{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T23:51:19Z","timestamp":1776037879496,"version":"3.50.1"},"reference-count":119,"publisher":"Oxford University Press (OUP)","license":[{"start":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T00:00:00Z","timestamp":1772582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Abstract: People experience transitional events during their lives that are significant, disruptive, and potentially challenging to navigate. Emotions usually run high, and the central actor may seek personalized support from \u201cothers\u201d who are often identified online. An increased online presence, however, can also exacerbate vulnerabilities, making it challenging for individuals to preserve their privacy. Privacy-Enhancing Technologies (PETs) can support people undergoing transitions to have more control over their online identity and related disclosures. Nevertheless, available tools of this kind do not explicitly cater to the needs of such populations, leading to low uptake. To inform the future development of bespoke PETs, we carried out a survey to understand the population characteristics and online behaviors of four transition groups: (1) leaving the Armed Forces; (2) Relationship Breakdown (Romantic); (3) Serious Illness (Cancer); and (4) LGBTQ+ (\u201ccoming out\u201d or gender transition). Our findings suggest that bespoke PETs should engender resilience and a sense of control over what is shared online via the identification, creation, and maintenance of \u201csafe spaces\u201d in which network members are restricted to trusted others who are deemed supportive of the actor\u2019s transition.<\/jats:p>","DOI":"10.1093\/iwc\/iwag002","type":"journal-article","created":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T12:46:35Z","timestamp":1768481195000},"source":"Crossref","is-referenced-by-count":0,"title":["Revealing privacy needs during life\u2019s significant transitions"],"prefix":"10.1093","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0425-1486","authenticated-orcid":false,"given":"Ryan Colin","family":"Gibson","sequence":"first","affiliation":[{"name":"Department of Computer and Information Sciences, University of Strathclyde , Glasgow ,","place":["United Kingdom"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7187-6531","authenticated-orcid":false,"given":"Karen","family":"Renaud","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences, University of Strathclyde , Glasgow ,","place":["United Kingdom"]}]},{"given":"Wendy","family":"Moncur","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Sciences, University of Strathclyde , Glasgow ,","place":["United Kingdom"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4362-8020","authenticated-orcid":false,"given":"Irina","family":"Cojuharenco","sequence":"additional","affiliation":[{"name":"Surrey Business School, University of Surrey , Guildford ,","place":["United Kingdom"]}]},{"given":"Zhou","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Psychology, University of Surrey , Guildford ,","place":["United Kingdom"]}]},{"given":"Diane","family":"Morrow","sequence":"additional","affiliation":[{"name":"Department of Sociological and Psychological Sciences, Abertay University , Dundee ,","place":["United Kingdom"]}]},{"given":"Lorraine","family":"Wright","sequence":"additional","affiliation":[{"name":"Department of Psychology, Edge Hill University , Ormskirk ,","place":["United Kingdom"]}]},{"given":"Nick","family":"Hulbert-Williams","sequence":"additional","affiliation":[{"name":"Department of Psychology, Edge Hill University , Ormskirk ,","place":["United Kingdom"]}]}],"member":"286","published-online":{"date-parts":[[2026,3,4]]},"reference":[{"key":"2026041218502155000_ref1","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1002\/jcpy.1191","article-title":"Secrets and likes: The drive for privacy and the difficulty of achieving it in the digital age","volume":"30","author":"Acquisti","year":"2020","journal-title":"Journal of Consumer Psychology"},{"key":"2026041218502155000_ref2","first-page":"67","volume-title":"The proceedings of 14th Australian information security management conference","author":"Aljohani","year":"2016"},{"key":"2026041218502155000_ref3","volume-title":"The environment and social behavior: Privacy, personal space, territory, and crowding","author":"Altman","year":"1975"},{"key":"2026041218502155000_ref4","author":"apa.org","year":"2026"},{"key":"2026041218502155000_ref5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/20539517231213827","article-title":"Everyday digital traces","volume":"10","author":"Armstrong","year":"2023","journal-title":"Big Data & Society"},{"key":"2026041218502155000_ref6","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1111\/JCOM.12276","article-title":"Online privacy concerns and privacy management: A meta-analytical review","volume":"67","author":"Baruh","year":"2017","journal-title":"The Journal of Communication"},{"key":"2026041218502155000_ref7","doi-asserted-by":"publisher","first-page":"1290","DOI":"10.1108\/JARHE-06-2020-0157","article-title":"Basic psychological needs satisfaction and student engagement: The importance of novelty satisfaction","volume":"13","author":"Benlahcene","year":"2021","journal-title":"Journal of Applied Research in Higher Education"},{"key":"2026041218502155000_ref8","doi-asserted-by":"publisher","first-page":"1006","DOI":"10.1080\/10447318.2010.516719","article-title":"Too many Facebook \u201cfriends\u201d? Content sharing and sociability versus the need for privacy in social network sites","volume":"26","author":"Brandtz\u00e6g","year":"2010","journal-title":"International Journal of Human\u2013Computer Interaction"},{"key":"2026041218502155000_ref9","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1080\/2159676X.2019.1628806","article-title":"Reflecting on reflexive thematic analysis","volume":"11","author":"Braun","year":"2019","journal-title":"Qualitative Research in Sport, Exercise and Health"},{"key":"2026041218502155000_ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2023.107770","article-title":"The digital harms of smart home devices: a systematic literature review","volume":"145","author":"Buil-Gil","year":"2023","journal-title":"Computers in Human Behavior"},{"key":"2026041218502155000_ref11","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1080\/03637758209376073","article-title":"Three field experiments on the effects of violations of conversational distance","volume":"49","author":"Burgoon","year":"1982","journal-title":"Communications Monographs"},{"key":"2026041218502155000_ref12","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1177\/01634437211027106","article-title":"Transgender identity management across social media platforms","volume":"44","author":"Buss","year":"2022","journal-title":"Media, Culture & Society"},{"key":"2026041218502155000_ref13","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1037\/0022-3514.42.1.116","article-title":"The need for cognition","volume":"42","author":"Cacioppo","year":"1982","journal-title":"Journal of Personality and Social Psychology"},{"key":"2026041218502155000_ref14","volume-title":"Stress experiences and outcomes in diverse college students: Applying the stress process model","author":"Campos","year":"2022"},{"key":"2026041218502155000_ref15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3173574.3173824","volume-title":"Proceedings conference on human factors in computing systems","author":"Carrasco","year":"2018"},{"key":"2026041218502155000_ref16","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/SP.2018.00061","volume-title":"2018 IEEE symposium on security and privacy (SP)","author":"Chatterjee","year":"2018"},{"key":"2026041218502155000_ref17","first-page":"793","article-title":"Privacy harms","volume":"102","author":"Citron","year":"2022","journal-title":"The Boston University Law Review"},{"key":"2026041218502155000_ref18","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1080\/17459435.2021.1929425","article-title":"What to withhold and when to disclose: Gender transitions and privacy management on social media","volume":"23","author":"Coker","year":"2022","journal-title":"Qualitative Research Reports in Communication"},{"key":"2026041218502155000_ref19","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1002\/da.10113","article-title":"Development of a new resilience scale: The Connor-Davidson Resilience Scale (CD-RISC)","volume":"18","author":"Connor","year":"2003","journal-title":"Depression and Anxiety"},{"key":"2026041218502155000_ref20","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1080\/1369118X.2014.888458","article-title":"Context collapse: Theorizing context collusions and collisions","volume":"17","author":"Davis","year":"2014","journal-title":"Information, Communication & Society"},{"key":"2026041218502155000_ref21","doi-asserted-by":"crossref","first-page":"416","DOI":"10.4135\/9781446249215.n21","article-title":"Self-determination theory","volume":"1","author":"Deci","year":"2012","journal-title":"Handbook of Theories of Social Psychology"},{"key":"2026041218502155000_ref22","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/3274313","article-title":"\u201cToo gay for Facebook\u201d: Presenting LGBTQ+ identity throughout the personal social media ecosystem","volume":"2","author":"Devito","year":"2018","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"key":"2026041218502155000_ref23","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/J.INTCOM.2011.04.006","article-title":"Domestic violence and information communication technologies","volume":"23","author":"Dimond","year":"2011","journal-title":"Interacting with Computers"},{"key":"2026041218502155000_ref24","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/3134676","article-title":"Challenges in transitioning from civil to military culture: Hyper-selective disclosure through ICTs","volume":"1","author":"Dosono","year":"2017","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"key":"2026041218502155000_ref25","doi-asserted-by":"publisher","first-page":"1280","DOI":"10.1177\/02724316166595","article-title":"Psychological need satisfaction and achievement goals: Exploring indirect effects of academic and social adaptation following the transition to secondary school","volume":"37","author":"Duchesne","year":"2017","journal-title":"Journal of Early Adolescence"},{"key":"2026041218502155000_ref26","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1177\/1461444814549930","article-title":"\u201cHe has a way gayer Facebook than I do\u201d: Investigating sexual identity disclosure and context collapse on a social networking site","volume":"18","author":"Duguay","year":"2014","journal-title":"New Media & Society"},{"key":"2026041218502155000_ref27","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1111\/j.1540-4560.1991.tb01834.x","article-title":"Control versus autonomy during early adolescence","volume":"47","author":"Eccles","year":"1991","journal-title":"Journal of Social Issues"},{"key":"2026041218502155000_ref28","doi-asserted-by":"crossref","first-page":"267","DOI":"10.28945\/1621","article-title":"Thinking in the digital era: a revised model for digital literacy","volume":"9","author":"Eshet","year":"2012","journal-title":"Issues Informing Science and Information Technology"},{"key":"2026041218502155000_ref29","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1016\/J.CHB.2016.06.009","article-title":"Queer identity online: informal learning and teaching experiences of LGBTQ individuals on social media","volume":"65","author":"Fox","year":"2016","journal-title":"Computers in Human Behavior"},{"key":"2026041218502155000_ref30","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.jcbs.2016.05.003","article-title":"The development and validation of the comprehensive assessment of acceptance and commitment therapy processes (CompACT)","volume":"5","author":"Francis","year":"2016","journal-title":"Journal of Contextual Behavioral Science"},{"key":"2026041218502155000_ref31","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1080\/10447318.2018.1456150","article-title":"A personal resource for technology interaction: development and validation of the affinity for technology interaction (ATI) scale","volume":"35","author":"Franke","year":"2019","journal-title":"International Journal of Human\u2013Computer Interaction"},{"key":"2026041218502155000_ref32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3134681","article-title":"Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders","volume":"1","author":"Freed","year":"2017","journal-title":"Proceedings of the ACM on Human\u2013Computer Interaction"},{"key":"2026041218502155000_ref33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3173574.3174241","article-title":"\u201cA stalker\u2019s paradise\u201d: How intimate partner abusers exploit technology","volume":"1","author":"Freed","year":"2018","journal-title":"Proceedings Conference on Human Factors in Computing Systems"},{"key":"2026041218502155000_ref34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3359304","article-title":"\u201cIs my phone hacked?\u201d Analyzing clinical computer security interventions with survivors of intimate partner violence","volume":"3","author":"Freed","year":"2019","journal-title":"Proceedings of the ACM on Human\u2013Computer Interaction"},{"key":"2026041218502155000_ref35","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1002\/job.322","article-title":"Self-determination theory and work motivation","volume":"26","author":"Gagn\u00e9","year":"2005","journal-title":"Journal of Organizational Behavior"},{"key":"2026041218502155000_ref36","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/3698204.3716445","volume-title":"CHIIR\u201925: ACM SIGIR conference on human information interaction and retrieval","author":"Gibson","year":"2025"},{"key":"2026041218502155000_ref37","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1348\/000709907X209863","article-title":"Changes in quality of life and psychological need satisfaction following the transition to secondary school","volume":"78","author":"Gillison","year":"2008","journal-title":"The British Journal of Educational Psychology"},{"key":"2026041218502155000_ref38","doi-asserted-by":"publisher","DOI":"10.1136\/bmjgh-2020-003330","article-title":"The empirical evidence underpinning the concept and practice of person-centred care for serious illness: A systematic review","volume":"5","author":"Giusti","year":"2020","journal-title":"BMJ Global Health"},{"key":"2026041218502155000_ref39","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1080\/00224545.2019.1570905","article-title":"Basic need satisfaction in the parental relationship offsets millennials\u2019 worries about the transition to college","volume":"159","author":"Greene","year":"2019","journal-title":"The Journal of Social Psychology"},{"key":"2026041218502155000_ref40","volume-title":"The interaction of religion and technology: Ethical considerations","author":"Gul","year":"2024"},{"key":"2026041218502155000_ref41","doi-asserted-by":"publisher","first-page":"63:1","DOI":"10.1145\/3274332","article-title":"Social media as social transition machinery","volume":"2","author":"Haimson","year":"2018","journal-title":"Proceedings of the ACM on Human Computer Interaction"},{"key":"2026041218502155000_ref42","doi-asserted-by":"publisher","first-page":"3809","DOI":"10.1145\/2702123.2702270","volume-title":"CHI\u201915: Proceedings of the 33rd annual ACM conference on human factors in computing systems","author":"Haimson","year":"2015"},{"key":"2026041218502155000_ref43","doi-asserted-by":"publisher","first-page":"1176","DOI":"10.1145\/2675133.2675152","volume-title":"CSCW 2015\u2014Proceedings of the ACM international conference on computer-supported cooperative work and social computing","author":"Haimson","year":"2015"},{"key":"2026041218502155000_ref44","doi-asserted-by":"publisher","first-page":"2895","DOI":"10.1145\/2858036.2858136","article-title":"Digital footprints and changing networks during online identity transitions","author":"Haimson","year":"2016","journal-title":"Proceedings Conference on Human Factors in Computing Systems"},{"key":"2026041218502155000_ref45","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1002\/asi.24455","article-title":"The major life events taxonomy: Social readjustment, social media information sharing, and online network separation during times of life transition","volume":"2021","author":"Haimson","year":"2021","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"2026041218502155000_ref46","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1177\/0894439308318213","article-title":"An update on survey measures of web-oriented digital literacy","volume":"27","author":"Hargittai","year":"2009","journal-title":"Social Science Computer Review"},{"key":"2026041218502155000_ref47","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1177\/0894439310397146","article-title":"Succinct survey measures of web-use skills","volume":"30","author":"Hargittai","year":"2012","journal-title":"Social Science Computer Review"},{"key":"2026041218502155000_ref48","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1111\/1467-9566.12022","article-title":"Life in and after the armed forces: Social networks and mental health in the UK military","volume":"35","author":"Hatch","year":"2013","journal-title":"Sociology of Health & Illness"},{"key":"2026041218502155000_ref49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.brat.2005.06.006","article-title":"Acceptance and commitment therapy: Model, processes and outcomes","volume":"44","author":"Hayes","year":"2006","journal-title":"Behaviour Research and Therapy"},{"key":"2026041218502155000_ref50","volume-title":"Acceptance and commitment therapy: The process and practice of mindful change","author":"Hayes","year":"2011"},{"key":"2026041218502155000_ref51","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.beth.2009.08.002","article-title":"Acceptance and commitment therapy and contextual behavioral science: Examining the progress of a distinctive model of behavioral and cognitive therapy","volume":"44","author":"Hayes","year":"2013","journal-title":"Behavior Therapy"},{"key":"2026041218502155000_ref52","doi-asserted-by":"publisher","first-page":"1175","DOI":"10.1145\/3064663.3064765","volume-title":"DIS 2017\u2014\u2013Proceedings of the 2017 ACM conference on designing interactive systems","author":"Herron","year":"2017"},{"key":"2026041218502155000_ref53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2015.05.002","article-title":"A taxonomy for privacy enhancing technologies","volume":"53","author":"Heurix","year":"2015","journal-title":"Computers & Security"},{"key":"2026041218502155000_ref54","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1080\/10570314.2014.943422","article-title":"Severing primary ties: Exit from totalistic organizations","volume":"79","author":"Hinderaker","year":"2015","journal-title":"Western Journal of Communication"},{"key":"2026041218502155000_ref55","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/0022-3999(67)90010-4","article-title":"The social readjustment rating scale","volume":"11","author":"Holmes","year":"1967","journal-title":"Journal of Psychosomatic Research"},{"key":"2026041218502155000_ref56","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1111\/j.1365-2788.2008.01110.x","article-title":"Life events as a risk factor for psychological problems in individuals with intellectual disabilities: a critical review","volume":"52","author":"Hulbert-Williams","year":"2008","journal-title":"Journal of Intellectual Disability Research"},{"key":"2026041218502155000_ref59","doi-asserted-by":"publisher","first-page":"4837","DOI":"10.1007\/s12144-020-00972-1","article-title":"A longitudinal examination of nurses\u2019 need satisfaction profiles: A latent transition analysis","volume":"41","author":"Huyghebaert-Zouaghi","year":"2022","journal-title":"Current Psychology"},{"key":"2026041218502155000_ref60","doi-asserted-by":"publisher","first-page":"166465","DOI":"10.1109\/ACCESS.2021.3130086","article-title":"\u201cWhy should I read the privacy policy, I just need the service\u201d: A study on attitudes and perceptions toward privacy policies","volume":"9","author":"Ibdah","year":"2021","journal-title":"IEEE Access"},{"key":"2026041218502155000_ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3373017.3373040","volume-title":"ACSW '20: Proceedings of the Australasian Computer Science Week Multiconference, 1","author":"Isika","year":"2020"},{"key":"2026041218502155000_ref125","doi-asserted-by":"publisher","first-page":"151","DOI":"10.14400\/JDC.2021.19.10.151","article-title":"The effect of social exclusion on privacy concern and intention to provide personal information: Focused on perceived sense of control","volume":"19","author":"Jeon","year":"2002","journal-title":"Journal of Digital Convergence"},{"key":"2026041218502155000_ref62","volume-title":"Manual of the basic psychological need satisfaction and frustration scale (BPNSFS)","author":"Kaap-Deeder","year":"2020"},{"key":"2026041218502155000_ref63","doi-asserted-by":"publisher","DOI":"10.2196\/40192","article-title":"Digital engagement of older adults: Scoping review","volume":"24","author":"Kebede","year":"2022","journal-title":"Journal of Medical Internet Research"},{"key":"2026041218502155000_ref64","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1057\/jit.2010.6","article-title":"Online social networks: Why we disclose","volume":"25","author":"Krasnova","year":"2010","journal-title":"Journal of Information Technology"},{"key":"2026041218502155000_ref65","doi-asserted-by":"publisher","first-page":"62","DOI":"10.4018\/IJICTE.2016100106","article-title":"Social networking sites: College students' patterns of use and concerns for privacy and trust by gender, ethnicity, and employment status","volume":"12","author":"Kyei-Blankson","year":"2016","journal-title":"International Journal of Information and Communication Technology Education (IJICTE)"},{"key":"2026041218502155000_ref66","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1080\/07370024.2019.1685883","article-title":"Technology-facilitated intimate partner abuse: A qualitative analysis of data from online domestic abuse forums","volume":"36","author":"Leit\u00e3o","year":"2019","journal-title":"Human\u2013Computer Interaction"},{"key":"2026041218502155000_ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376339","volume-title":"Proceedings conference on human factors in computing systems","author":"Lerner","year":"2020"},{"key":"2026041218502155000_ref68","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/2068816.2068823","volume-title":"Proceedings of the","author":"Liu","year":"2011"},{"key":"2026041218502155000_ref69","author":"Macmillan Cancer Support","year":"2022"},{"key":"2026041218502155000_ref71","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1089\/cyber.2012.0125","article-title":"Facebook surveillance of former romantic partners: Associations with postbreakup recovery and personal growth","volume":"15","author":"Marshall","year":"2012","journal-title":"Cyberpsychology, Behavior and Social Networking"},{"key":"2026041218502155000_ref72","doi-asserted-by":"publisher","first-page":"2189","DOI":"10.1145\/3025453.3025875","volume-title":"Conference on human factors in computing systems","author":"Matthews","year":"2017"},{"key":"2026041218502155000_ref73","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1080\/07370024.2013.819218","article-title":"Providing adaptive health updates across the personal social network","volume":"29","author":"Moncur","year":"2014","journal-title":"Human-Computer Interaction"},{"key":"2026041218502155000_ref74","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1145\/2818048.2819925","volume-title":"Proceedings of the ACM conference on computer supported cooperative work, CSCW","author":"Moncur","year":"2016"},{"key":"2026041218502155000_ref75","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1111\/j.1467-9833.2008.00433.x","article-title":"Defining privacy","volume":"39","author":"Moore","year":"2008","journal-title":"Journal of Social Philosophy"},{"key":"2026041218502155000_ref76","volume-title":"A self-determination theory perspective on wellbeing in the transition from university: Trait autonomy and basic psychological need satisfaction through graduates\u2019 goal pursuits, past and present","author":"Mulvihill","year":"2021"},{"key":"2026041218502155000_ref77","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1176\/APPI.PS.201800520","article-title":"Risks to privacy with use of social media: understanding the views of social media users with serious mental illness","volume":"70","author":"Naslund","year":"2019","journal-title":"Psychiatric Services"},{"key":"2026041218502155000_ref78","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1002\/PON.4024","article-title":"Sharing bad news of a lung cancer diagnosis: Understanding through communication privacy management theory","volume":"25","author":"Ngwenya","year":"2016","journal-title":"Psycho-Oncology"},{"key":"2026041218502155000_ref79","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3555214","article-title":"Revealing cumulative risks in online personal information: A data narrative study","volume":"6","author":"Nicol","year":"2022","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"key":"2026041218502155000_ref80","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1080\/1369118X.2018.1486870","article-title":"The biggest lie on the internet: Ignoring the privacy policies and terms of service policies of social networking services","volume":"23","author":"Obar","year":"2020","journal-title":"Information, Communication & Society"},{"key":"2026041218502155000_ref81","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1145\/1858171.1858199","volume-title":"DIS 2010\u2014Proceedings of the 8th ACM conference on designing interactive systems","author":"Odom","year":"2010"},{"key":"2026041218502155000_ref83","author":"Office for National Statistics (ONS)","year":"2021"},{"key":"2026041218502155000_ref84","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2021.628064","article-title":"Need-supportive and need-thwarting teacher behavior: Their importance to boys\u2019 and girls\u2019 academic engagement and procrastination behavior","volume":"12","author":"Opdenakker","year":"2021","journal-title":"Frontiers in Psychology"},{"key":"2026041218502155000_ref85","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1080\/08824096.2024.2379832","article-title":"Words, words, words: Participants do not read consent forms in communication research","volume":"41","author":"Parfenova","year":"2024","journal-title":"Communication Research Reports"},{"key":"2026041218502155000_ref86","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1177\/0093650211418338","article-title":"Digital literacy and privacy behavior online","volume":"40","author":"Park","year":"2013","journal-title":"Communication Research"},{"key":"2026041218502155000_ref87","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1177\/0165551517706233","article-title":"The digitally extended self: A lexicological analysis of personal data","volume":"44","author":"Parkinson","year":"2018","journal-title":"Journal of Information Science"},{"key":"2026041218502155000_ref88","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1002\/jcop.21908","article-title":"Understanding the influence of resilience for people with a lived experience of mental illness: A self-determination theory perspective","volume":"45","author":"Perlman","year":"2017","journal-title":"Journal of Community Psychology"},{"key":"2026041218502155000_ref89","doi-asserted-by":"publisher","first-page":"272:1","DOI":"10.1145\/3434181","article-title":"Entering doors, evading traps: Benefits and risks of visibility during transgender coming outs","author":"Pinter","year":"2021","journal-title":"Proceedings of the ACM on Human Computer Interaction. CSCW 3"},{"key":"2026041218502155000_ref90","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-03315-5_17","volume-title":"The Future of Identity in the Information Society. Privacy and Identity 2008","author":"P\u00f6tzsch","year":"2009"},{"key":"2026041218502155000_ref91","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.heliyon.2021.e07406","article-title":"Does digital literacy influence students\u2019 online risk? Evidence from Covid-19","volume":"7","author":"Purnama","year":"2021","journal-title":"Heliyon"},{"key":"2026041218502155000_ref92","volume-title":"SOUPS 2016\u2014Proceedings of the 12th symposium on usable privacy and security","author":"Rao","year":"2016,  22"},{"key":"2026041218502155000_ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.lindif.2023.102357","article-title":"Need satisfaction profiles during the transition to secondary school and its implications in later education","volume":"107","author":"Ratelle","year":"2023","journal-title":"Learning and Individual Differences"},{"key":"2026041218502155000_ref94","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/s10591-020-09550-w","article-title":"Basic psychological need satisfaction and frustration: Profiles among emerging adult college students and links to well-being","volume":"43","author":"Reed-Fitzke","year":"2021","journal-title":"Contemporary Family Therapy"},{"key":"2026041218502155000_ref95","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1145\/2837126.2837130","volume-title":"Proceedings of the 13th international conference on advances in mobile computing and multimedia","author":"Reinhardt","year":"2015,"},{"key":"2026041218502155000_ref96","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1177\/0095327X20974391","article-title":"Social media as an (un)supportive resource for military partners coping with military lifestyle challenges","volume":"48","author":"Rossetto","year":"2022","journal-title":"Armed Forces & Society"},{"key":"2026041218502155000_ref97","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1006\/ceps.1999.1020","article-title":"Intrinsic and extrinsic motivations: Classic definitions and new directions","volume":"25","author":"Ryan","year":"2000","journal-title":"Contemporary Educational Psychology"},{"key":"2026041218502155000_ref98","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1108\/OIR-03-2023-0122","article-title":"The role of digital literacy and digital data security awareness in online privacy concerns: A multi-group analysis with gender","volume":"48","author":"Saritepeci","year":"2024","journal-title":"Online Information Review"},{"key":"2026041218502155000_ref99","doi-asserted-by":"publisher","first-page":"1823","DOI":"10.1145\/2470654.2466241","volume-title":"Conference on human factors in computing systems","author":"Sas","year":"2013"},{"key":"2026041218502155000_ref100","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3274424","article-title":"Safe spaces and safe places","volume":"2","author":"Scheuerman","year":"2018","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"key":"2026041218502155000_ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101866","article-title":"Privacy risk and the use of Facebook apps: A gender-focused vulnerability assessment","volume":"96","author":"Schyff","year":"2020","journal-title":"Computers & Security"},{"key":"2026041218502155000_ref102","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyt.2019.00208","article-title":"Resilience in cancer patients","volume":"10","author":"Seiler","year":"2019","journal-title":"Frontiers in Psychiatry"},{"key":"2026041218502155000_ref103","doi-asserted-by":"publisher","first-page":"2882","DOI":"10.1145\/2858036.2858109","volume-title":"Conference on human factors in computing systems","author":"Semaan","year":"2016"},{"key":"2026041218502155000_ref104","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1145\/2998181.2998221","volume-title":"Proceedings of the 2017 ACM Conference on computer supported cooperative work and social computing, in CSCW\u201917","author":"Semaan","year":"2017"},{"key":"2026041218502155000_ref105","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1111\/1532-7795.1301004","article-title":"Psychological control and autonomy granting: Opposite ends of a continuum or distinct constructs?","volume":"13","author":"Silk","year":"2003","journal-title":"Journal of Research on Adolescence"},{"key":"2026041218502155000_ref124","doi-asserted-by":"crossref","first-page":"1087","DOI":"10.2307\/3481326","article-title":"Conceptualizing privacy","volume":"90","author":"Solove","year":"2002","journal-title":"California Law Review"},{"key":"2026041218502155000_ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2021.101592","article-title":"Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness","volume":"61","author":"Soumelidou","year":"2021","journal-title":"Telematics and Informatics"},{"key":"2026041218502155000_ref107","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s11031-020-09854-2","article-title":"Basic psychological need satisfaction across the retirement transition: Changes and longitudinal associations with depressive symptoms","volume":"45","author":"Stenling","year":"2021","journal-title":"Motivation and Emotion"},{"key":"2026041218502155000_ref108","doi-asserted-by":"publisher","first-page":"1729","DOI":"10.1177\/1461444820981009","article-title":"The management of LGBTQ+ identities on social media: A student perspective","volume":"24","author":"Talbot","year":"2022","journal-title":"New Media & Society"},{"key":"2026041218502155000_ref109","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s00779-017-1068-3","article-title":"Supporting users to take informed decisions on privacy settings of personal devices","volume":"22","author":"Torre","year":"2018","journal-title":"Personal and Ubiquitous Computing"},{"key":"2026041218502155000_ref111","first-page":"94","volume-title":"Privacy Incorporated Software Agent (PISA) consortium, The Hague","author":"Van Blarkom","year":"2003"},{"key":"2026041218502155000_ref112","doi-asserted-by":"publisher","first-page":"2076","DOI":"10.3390\/app14209275","article-title":"PEDRO: privacy-enhancing decision suppoRt tOol","volume":"14","author":"Van Schaik","year":"2024","journal-title":"Applied Sciences"},{"key":"2026041218502155000_ref113","doi-asserted-by":"publisher","first-page":"855","DOI":"10.3390\/psycholint6040055","article-title":"Emotional intelligence and university students\u2019 happiness: The mediating role of basic psychological needs\u2019 satisfaction","volume":"6","author":"Vasiou","year":"2024","journal-title":"Psychology International"},{"key":"2026041218502155000_ref114","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1145\/948005.948057","volume-title":"Proceedings of the 5th international conference on electronic commerce","author":"Vila","year":"2003"},{"key":"2026041218502155000_ref115","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/2531602.2531672","volume-title":"Proceedings of the ACM conference on computer supported cooperative work, CSCW","author":"Vitak","year":"2014"},{"key":"2026041218502155000_ref117","doi-asserted-by":"publisher","DOI":"10.1177\/00936502241273157","article-title":"The online privacy divide: Testing resource and identity explanations for racial\/ethnic differences in privacy concerns and privacy management behaviors on social media","volume":"00936502241273157","author":"Wang","year":"2024","journal-title":"Communication Research"},{"key":"2026041218502155000_ref118","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1080\/10410236.2019.1693128","article-title":"Female U.S. military veterans\u2019 (non)disclosure of mental health issues with family and friends: Privacy rules and boundary management","volume":"36","author":"Wilson","year":"2021","journal-title":"Health Communication"},{"key":"2026041218502155000_ref119","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1145\/2534169.2486008","article-title":"Mosaic: Quantifying privacy leakage in mobile networks","volume":"43","author":"Xia","year":"2013","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"2026041218502155000_ref120","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1122445.1122456","volume-title":"Proceedings of ACM conference (Conference\u201917)","author":"Zhang","year":"2018"},{"key":"2026041218502155000_ref121","doi-asserted-by":"publisher","first-page":"1816","DOI":"10.1016\/j.chb.2008.02.012","article-title":"Identity construction on Facebook: Digital empowerment in anchored relationships","volume":"24","author":"Zhao","year":"2008","journal-title":"Computers in Human Behavior"},{"key":"2026041218502155000_ref122","volume-title":"Privacy in social networks","author":"Zheleva","year":"2012"},{"key":"2026041218502155000_ref123","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CISTI.2014.6877073","volume-title":"9th Iberian conference on information systems and technologies (CISTI)","author":"Zhou","year":"2014"}],"container-title":["Interacting with Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/iwc\/advance-article-pdf\/doi\/10.1093\/iwc\/iwag002\/67226888\/iwag002.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/iwc\/advance-article-pdf\/doi\/10.1093\/iwc\/iwag002\/67226888\/iwag002.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T23:12:58Z","timestamp":1776035578000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/iwc\/advance-article\/doi\/10.1093\/iwc\/iwag002\/8505776"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,4]]},"references-count":119,"URL":"https:\/\/doi.org\/10.1093\/iwc\/iwag002","relation":{},"ISSN":["0953-5438","1873-7951"],"issn-type":[{"value":"0953-5438","type":"print"},{"value":"1873-7951","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,4]]},"article-number":"iwag002"}}