowers, J., & Salas, E. (1993). Shared mental models in expert team decision making. Individual and group decision making: Current issues, 221, 221\u2013246.","journal-title":"Individual and group decision making: Current issues"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10869-016-9481-6"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/104649640003100304"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.2307\/2393856"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-017-9299-4"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.12.143"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.12.007"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2022.101195"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1749-6632.1999.tb08349.x"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376654"},{"key":"e_1_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/27636.27640"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359250"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358995"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.02.002"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102746"},{"key":"e_1_3_2_35_1","volume-title":"Structural equation modeling: Concepts, issues, and applications","author":"Hoyle R. H.","year":"1995","unstructured":"Hoyle, R. H. (1995). Structural equation modeling: Concepts, issues, and applications. Sage."},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72079-9_20"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21565-1_32"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jrp.2014.05.003"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106260"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858402"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/014920639402000206"},{"key":"e_1_3_2_42_1","volume-title":"A user-tailored approach to privacy decision support","author":"Knijnenburg B. P.","year":"2015","unstructured":"Knijnenburg, B. P. (2015). A user-tailored approach to privacy decision support. University of California."},{"key":"e_1_3_2_43_1","first-page":"367","volume-title":"Modern socio-technical perspectives on privacy","author":"Knijnenburg B. P.","year":"2021","unstructured":"Knijnenburg, B. P., Anaraky, R. G., Wilkinson, D., Namara, M., He, Y., Cherry, D., & Ash, E. (2021). User-tailored privacy. In Modern socio-technical perspectives on privacy (pp. 367\u2013393). Springer International Publishing."},{"key":"e_1_3_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499670"},{"key":"e_1_3_2_45_1","volume-title":"ICIS","author":"Knijnenburg B. P.","year":"2014","unstructured":"Knijnenburg, B. P., & Kobsa, A. (2014). Increasing sharing tendency without reducing satisfaction: Finding the best privacy-settings user interface for social networks. In ICIS."},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.06.003"},{"key":"e_1_3_2_47_1","unstructured":"Komiak S. Y. X. (2003). [The impact of internalization and familiarity on trust and adoption of recommendation agents] [PhD thesis]. University of British Columbia."},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301275.3302306"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1002\/TRTR.1210"},{"key":"e_1_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2009.89"},{"key":"e_1_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3565480"},{"key":"e_1_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11135-020-00990-y"},{"key":"e_1_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819979"},{"key":"e_1_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1177\/1052562904271199"},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23614"},{"key":"e_1_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3450613.3456829"},{"key":"e_1_3_2_57_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206309356804"},{"key":"e_1_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387166"},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1089\/109493104323024410"},{"key":"e_1_3_2_60_1","volume-title":"Proceedings of the 56th Hawaii International Conference on System Sciences","author":"Musick G.","year":"2023","unstructured":"Musick, G., Schelble, B. G., Mallick, R., & McNeese, N. J. (2023). Selective sharing is caring: Toward the design of a collaborative tool to facilitate team sharing. In Proceedings of the 56th Hawaii International Conference on System Sciences."},{"key":"e_1_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379336.3381489"},{"key":"e_1_3_2_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-023-09375-w"},{"key":"e_1_3_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213586.3225231"},{"key":"e_1_3_2_64_1","first-page":"59","volume-title":"International Conference on Human\u2013Computer Interaction","author":"Nothdurft F.","year":"2013","unstructured":"Nothdurft, F., Heinroth, T., & Minker, W. (2013). The impact of explanation dialogues on human\u2013computer trust. In International Conference on Human\u2013Computer Interaction (pp. 59\u201367). Springer."},{"key":"e_1_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbef.2017.12.004"},{"key":"e_1_3_2_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115386"},{"key":"e_1_3_2_67_1","doi-asserted-by":"publisher","DOI":"10.2307\/255985"},{"key":"e_1_3_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/245108.245121"},{"key":"e_1_3_2_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7637-6_1"},{"key":"e_1_3_2_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-007-9070-3"},{"key":"e_1_3_2_71_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.100.3.349"},{"key":"e_1_3_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998300"},{"key":"e_1_3_2_73_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22314"},{"key":"e_1_3_2_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.05.041"},{"key":"e_1_3_2_75_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)CO.1943-7862.0000331"},{"key":"e_1_3_2_76_1","doi-asserted-by":"publisher","DOI":"10.1115\/DETC2018-85888"},{"key":"e_1_3_2_77_1","doi-asserted-by":"publisher","DOI":"10.21278\/idc.2018.0508"},{"key":"e_1_3_2_78_1","unstructured":"Stray J. Halevy A. Assar P. Hadfield-Menell D. Boutilier C. Ashar A. Beattie L. Ekstrand M. Leibowicz C. Sehat C. M. (2022). Building human values into recommender systems: An interdisciplinary synthesis. arXiv preprint arXiv:2207.10192."},{"key":"e_1_3_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639777"},{"key":"e_1_3_2_80_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1754-9434.2011.01396.x"},{"key":"e_1_3_2_81_1","doi-asserted-by":"publisher","DOI":"10.1037\/t02326-000"},{"key":"e_1_3_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297231.1297275"},{"key":"e_1_3_2_83_1","first-page":"54","volume-title":"UCDEAS workshop associated with UMAP","author":"Tintarev N.","year":"2009","unstructured":"Tintarev, N., & Masthoff, J. (2009). Evaluating recommender explanations: Problems experienced and lessons learned for the evaluation of adaptive systems. In UCDEAS workshop associated with UMAP (pp. 54\u201363). CEUR-WS."},{"key":"e_1_3_2_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-85820-3_15"},{"key":"e_1_3_2_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-011-9117-5"},{"key":"e_1_3_2_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320435.3320437"},{"key":"e_1_3_2_87_1","first-page":"119","article-title":"Location-sharing technologies: Privacy risks and controls","volume":"6","author":"Tsai J. Y.","year":"2010","unstructured":"Tsai, J. Y., Kelley, P. G., Cranor, L. F., & Sadeh, N. (2010). Location-sharing technologies: Privacy risks and controls. ISJLP, 6, 119. https:\/\/ssrn.com\/abstract=1997782","journal-title":"ISJLP"},{"key":"e_1_3_2_88_1","doi-asserted-by":"publisher","DOI":"10.1177\/105960117700200404"},{"key":"e_1_3_2_89_1","volume-title":"CSCW 2008 Workshop","volume":"9","author":"Tuffley D.","year":"2008","unstructured":"Tuffley, D. (2008). Leadership of complex virtual teams. In CSCW 2008 Workshop (Vol. 9)."},{"key":"e_1_3_2_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2021.04.008"},{"key":"e_1_3_2_91_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-022-00331-2"},{"key":"e_1_3_2_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/1502650.1502661"},{"key":"e_1_3_2_93_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222230410"},{"key":"e_1_3_2_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2019.07.007"},{"key":"e_1_3_2_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/3441715"},{"key":"e_1_3_2_96_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)ME.1943-5479.0001029"},{"key":"e_1_3_2_97_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-013-9111-6"},{"key":"e_1_3_2_98_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00414"},{"key":"e_1_3_2_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833669"},{"key":"e_1_3_2_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3290545"},{"key":"e_1_3_2_101_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000066"},{"key":"e_1_3_2_102_1","unstructured":"Zhao R. Benbasat I. & Cavusoglu H. (2019). Do users always want to know more? Investigating the relationship between system transparency and users\u2019 trust in advice-giving systems."}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2023.2278933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T15:51:41Z","timestamp":1732809101000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2023.2278933"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,20]]},"references-count":101,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["10.1080\/10447318.2023.2278933"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2023.2278933","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"value":"1044-7318","type":"print"},{"value":"1532-7590","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,20]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-07-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-10-12","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-10-30","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}